D(r3, 0x541b, &(0x7f0000000080)) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x28, &(0x7f0000000100)}, 0x10) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x10}}, 0x0) [ 2851.894133][T18925] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=bd240000) 15:04:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) statfs(&(0x7f0000000300)='./file0/bus/file0\x00', &(0x7f0000000340)=""/72) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) recvfrom$inet(r2, &(0x7f00000000c0)=""/73, 0x49, 0x2000, &(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$P9_RCREATE(r2, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r3, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200000000}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x80000, 0x0) 15:04:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3f00}, 0x10}}, 0x0) [ 2852.057629][T18945] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=bd240000) 15:04:05 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000ff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000180)={0x0, 0xf000, 0x3, 0x5, 0x2}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="5866c849e0c5614057b5cb2219ee73ac32358e16102fceda55d7de3de6aa30de6fb8079d362e6b4ee21b79a529562c42af8151293315e77ce776c9c02eacd73bc9a8415389376bc7fd69aa436b16428bad069cb237feb34b8b3513987f90b36bc2ccc0c757faadeedee50748f0aea54fe22ced9f668b134a95812c7764bd1554b78fa9407004a5ca2cd4a9af7b0a5cab373d06bf616573a4558c30d960b1b1f8729fd1fe12e5a095", 0xa8}], 0x1, 0x4) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000140)) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x2) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) write$P9_RREADDIR(r2, &(0x7f00000000c0)={0x2e, 0x29, 0x1, {0x4, [{{0x8, 0x1, 0x7}, 0x66f70f6a, 0x8000, 0xb, './file0/bus'}]}}, 0x2e) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000}, 0x10}}, 0x0) 15:04:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000}, 0x10}}, 0x0) 15:04:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x4) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) recvfrom$x25(r3, &(0x7f0000000080)=""/124, 0x7c, 0x2, &(0x7f0000000100)={0x9, @remote={[], 0x1}}, 0x12) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000000)={0x9, 0x41323151, 0x2, @stepwise={0x8, 0x2, 0x900000000000000, 0x6, 0x3ff, 0x2}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:06 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000fff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:06 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = semget(0x2, 0x0, 0x6) semctl$IPC_RMID(r3, 0x0, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0/bus\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) lgetxattr(&(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)=@random={'user.', 'ramfs\x00'}, &(0x7f0000000100)=""/44, 0x2c) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400300}, 0x10}}, 0x0) 15:04:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x2, 0x2000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = getuid() getgroups(0x5, &(0x7f00000000c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee01]) mount$fuse(0x0, &(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000080)='fuse\x00', 0x1000000, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xff}}], [{@hash='hash'}, {@dont_appraise='dont_appraise'}]}}) 15:04:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000080)='async\x00', 0x0, 0x0) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000000080)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000000}, 0x10}}, 0x0) 15:04:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000008dffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x400454ca, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2000000}, 0x10}}, 0x0) 15:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:04:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000080)={0xa, 0x4, 0x4, 0x826}, 0xa) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000}, 0x10}}, 0x0) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000091ffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000000)={0x0, {0xe8, 0xfff}}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x100000000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000180)={r4, 0x4}, 0x8) fchdir(r0) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3f000000}, 0x10}}, 0x0) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x800454d2, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000f5ffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x7fffffff}, &(0x7f0000000100)=0x6) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e22, 0x2a6, @rand_addr="e83449853167bc6ba3e5f84d331d764f", 0x4}}, 0x2, 0x5}, 0x90) r4 = creat(&(0x7f0000000080)='./file0/bus\x00', 0x4) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) open_tree(0xffffffffffffff9c, &(0x7f0000000280)='./file0/bus\x00', 0x80000) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x5}, 0x8) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x80086301, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/bus\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000000)) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000000}, 0x10}}, 0x0) 15:04:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x80108906, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0xfff, 0x2, 0x101, 0x25, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r4, 0xbdf}, &(0x7f0000000140)=0x8) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x80108907, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffff7f}, 0x10}}, 0x0) 15:04:08 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000f0ffffff7f"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000140)={@in={0x2, 0x4e24, @rand_addr=0x8000}, {&(0x7f0000000080)=""/174, 0xae}, &(0x7f0000000000), 0x52}, 0xa0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40030000000000}, 0x10}}, 0x0) 15:04:08 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 2: ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) connect$unix(r2, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100000000000000}, 0x10}}, 0x0) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2) ioctl$KVM_NMI(r0, 0xae9a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0/bus\x00', 0x1000000000) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:08 executing program 2: ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0xfc, 0x3f, 0x4, 0x0, 0x0, [{r1, 0x0, 0x3ff}, {r0, 0x0, 0x1}, {r1, 0x0, 0x1}, {r1, 0x0, 0x3}]}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) rmdir(&(0x7f0000000000)='./file0/bus\x00') ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000080)={0x80, 0x3ff, 0x1, 0x3}) 15:04:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'b%idge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200000000000000}, 0x10}}, 0x0) 15:04:09 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000007fffffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:09 executing program 2: ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) socket$bt_rfcomm(0x1f, 0x1, 0x3) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr(r1, &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)='ramfs\x00', 0x6, 0x2) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) getxattr(&(0x7f0000000100)='./file0/bus\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f0000000240)=""/198, 0xc6) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'b\\idge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400000000000000}, 0x10}}, 0x0) 15:04:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fstatfs(r3, &(0x7f0000000080)=""/134) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3f00000000000000}, 0x10}}, 0x0) 15:04:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'br%dge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) 15:04:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:10 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000000000000}, 0x10}}, 0x0) 15:04:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) fcntl$lock(r3, 0x0, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x2b31, r4}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) mount(&(0x7f0000000080)=@filename='./file0/bus\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000100)='hfs\x00', 0x1ee7ac7328980499, &(0x7f0000000140)='ramfs\x00') truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'br\\dge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x6400) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x4, &(0x7f0000027000)={0x1, 0x0, 0x3}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffff7f00000000}, 0x10}}, 0x0) 15:04:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridg%0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:11 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridg\\0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0xf}}, 0x0) 15:04:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='sysv\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000000c0)={0xa30000, 0x1, 0x8, [], &(0x7f0000000000)={0x0, 0x7, [], @value64=0xffff}}) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:11 executing program 5: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x20000000000000, 0x10000}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0xc0}}, 0x0) 15:04:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge%\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000000)={{0x0, @addr=0xd8f}, 0x8, 0x2, 0x6}) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x33fe0}}, 0x0) 15:04:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000080)='./file0/bus\x00', 0x0) 15:04:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x20000010}}, 0x0) 15:04:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f00000000c0)={0x1, 0x1}) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b0) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) write(r1, &(0x7f0000000080)="4cdb5578a01f0217ce4f3f844607e813afc08517b8e1cad16edc0551c65f3c9cc8b306945b1ee00d667ca90ff4936aeeeef81e6135bb3c80119d83f043ed594b2fc6ec37c8c9201b341ed0a9f585762b3e7ff899e4fd66ea863de079ca0ed933f670cca5cc2f1f9bffb027a7d02484aec5bf6563720d74a75cfe9cf503e4f2cd470f401a7c55", 0x86) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000100)) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x20000090}}, 0x0) 15:04:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x7ffff000}}, 0x0) 15:04:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000ac0)={0xfff, 0x2e, 0x2, 0x2, 0x3, [{0x4a99, 0x3, 0x1000, 0x0, 0x0, 0x84}, {0xfffffffffffffffb, 0x61c9af1c, 0x8, 0x0, 0x0, 0x1000}, {0xfffffffffffffff8, 0x10001, 0x0, 0x0, 0x0, 0x2000}]}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000100)={0x6, 0x7, 0x8001, 'queue0\x00', 0x5}) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000d00)) truncate(&(0x7f00000001c0)='./file0/bus\x00', 0x6) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000000dc0)='./file0\x00', 0xbc9dc8fbd81cb4b1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x220000, 0x0) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000bc0)='./file0/bus\x00', 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x4e22, @remote}, {0x7, @dev={[], 0x1f}}, 0x12, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, 'nr0\x00'}) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000c00)={0xa, @raw_data="73c6861c64078bc074e4fde37e54659f404ec6fbc44d5c4c4cc1b0cc3a9e3a087f15168444aaf59ccf242d4aca0991f89e88c679cf8d737c8536a6c1011ace8d19b2bca5f6e626fd3e5bea8b0cfe97b6e535f24ac57f85d43bfbe63daccaef514d460f0b1151a6904cc4656d265a84746a7b0db7f15e22a8ae330c807dc45029e07b107cba7c6fb36f89d549e0993b6a0ec098ba4f68d5d65a386086109386332396491eb70eb26a8f8050abe03601ce5bad74d2b110c3b11f5705e52d8be812bf546d40c0369a56"}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000001e40)=@nat={'nat\x00', 0x1b, 0x5, 0x738, 0x0, 0x338, 0xf0, 0x4c8, 0x338, 0x5d8, 0x5d8, 0x5d8, 0x5d8, 0x5d8, 0x5, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xc8, 0x256}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x393}}}, {{@ipv6={@ipv4={[], [], @local}, @empty, [0xffffff00, 0x0, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff], 'ip6gre0\x00', 'rose0\x00', {}, {0xff}, 0x2b, 0x8, 0x1, 0x62}, 0x0, 0xffffffffffffff11, 0x2d8, 0x0, {}, [@common=@rt={0x0, 'rt\x00', 0x0, {0x8, 0x8, 0x100000000, 0x1, 0x2, 0x3, [@empty, @mcast1, @remote, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @ipv4={[], [], @remote}, @rand_addr="1b73dce981b6781af550174e1e9112b8", @dev={0xfe, 0x80, [], 0x16}, @local, @empty, @dev={0xfe, 0x80, [], 0x25}, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local], 0x5}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@dev={0xfe, 0x80, [], 0x15}, @ipv4=@empty, @gre_key=0x3, @port=0x4e22}}}, {{@uncond, 0x0, 0x158, 0x190, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x3, 0x1, [0xffffffff, 0x0, 0xd0, 0x0, 0x2000000, 0x7, 0x3ff, 0x0, 0xfffffffffffffffe, 0x2, 0x3, 0x9, 0x5e, 0x1, 0x7fff, 0x7], 0xb}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x3, 0x2, 0x1, [0x93f, 0x7f, 0x4, 0x2e9, 0x3ff, 0x489, 0x9, 0x100, 0x20, 0x4, 0xff, 0x7, 0xffffffffffffffff, 0x3, 0x400, 0x8], 0x10}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x8, 0xffffffff, 0x8}, {0xa0e, 0x6bf, 0x3f}, {0x100, 0xffff, 0x3f}, 0xfffffffffffffffc, 0x1f9}}}, {{@ipv6={@mcast1, @ipv4={[], [], @remote}, [0xff0000ff, 0xff0000ff], [0xffffff00, 0xff000000, 0xffffffff], 'bond0\x00', 'rose0\x00', {0xff}, {0xff}, 0x62, 0x4000, 0x0, 0x70}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x0, 'MASQUERADE\x00', 0x0, {0x1, @ipv6=@ipv4={[], [], @multicast1}, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @icmp_id=0x68, @port=0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2a6) mkdir(&(0x7f0000000040)='./file0/bus\x00', 0x41) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000d80)={0x0, @speck128, 0x2, "7c822d66f3b41481"}) ioctl$FICLONE(r4, 0x40049409, r0) 15:04:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:13 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) chroot(&(0x7f0000000080)='./file0\x00') truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0xfffffdef}}, 0x0) 15:04:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:13 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x300, 0x0) accept$ax25(r0, &(0x7f0000000300)={{0x3, @default}, [@remote, @rose, @bcast, @null, @remote, @bcast, @remote, @rose]}, &(0x7f00000001c0)=0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xd8, "0d21395aaf448f590ac92a49a3fb068077fc168401c65d30db079662ff4ceb061b572271dd6da90d71324e5179f798152973985ae7a9ea7867a180ff2fdb5eda679a536392732c133e585af77ca5d7ffc24bdc14ddb0176e56879011379388766d5b703aa539ba97ffdbaeff1185ec5381dde6ef0c79925619943d8254e63c507284c503cb7e29e7d9f48afb06ea28e6f57f8e3f4dc6ec60380158b500472f8083be270585ac15ed3054309babf0eaccbeb0e5b63b0bb50b8e78ba98b15a3d99c220f05d846ec0e1533de3a8a2b2be298c15291f28bb852d"}, &(0x7f0000000000)=0xe0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000240)={r5, @in6={{0xa, 0x4e24, 0x52f, @mcast2, 0x3f}}}, 0x84) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffffffff00000002) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0xffffffffffff9d15, @remote, 0x9}, {0xa, 0x4e21, 0xc, @remote, 0x7473a971}, 0x0, [0x4, 0x6, 0x4, 0xc0000000, 0x9, 0x0, 0x1, 0x9]}, 0x5c) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x2}, 0x0) 15:04:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:14 executing program 5: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0xfffffffffffffffc, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)="6aad150c5cfc5f61d1a955ca2dca2f1535fff952a6abaf4b5a44475bfca4260f9d0a53e36c86a7c9b276fc9c89738619600355b55185fb5d78d9d03cb795698ffeeb5ce82ff389ddffc1d58c39563f8bd7594a96561ef90503212b73a86bf1e0a895845ca45ca91c3ef5b561bac298b15fc5bb94715203cbd77762c7d14d459f6931d569b0025c49c8490ce615ada49888130f3f460f2c", 0x97}, {&(0x7f0000000240)="1622f7cd4013501dddcbac950e153681fea252156c886c0e6532f7f4213d6a4d92966aad941e7f1bb143c7884d7429c0868c06595709e984261e2954082ba7f2ee9e568db98feeea218573448288ff5aeda7ab3dd9ce9da11e22fce63563ca38904710b3d26fc783d0e3bcec4722ff7493b0ffe28cae19dd9919278dc06941f53ca99cc402a3afa272b7a06509fac5f16689d989f6d628ffae14a211cc425447f7b636644655d707a8223879", 0xac}, {&(0x7f0000000180)="7e6924f4d6e03779d93f7013474001cb0d83fbd6553e0b67b3b043cacb72d6270df13c759718c1ae09c9d88ad11cc6307a690bbed5d88a471ea3df0431061e4450", 0x41}, {&(0x7f0000000300)="3a21a9d07d7ebfe5de156605beec86bd2c1dd1ffb5dcb5b8667245e1800ec9869265324e881139d65279874537b7c7133f7efdc4be27419165b6b1c296b8185ac6227f2a8e0273540b1953208e0b7a4a5fbf48af6a051a8c2856050a0f2a0f", 0x5f}], 0x4, 0xd) readahead(r1, 0xfff, 0x87a) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') 15:04:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:14 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x524c) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2cebffff2b00090225bd7000fddbdf2500000008", @ANYRES32=r3, @ANYBLOB="00000200f3ff08001b00080008000b00f7ffffff"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) accept$ax25(r2, &(0x7f0000000240)={{0x3, @default}, [@bcast, @rose, @rose, @remote, @default, @null, @default, @rose]}, &(0x7f00000001c0)=0x48) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x8}, 0x0) 15:04:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:14 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) fcntl$setstatus(r0, 0x4, 0x4400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 15:04:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:15 executing program 5: socketpair$unix(0x1, 0x7fffffffff, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000340)={@multicast1, @empty, r3}, 0xc) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000080)='./file0/bus\x00', 0x0) 15:04:15 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x100) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0\x00', 0x10000) 15:04:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0xffffff1f}, 0x0) 15:04:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) sendto$unix(r2, &(0x7f0000000080)="a08190549fe7f049611ac735d99f46237757e62b13673479629e537fd555b947a21cd724b91ed4e53904054a7fda717139dffc50ecf9a6741b206928b6aa0ac2ffc0c30bd707b99d36c79f269ccb70d65f4398691fc91aa6b2e908b7a70c86792c1558fac1d0e0945d09d37086276da079834e5b92dc", 0x76, 0x4000085, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() r9 = getuid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="020003e0", @ANYRES32=r7, @ANYBLOB="02000700", @ANYRES32=r8, @ANYBLOB="02000500", @ANYRES32=r9, @ANYBLOB="040005000000000008000500", @ANYRES32=r10, @ANYBLOB="10000100000000002000010000000000"], 0x5c, 0x0) truncate(&(0x7f0000000000)='./file0/bus\x00', 0x1) 15:04:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x2}, 0x0) 15:04:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2000) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000100)={0x0, 0x800, 0x800, 0x5, 0xffffffffffffff00}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000080)) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:16 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x4}, 0x0) 15:04:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) umount2(&(0x7f00000001c0)='./file0/bus\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) times(&(0x7f0000000240)) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x10a, 0x7, 0x7fffffff, "edab85868f76af2a504f2d8901694c48", "57504fe6e512a43778f7fc0c4a1046cbce8b8ce40a84169b5e9545f024141567b442eb195818f0be2fc97845774d16288dca608d486a8249afb23cdb2ef18f08545dcb540a9558623d60d57de9aa9bf0c8e2c5360758e2f4c7b03d3b2bf025c42f61c3d520caeace4574253a206cfab6b117586a7d998f67dd427cebf871175e0b7b6963de2e7026c96ec3a4d5c6c73e3c1ae3f5501ae36ecf4ac9f168c780136400a11d39e6eda1f08624510bfc68caeeb31ce502f3ca8d3dc2c4740b9cb3d6488b429d5404570b810d237d9ae343eef04ec0687ce03b4f5f6a81f49bc34006d09eed3e507380fb3f39bb9edbf89ede83fde39795"}, 0x10a, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x502, 0x0) 15:04:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1800000000000000, 0x100) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x8) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x0, 0x6, &(0x7f0000000100)='ramfs\x00'}, 0x30) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x6f, 0x1ff, 0x80000001, 0x9, 0x0, 0x7, 0x50080, 0xd, 0x0, 0x80000001, 0x5, 0x7, 0x1, 0x9, 0x5, 0x7fff, 0x800, 0x800, 0x4, 0x40, 0x5, 0x9, 0x4, 0x1, 0xe28, 0x6, 0x9, 0x5, 0x2, 0x3, 0x20, 0x2, 0x8, 0x9, 0x80000001, 0x0, 0x0, 0x2, 0x6, @perf_config_ext={0x5e, 0x8000}, 0x4040, 0x7, 0x7, 0xa, 0x5, 0x8, 0x1}, r5, 0x5, r3, 0x1) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000001c0)=[0x6, 0x5]) 15:04:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x3f00}, 0x0) 15:04:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) chroot(&(0x7f0000000100)='./file0/bus\x00') r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3, 0x4, 0x8, 0x5}, {0x1, 0x401, 0x7, 0x400}, {0x2, 0x1, 0x1c, 0x1}]}) 15:04:17 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f0000000000)) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x0, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x4000}, 0x0) 15:04:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) r4 = msgget(0x0, 0x200) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000080)=""/101) 15:04:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x0, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x34000}, 0x0) 15:04:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:17 executing program 4: socketpair$unix(0x1, 0x3ffffffffffe, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f0000000180), &(0x7f00000001c0)=0x4) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0xfc}, 0x28, 0x3) truncate(&(0x7f0000000280)='./file0/bus\x00', 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000240)=0x5) connect$x25(r2, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080)=0xffff, 0x4) 15:04:18 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = semget$private(0x0, 0x2, 0x182) semctl$SEM_INFO(r3, 0x0, 0x13, &(0x7f0000000240)=""/160) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000000180)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) sendto$rose(r2, &(0x7f0000000080)="a794f868d2161b77802a283ab7c917221eb3062ac480a1dca03e323b2b78545d0aa1d62d214afcd0a4f5df11cb36b8b708188278ce0998fe45790b55e202b828607bb73f3180cbe5974d4f61f050eae8b4fd78ecff0e1c1438bb191842bbf5bc4d6105d03abe25c8647aeb9937ca8a0d00726fd462d201a7919a55ef7306f4d225fa2dbc02", 0x85, 0x8000, 0x0, 0x0) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x0, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x400300}, 0x0) 15:04:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)={0x100000001, 0x20, 0x9, 0x9, 0x6, 0x3f, 0x1000, 0x53, 0x7, 0x2, 0xffff, 0x7}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) fcntl$lock(r3, 0x21, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x7, r4}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:18 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) mkdir(&(0x7f0000000280)='./file0/bus\x00', 0xfffffffffffffffd) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000040)=0x2) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000080)=""/145) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000140)='./file0/bus\x00', 0x3) 15:04:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x1000000}, 0x0) 15:04:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:19 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r3, &(0x7f0000000080)={'#! ', './file1', [{0x20, 'ramfs\x00'}, {0x20, 'GPL{self'}, {0x20, 'md5sum\'!*eth0#*nodev'}], 0xa, "67ab85985b517cffed20416203f1e184acd7676e03b754b7013077b6b0463d2669e267e450ba887fd8d7e6aa56f9cdb6e722270f10ed443efb2352c2a4dee3586db70d88f6b9cda9aff4b0fa6ec86c9ab2b637f6686ea27f220ad6716cd57ebd4ba635123c4ca791fa48f283a13fb67e02f080bc"}, 0xa4) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x2000000}, 0x0) 15:04:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:19 executing program 4: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="bfc969c4b96209afc2aaebb3717006e0061b876df04213b51228db4b3fa1643575c150a62650d3333602fbe80ff59b8a7efbefc60411f95744e8858b843597db7791414b9c8c43f15c618d1b1173458c9bd52f3db63ff4fe534c2cb7", 0x5c, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:04:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2867.155906][T19850] IPv6: addrconf: prefix option has invalid lifetime [ 2867.180694][T19858] IPv6: addrconf: prefix option has invalid lifetime 15:04:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r2, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x0, 0x8000000}, 0x3}}, 0xffffffffffffffa5) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x4000000}, 0x0) 15:04:19 executing program 4: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="bfc969c4b96209afc2aaebb3717006e0061b876df04213b51228db4b3fa1643575c150a62650d3333602fbe80ff59b8a7efbefc60411f95744e8858b843597db7791414b9c8c43f15c618d1b1173458c9bd52f3db63ff4fe534c2cb7", 0x5c, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:04:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2867.511432][T19886] IPv6: addrconf: prefix option has invalid lifetime 15:04:20 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x3f000000}, 0x0) 15:04:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x40, @local, 0x401}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r3, @in6={{0xa, 0x4e23, 0x7, @rand_addr="14bd44bd2b2200b42392e856c4d8da11", 0x2}}, 0x4, 0x6, 0xffff, 0x4000000}, &(0x7f0000000480)=0x98) ioctl$TIOCEXCL(r2, 0x540c) finit_module(r0, &(0x7f0000000180)='ramfs\x00', 0x1) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0xfffffef7, 0x73, 0x0, {{}, 0xfffffffffffffffd}}, 0x18) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x4, r4, 0x3c, 0x0, @in6={0xa, 0x4e21, 0x7f, @mcast2, 0x3}}}, 0xa0) 15:04:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2868.035910][T19903] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop4 15:04:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x40000000}, 0x0) 15:04:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='./file0/bus\x00', 0x1) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0xffffff7f}, 0x0) 15:04:20 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0xb44c421ad765ed64, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x40030000000000}, 0x0) 15:04:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000080)) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000140)={0x1, 0xe2b, 0x1000}) 15:04:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x100000000000000}, 0x0) 15:04:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:21 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x200000000000000}, 0x0) 15:04:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f00000000c0)='cgroup{$\x00', &(0x7f0000000100)='./file0/bus\x00', r2) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000080)={0x7, 0x3, 0x80000001, 0x9}, 0x10) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x400000000000000}, 0x0) 15:04:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) sendto$inet(r2, &(0x7f0000000080)="8490b8c2ab88a1246e88cec211af72bd6cb131baa12efe3bdd7f4e5e99a3366cf275eb4f2bcaf7eb6a5eb371e640c394af30438e88c7991ee35f834e44156ae72c2a93443f2c9320ea6cc029ce4f0551fdcc35c586a99211b96fe89e76ff8d6f8c29bcb30584dea483e812f36c80cf3b584a699754ed05630c1ea27e7001d91309efb42dc06d19a9489e38a42e3c741f7a949c79b4416ddeff2d1d81ea608a2ba3", 0xa1, 0x800, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:22 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:22 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x3f00000000000000}, 0x0) 15:04:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000300)={@default, @null, 0x2, 0x56}) mkdir(&(0x7f00000001c0)='./file0/bus\x00', 0x10040) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000440)='ramfs\x00', 0x4f, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000080)) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x410000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000400)=0x4, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e20, 0xeb8, @loopback, 0x1ff}}, [0xf5, 0x6, 0xfffffffffffffffa, 0x7, 0x2e, 0x8, 0x5, 0x5, 0x0, 0x8, 0x505, 0x2, 0x8, 0x2, 0xde]}, &(0x7f0000000580)=0x100) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000005c0)={r5, 0xb9}, 0x8) ioctl$VIDIOC_G_JPEGCOMP(r4, 0x808c563d, &(0x7f0000000100)) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000340)='\x00', &(0x7f0000000380)='./file0\x00', 0xffffffffffffff9c) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f00000003c0)={0x7, 0x6}) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) sched_getaffinity(r6, 0x8, &(0x7f0000000280)) 15:04:22 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000001400)={0x0, 0x33}) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) symlink(&(0x7f0000001440)='./file0/bus\x00', &(0x7f00000014c0)='./file0/file0\x00') truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) acct(&(0x7f0000000080)='./file0/bus\x00') writev(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)="2646af892d67576f70e5f408d9b86c024ed3f744f1b00fabde824c729d72", 0x1e}, {&(0x7f0000000100)="3f8bd38a4a301425165c2d47a6a62aac83e6cfbc4b32b3994e19db118a461ddb815ba4df76182ebd3a6bd2627091344aa3b4a3c41da0a3faaeceba5ff4c9bf95b147dc8db6fd3a1929545ae56fa49f30c234d1282da0f46e155634c7a2c37332f33bde602cd2f5a0845d2449bfe277fb3ae7ec3d3cf3e2152378", 0x7a}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="e38bd56b76e05cfdc8ce52bbe2481b60306a5802c20c0fd1f8a340f8ee88d2ec084cbc36476d16d842cd6a4024b6f62d8ed1a6039f492ff9c75223dbd5829f6febb4b5de904dfb2112441336c70ff4351ea6063acf12d896542465a44cb7b9e728c27bfbc0f95a0e1655d0f3bc1add27eaf2ad37ac37bd004a685163b48f175adf1d97531fcdb81e12448a18871a2196337b750d82abe9fc6be3e4a6d1fc6d5485d07d08eb", 0xa5}, {&(0x7f0000001300)="b7999268d67e7099ad35bd6cfb981fc955264275ac987f6b0e32c86eb554541a68431cbcd0f1b68034d9d3e1e92254ace16283f96803ab191a25508a1efda05cffd10dee326c5bd2f777246d46745b5e83ecf1dd9bf1d8c81cb3708af8d55ea2461256b007bc8ce781a8ab73f4cbf612201c52c6cbb63597b1abcbdb1d1b0868466885b03198a4443fab53ad47a4473f8deef7dbaab024709a2c811070fa57201f7d44af254800c2c0fbee84f338daebfdb39b1e22395e2652a1b83ee9bd4c91138c894dc478b26f72fe01856302bf079994b791bf8667a35e8517db", 0xdc}], 0x5) 15:04:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x4000000000000000}, 0x0) 15:04:22 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2870.622078][T20085] Process accounting resumed [ 2870.667760][T20085] Process accounting resumed 15:04:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ip6erspan0\x00', &(0x7f0000000080)=@ethtool_link_settings={0x0, 0x7, 0x5, 0x9, 0x10001, 0x3, 0x7ff, 0x166, 0x6, 0xd0c, [0x7, 0x72b, 0x5, 0x8001, 0x7fffffff, 0x200, 0x2, 0x401], [0x7f, 0x5841, 0x9, 0x6, 0x0, 0x1, 0x7]}}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0xffffff7f00000000}, 0x0) 15:04:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:23 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[], 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x2}, 0x0) 15:04:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x84, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="64644f36a3b9506f7d663e9a8f90aaa37a4bf98f4434538578d59765babb2f3549f279db02d504d5db47b6b4f5750588b72556a15255ac1f5c025ccff9f2b8153830894a160b6e995f44e503486814e396bd6178fa39a73e3a51fb0c58daa1e2fba1cf3f158d", 0x66, 0x5}], 0x100000, &(0x7f0000000240)={[{@numtail='nonumtail=0'}, {@numtail='nonumtail=0'}, {@utf8no='utf8=0'}, {@utf8='utf8=1'}, {@utf8no='utf8=0'}], [{@pcr={'pcr', 0x3d, 0x3a}}]}) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[], 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x4}, 0x0) 15:04:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[], 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:24 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400600) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x3f00}, 0x0) 15:04:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) r4 = getuid() ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000080)={0x3, @bcast, r4}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x4000}, 0x0) 15:04:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:25 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x100, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x40000) pause() bind$rds(r2, &(0x7f00000001c0)={0x2, 0x4e22, @multicast2}, 0x10) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x34000}, 0x0) 15:04:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x400300}, 0x0) 15:04:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:04:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:26 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x1000000}, 0x0) 15:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/619], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:04:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 15:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e8000000000000000000002000545241434500"/619], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 15:04:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$alg(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000000c0)="2053cd5409f28b87c2f402b2046a7e57dc2645fe61d7d9a944fa1856dca530ccfa08d777a1b50ef4b723dfda60be9cbcd01bbae2651ffef3c2830e01c50f6719d68eccebef201326bd050292457d4fc864b9f4e369f3e5328dffa7c0426dbedb69eda4ff90937960a9091f13b8c0424f069d8e3d3a4cd2b129fe740fa8556481a21c7cff5bd475909e182cc252b24c99686d5ae6276814b01df238ce4a3471c7f0ed6cb6cf894177d8124508755262ef8641409876b32a701fcb62e07fd4a5e8cd119c9ec4fcde9144ffc4da3c19300b93706d672d5fdf13a2e2cb049e7512f8781e4c5ba0ff609b28", 0xe9}, {&(0x7f0000000240)="de3c8ff2ce54301f500d71673344635792e66c265b45a158a8ae2e973923f4fa32339b008d9b9ec6e44e27df0c3bca9a18bf26ae8c2519bfda63acde7f2041cf0ad11b3654b22e2d18f40abb1314263baa59b054d1094b432c7b2a6d8d21c8f4040e787cfc6d4c2d64ea5aba65f757fe9e9d58f0ab605bc3227e804e8b5d74a9928950eb8c3803578540c31e82245b9ead3fe87b7bc1ffe7e0ca7720d05c9ac268186448c4ac6588d0e8a4e0500b2d91ec35db5d191bd71632f4e2b93334d7b60dac7a80766a1737dd706d872eac25faa8ecbe6cdd3efda7a6", 0xd9}, {&(0x7f0000000340)="b86b3824d7cbef2343f74c858d3bffdfc531f51e9360badc540982f669c43d6b3fca77ee2323e76ebad2a21999d6b0f8abfbf43bfb4cbf68207287aae735b0c2bd9eacf7510273652fb774fdbaff6e3aad745790d07e6ff7864e31f128bafae1e3c34c4475bc25348a08135379435478bdffadaef659f4124c4d64aba4d9c4a31758b9295a3a4f9191da7b56b87446d0fa49ba6cff5af799cfcac15620ef711daf68aa5b691df434", 0xa8}, {&(0x7f0000000400)="bc9afc28c548a4b4504ec3554bf463b0a50c93357b4261febb5d4afbb99635a46406debd39a3df5d5fd2cf313bd7919855a9e30e61e6539d730f3cfd40170dfe400918266fb8daf41924cc88e46d1b6aa7cb57d017904dbfddbbeb3bc40a6c", 0x5f}, {&(0x7f0000000480)="78d45ba72c7be17a3c4d9140c0f6a75a02cb9df7f2f448d0e0fa2349aff0a95f7e745b5d7898c12294ebd85b268871a2db4d890bf003698d5e3c45a9610afe5e11a5cf8e207f2ccbf6eb4077cc5539fa9991b339724f94aa00890267f4b55f5008ce9cc4aec7eab988b59e53d764b352d9df7c60ded88bea854bc2667d6cb5b91540f8e87aaf4c10c660aad733322405e60b7ff3ee44ed9f9b5b84346d91a5a547cf7e587902c21b8fcb805a30b0392047daa7e58a73bf226af9a9fd2291c999174e488f689da9150e9ecdc3e279d0e0314b4a5b6bd3626e4a4b2ea823befc40039e74583e513b10672da8a173d121bf8a66b2cc", 0xf4}, {&(0x7f0000000580)="a274b7151c7072efe88e75533becec6d1ca366b78509545c026b98a4b741eee3f9de85123ea549c78ffee31ca82583e17dac3e133f21c5239e4137a88f352ea56e9d146243725e66e210637b3530ebab554bca1a84a608b12090ba5d3bc64457f7bb1a2e38c351e274f97857e52e90e3f465ddde0ceaeb1f238e730d673b9deb0ea1f76f70f5f0", 0x87}, {&(0x7f00000001c0)="d28a77", 0x3}, {&(0x7f0000000640)="d8a9ed6c35ed2754ea6ad8fe979572014f832c8f624b31ed247321b9f44b7f146c0e92e2d3655eba609f29b241a4be787f40c455896d84297d74c097a692396a18177c46f662ce35a25ebb66a04992f8e3649f30a83f3831452601459416d7d2bd66e31af96a7adfecb1204edc0299ba58059c4499002f6b1de74faf56817ed24af7c0ab79cd157f831d09b7b53aa849b7185dfced296e5b3abfa43b8315a1c0b22b1a5ca3d6fbf2ab9e5fca6f4598921d7bed56213d62cf3bc5b0f082844f5372f781827dad1a29bdb328f4c9f50ea6979110", 0xd3}, {&(0x7f0000000740)="defc29f5eb6189b6a7be94454d5aee2f6babe540976f49d97761c3ef88278dfc934a9d98e9d18600fdbf7ffa7a5296f96793d9d78cdd7b7abda83214ef97cd40eb86668f3a661e16c13ef83ac4a35bb8842b86b5265a2b43df2915f511fad788c5afc22e3cee61098f770034de172ded21d6035df021767f1e23ef64d9e2c46317884be257a3e15095a2bf430f7763db633e1851a6f534d804776e18ea18878a101f27bb2f79c7dec5b54a2486f6754a3a50b3f78f353ac940a13c44a1bdce0a96af96d165992053e3bd5756e621de66fa4e8c860a00a757770f0bfe59c28061d33bf64912b808c181a9f94b238ec9f25f2159a1777d1e060bf2c82a0c9ef2", 0xff}, {&(0x7f0000000840)="b833", 0x2}], 0xa, &(0x7f0000000940)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x800}, 0x41) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) shutdown(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0xfdef) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) truncate(&(0x7f0000000040)='./file0\x00', 0x4) 15:04:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x2000000}, 0x0) 15:04:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/619], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:27 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:04:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x4000000}, 0x0) 15:04:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/722], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) sendmsg$sock(r2, &(0x7f0000000380)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="95ccbbf40e0202c8485320328bd5407907b5a66c5c945dbdc5f55f49a43c53c20e672613f4fc2e733dd5f10c1620ec752c626db9f91268fc67ad9af925fe0c", 0x3f}, {&(0x7f0000000140)="27d38ef2d31de4c2a8e83e363ca42afef49e19f7a34f0c1eebabdad5e867759053f7cdddd00fd0ecb701f223e1ee385351e426ebd371c295c887b23a0a9a41b3ed708600fabe7ee64470bf506e711d855744f50e7a0f64f974b8c4738f35c8733359b8b88a98209c40380e513806e2b34bc622f7868f60179840748ecc9f167f2a3475ef18532cfa41bfed1798efbba27cdaae9690bd8ff95e7c09a951cdfe9cd856ea88d6866b08701f1fc1eabc9e88ff1a44a8fa35c04d3796a00d", 0xbc}, {&(0x7f0000000240)="44384cccb775fa62fc2aa1990993cc852d5fd96ffb582306ab235bf73cc5c3fe56081863de16db6bdf1f1cfccc311cb71d0dbda404d2b5731cd21a020281762cd42101fe476d572cd259803abc6e55e5001eebc31719611a780d46812807c2a427be7399934a3a4874b1c48266b363e23338850cbc749d4fbb721d902c89ff05f991491feb8f2f2947c14e3dd99436de20dc036597fbd2474396079efc3ecf7aadfd5778d426a7fd85d07715b59406b5e79623bd929a4ffb37", 0xb9}, {&(0x7f0000000300)="65f5195678560a0a316eea6ac456b1911b8400781bf6984d6007a0", 0x1b}], 0x4}, 0x20000000) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000440)='TRUE', 0x4, 0x1) 15:04:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:04:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x3f000000}, 0x0) 15:04:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/722], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000180)='./file0/bus\x00', 0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000080)={0x1}) 15:04:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x40000000}, 0x0) 15:04:28 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 15:04:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0xffffff7f}, 0x0) 15:04:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x800, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r3 = getgid() write$FUSE_CREATE_OPEN(r1, &(0x7f0000000240)={0xa0, 0x0, 0x3, {{0x4, 0x0, 0x3c2b4548, 0xffffffffffffffff, 0x9, 0x9, {0x0, 0x80000000, 0xd424, 0x80, 0x5, 0x89, 0x200, 0x0, 0x923f, 0x4a, 0x1, r2, r3, 0x1000, 0x1}}}}, 0xa0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/722], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/774], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)={0x3, 0xff}) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x40030000000000}, 0x0) 15:04:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\xff\xff\xfd\xfd\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 15:04:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/774], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:29 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x100000000000000}, 0x0) 15:04:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x9) getpeername$netrom(r2, &(0x7f0000000080)={{0x3, @netrom}, [@null, @default, @null, @remote, @default, @netrom, @null, @rose]}, &(0x7f0000000100)=0x48) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/774], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 15:04:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/800], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\xfd\xfd\xff\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x200000000000000}, 0x0) 15:04:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 15:04:29 executing program 5: syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000080)=""/155, 0x9b, 0x20, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x2000400) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/800], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:30 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x400000000000000}, 0x0) 15:04:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:04:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/800], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:04:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/813], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 15:04:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 15:04:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/813], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:31 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x4000000000000000}, 0x0) 15:04:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/813], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x54, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x5, 0x73, 0x0, {{0x0, 0x2}}}, 0x18) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) lstat(&(0x7f0000000080)='./file0/bus/../file0\x00', &(0x7f00000000c0)) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:04:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000300)={0x997, 0x5, 0x1, r2}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x12) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf9, 0x84200) socket$inet_tcp(0x2, 0x1, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) write$P9_RCREATE(r4, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000240)={@initdev, @multicast1}, &(0x7f0000000280)=0x8) io_getevents(r5, 0x7, 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], 0x0) 15:04:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 15:04:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) mkdir(&(0x7f0000000080)='./file0/bus\x00', 0x1) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:32 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 15:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x2}, 0x0) 15:04:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000080)) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080), 0x4) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x0) 15:04:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000", 0x3f, 0x10000}], 0x0, 0x0) 15:04:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:33 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) sendmsg$alg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="3dde7d6172500b033b506e9e53158f23a8ebdcfa", 0x14}, {&(0x7f00000000c0)="64cdae893ac32c0884fd0f254f289f32ef370d", 0x13}, {&(0x7f0000000100)="5eccda8a4e03507ce992b927ced2c69ec69adafb5f2bcb74af55f4f16727765f8678a8f9cd59442ee62aa77a4295e024a28b6cfaefe52ad2b0d1d67c0e51817bb08912915b313eed61563a4fd129e19c9e29cb98d0fb48c08b7a90e4be58d077c98fc1e1a559ff6cb9d765720a5b3cacd99d92b68320e206fd5921919b431331052a984a759e71f57ef210aade6c957aa3cdf5849fc1e297774a60c71233b14bb4fc6b8bcb534acc82732cb17ce14c4946f00be0aabd5d5c3adaebd3bf4d7d1fdf9430b43236fa27034bd86bc91220904a0ba942b92156dca226fb00456a7622ee44e679662466468029a1a51132f33e", 0xf0}], 0x3, 0x0, 0x0, 0x20000000}, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 15:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000", 0x3f, 0x10000}], 0x0, 0x0) 15:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000", 0x3f, 0x10000}], 0x0, 0x0) 15:04:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x20000, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x400, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@fscache='fscache'}], [{@obj_type={'obj_type', 0x3d, 'ramfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')user'}}, {@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vboxnet0}'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@hash='hash'}]}}) 15:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 15:04:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2880.946050][T20712] 9pnet: Insufficient options for proto=fd 15:04:33 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 15:04:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f424852", 0x44, 0x10000}], 0x0, 0x0) 15:04:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) connect$packet(r2, &(0x7f0000000800)={0x11, 0x0, r3, 0x1, 0x3ff, 0x6, @dev={[], 0x16}}, 0x14) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000680)=0x100000001, 0x4) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8000, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="ae6416ae88a8a4dcbab510dad3ac0dfe02a17a41e389ccfd362466c03a6f8ce940eb9501a363b776bee986f4e61a90ebe5328095e4c6d89dd5b55758babf05a8aedac63a7a834fd009db171b4949cd4c46470ea4b0e7f8832081bb1f4206a6069f4a7ae445041d045ab3944d6fc1bbd66cfdc4b83d9dd75bb51f924f20057707aaaaa803484400ab1514e268abf5208672198c66915b7e34b6a1f842e966e7968117324c7a6bfbeadc41253e15ca365048fb699965c366c721f3ae1e4b", 0xbd, 0x1}, {&(0x7f0000000240)="9bde5765466a4834fdd116690edee116a6d18cdb108c00db4a13bb46699e1237c33a2b86e5c60723e9e670287d6a8db04ee996afe7a739aba87e39c9924a5e279e1fc9a695f7efc3105c2af1e879d9c5", 0x50, 0x5}, {&(0x7f00000001c0)="96527ba6da5847d0606c8b040f921648084ba7697b", 0x15, 0xfff}], 0x8000, &(0x7f0000000400)={[{@errors_continue='errors=continue'}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@umask={'umask', 0x3d, 0x78defe49}}, {@dmask={'dmask', 0x3d, 0x1}}, {@gid={'gid', 0x3d, r4}}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_no='case_sensitive=no'}, {@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsname={'fsname', 0x3d, 'keyringeth1'}}, {@smackfsroot={'smackfsroot', 0x3d, '@cgroupcgroup\xf3'}}, {@audit='audit'}, {@uid_eq={'uid', 0x3d, r5}}, {@hash='hash'}]}) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r6 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r6, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r6, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$packet_buf(r6, 0x107, 0x16, &(0x7f0000000540)=""/217, &(0x7f0000000640)=0xd9) 15:04:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2881.561928][T20738] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x1) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f424852", 0x44, 0x10000}], 0x0, 0x0) 15:04:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2881.616681][T20738] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 15:04:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 15:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 2881.736509][T20738] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfsro. 15:04:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:34 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f424852", 0x44, 0x10000}], 0x0, 0x0) 15:04:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r5 = geteuid() mount$fuse(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)='fuse\x00', 0x100000, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r3, @ANYBLOB, @ANYRESDEC=r4, @ANYBLOB=',max_read=0x0000000000000003,blksize=0x0000000000000a00,blksize=0x0000000000001c00,fscontext=staff_u,audit,func=CREDS_CHECK,seclabel,appraise_type=imasig,defcontext=root,uid=', @ANYRESDEC=r5, @ANYBLOB="2c66736d616769633d3078303030303030103030303030303030302c00"]) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x3) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x50, 0x0) r6 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r6, 0x7, &(0x7f0000027000)={0x4}) write$P9_RCREATE(r6, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 15:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 15:04:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 15:04:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="32c54a849edb9aff783b867db105fd8542c5ba78a3692f14b9a4371966f473e85541bce0eacbcb575aace091ec8c7bee6e8fd6a03b25014847c1c28621c219ef2c82cfa64d6b773eea863e314f042b7f1380a8a09465eb54dacf07a233936274e480f4235559a6a66f4d68106dc48b68d302566ebcbba6930706e1c35ff5101583d75ff61f2eb2d4bd1523db4df8632f8be17cc70baca1ee40", 0x99}], 0x1, 0x0) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @null, @bcast, @null]}) 15:04:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 15:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, 0x0, 0x0) 15:04:35 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000200"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, 0x0, 0x0) 15:04:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 15:04:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002540)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f00000001c0)='ramfs\x00'}, 0x30) fcntl$lock(r3, 0x7, &(0x7f00000025c0)={0x3, 0x3, 0x0, 0x0, r4}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) ioctl$SIOCNRDECOBS(r2, 0x89e2) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) readv(r0, &(0x7f00000024c0)=[{&(0x7f0000000080)=""/88, 0x58}, {&(0x7f0000000100)=""/145, 0x91}, {&(0x7f0000000240)=""/114, 0x72}, {&(0x7f00000002c0)=""/199, 0xc7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/255, 0xff}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x7) 15:04:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 15:04:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, 0x0, 0x0) 15:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 15:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 15:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100), 0x1c) 15:04:36 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000300"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 15:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100), 0x1c) 15:04:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) fchmod(r1, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0/bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)='fuse\x00', 0x8000, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0xffffffff}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@obj_role={'obj_role'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@obj_user={'obj_user', 0x3d, 'ramfs\x00'}}, {@context={'context', 0x3d, 'user_u'}}]}}) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 15:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:36 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000400"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e802000030010000300100003001000000000000000000001802000018020000180200001802000018020000030000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000007465716c30000000000000000000000069666230ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0003001000000000000000000000000000000000000000000000000680043540000000000d004000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000006c6f0000000000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800e80000000000000000000020005452414345000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) bind$inet6(r1, &(0x7f0000000100), 0x1c) 15:04:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 15:04:36 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x51, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) sync() ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) timer_settime(0x0, 0x0, 0x0, 0x0) 15:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 15:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 15:04:37 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000080)='./file0/bus\x00', 0xfffffffffffffffd) 15:04:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.sched_load_balance\x00\x88\xcc\x1e\x93\xb76L:`\xc5r\x1f\xf0\xcb\xdc(gC\x9f4\xc6\x97\xbf\x8eA\x14\x1f\xfd\n\xaa\x84\xca\xb7\xaa\xabI\xae\xb1]\x84\xc8g\x1f\xf8zNj\xb9ZgUG\x026\a\x82\x81\xdb\x14\x98\xb1\x1dZ@n\x013tU\xd3\xc4\xec\x91\x1a\x99\xa8\xbaI\xd5\xab\f\t}\x85\x03Y\x1a\xe8\xdbV\xb7\x04\x19Y\xb2\xd8\xedID\xca\x82\xf2A\xf9\x83\xca\x13\x9dvwH\x1a\x1d)l\xf0\x1e\xfd+\x05A\x9e:\xb6\xb0d\xe1Gv', 0x2, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x207) write$cgroup_int(r2, &(0x7f00000003c0), 0x12) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0xc, 0x800, 0xffff}, &(0x7f0000000580)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x2}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r4, r0, 0x0, 0x7, &(0x7f0000000380)='[#ppp1\x00', r5}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000000c0)=r6) socket$kcm(0x29, 0x2, 0x0) getpid() bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000780)=ANY=[@ANYBLOB]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:04:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48}], 0x0, 0x0) 15:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 15:04:37 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000600"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 15:04:37 executing program 5: 15:04:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48}], 0x0, 0x0) 15:04:37 executing program 2: 15:04:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:37 executing program 2: 15:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 15:04:37 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:37 executing program 5: 15:04:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48}], 0x0, 0x0) 15:04:37 executing program 2: 15:04:37 executing program 5: 15:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 15:04:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:37 executing program 2: 15:04:37 executing program 5: 15:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 15:04:38 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:38 executing program 2: 15:04:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:38 executing program 4: 15:04:38 executing program 5: 15:04:38 executing program 4: 15:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 15:04:38 executing program 5: 15:04:38 executing program 2: 15:04:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:38 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:38 executing program 4: 15:04:38 executing program 5: 15:04:38 executing program 2: 15:04:38 executing program 4: 15:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 15:04:38 executing program 5: 15:04:38 executing program 2: 15:04:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:38 executing program 4: 15:04:38 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:38 executing program 5: 15:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:38 executing program 2: 15:04:38 executing program 5: 15:04:38 executing program 4: 15:04:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:38 executing program 4: 15:04:38 executing program 2: 15:04:38 executing program 5: 15:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:39 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000e00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:39 executing program 4: 15:04:39 executing program 5: 15:04:39 executing program 2: 15:04:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:39 executing program 5: 15:04:39 executing program 4: 15:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:39 executing program 2: 15:04:39 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:39 executing program 5: 15:04:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:39 executing program 2: 15:04:39 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) seccomp(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x10200000006}]}) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 15:04:39 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x1000000000000100) 15:04:39 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000fc00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:39 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:39 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000440)) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 15:04:39 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:40 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000f40100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000340)='./control\x00', 0x0) open(&(0x7f00000000c0)='./control/file1\x00', 0x18440, 0x0) creat(&(0x7f0000000380)='./control/file1\x00', 0x0) [ 2887.559753][ T24] audit: type=1326 audit(1564499080.018:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21289 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 [ 2887.719092][ T24] audit: type=1804 audit(1564499080.178:1041): pid=21335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796890324/syzkaller.q9UWcA/4627/file0/control/file1" dev="ramfs" ino=477774 res=1 15:04:40 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:40 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:40 executing program 5: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:40 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000180200"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2887.993860][ T24] audit: type=1326 audit(1564499080.458:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21289 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 15:04:40 executing program 4: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:40 executing program 4: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:40 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000400200"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:40 executing program 4: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:41 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000007fffffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:41 executing program 4: memfd_create(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:41 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000300"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:41 executing program 5: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:41 executing program 4: memfd_create(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:41 executing program 4: memfd_create(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:41 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 15:04:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:42 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000007fffffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:42 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 15:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:42 executing program 5: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:42 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000e80300"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:42 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 15:04:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:42 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 15:04:42 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fstatfs(r3, &(0x7f0000000080)=""/134) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:43 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 15:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:43 executing program 5: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000300"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:43 executing program 4: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 15:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:43 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000f0ffffff7f"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fstatfs(r3, &(0x7f0000000080)=""/134) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:43 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000600"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fstatfs(r3, &(0x7f0000000080)=""/134) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:44 executing program 5: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0xfff, 0x2, 0x101, 0x25, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r4, 0xbdf}, &(0x7f0000000140)=0x8) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) write$P9_RCREATE(r3, &(0x7f0000000000)={0x18}, 0xfdef) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) 15:04:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:44 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:44 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000ffffff8d00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:44 executing program 5 (fault-call:1 fault-nth:0): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x0) 15:04:44 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2892.566231][T21642] FAULT_INJECTION: forcing a failure. [ 2892.566231][T21642] name failslab, interval 1, probability 0, space 0, times 0 [ 2892.584849][T21642] CPU: 1 PID: 21642 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2892.592943][T21642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2892.603008][T21642] Call Trace: [ 2892.606327][T21642] dump_stack+0x172/0x1f0 [ 2892.611144][T21642] should_fail.cold+0xa/0x15 [ 2892.615784][T21642] ? fault_create_debugfs_attr+0x180/0x180 [ 2892.621607][T21642] ? page_to_nid.part.0+0x20/0x20 [ 2892.626733][T21642] ? ___might_sleep+0x163/0x280 [ 2892.631602][T21642] __should_failslab+0x121/0x190 [ 2892.636561][T21642] should_failslab+0x9/0x14 [ 2892.641279][T21642] kmem_cache_alloc+0x2aa/0x710 [ 2892.646227][T21642] ? memset+0x32/0x40 [ 2892.650347][T21642] mpol_new+0x122/0x2d0 [ 2892.654516][T21642] kernel_mbind+0x2de/0xd90 [ 2892.659141][T21642] ? wait_for_completion+0x440/0x440 [ 2892.664535][T21642] ? __mpol_equal+0x370/0x370 [ 2892.664550][T21642] ? ksys_write+0x1cf/0x290 [ 2892.664563][T21642] ? __ia32_sys_read+0xb0/0xb0 [ 2892.664579][T21642] ? switch_fpu_return+0x1fa/0x4f0 [ 2892.664596][T21642] __x64_sys_mbind+0xe1/0x1a0 [ 2892.664615][T21642] do_syscall_64+0xfd/0x6a0 [ 2892.664631][T21642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2892.664643][T21642] RIP: 0033:0x459829 [ 2892.664665][T21642] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2892.683971][T21642] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2892.683986][T21642] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2892.683994][T21642] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2892.684002][T21642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2892.684010][T21642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2892.684017][T21642] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 15:04:45 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x2) 15:04:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:45 executing program 5 (fault-call:1 fault-nth:1): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2892.935779][T21663] FAULT_INJECTION: forcing a failure. [ 2892.935779][T21663] name failslab, interval 1, probability 0, space 0, times 0 [ 2892.952609][T21663] CPU: 1 PID: 21663 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2892.960625][T21663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2892.970706][T21663] Call Trace: [ 2892.974087][T21663] dump_stack+0x172/0x1f0 [ 2892.978450][T21663] should_fail.cold+0xa/0x15 [ 2892.983068][T21663] ? fault_create_debugfs_attr+0x180/0x180 [ 2892.988989][T21663] ? page_to_nid.part.0+0x20/0x20 [ 2892.994028][T21663] ? ___might_sleep+0x163/0x280 [ 2892.999355][T21663] __should_failslab+0x121/0x190 [ 2893.004319][T21663] should_failslab+0x9/0x14 [ 2893.008846][T21663] kmem_cache_alloc+0x2aa/0x710 [ 2893.013725][T21663] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2893.019474][T21663] ? vma_merge+0x4ac/0xe60 [ 2893.024084][T21663] ? __kasan_check_read+0x11/0x20 [ 2893.029128][T21663] vm_area_dup+0x21/0x170 [ 2893.034168][T21663] __split_vma+0xab/0x560 [ 2893.038509][T21663] ? vmacache_find+0x65/0x310 [ 2893.043399][T21663] split_vma+0xa6/0xf0 [ 2893.047516][T21663] kernel_mbind+0x9e5/0xd90 [ 2893.052143][T21663] ? wait_for_completion+0x440/0x440 [ 2893.057552][T21663] ? __mpol_equal+0x370/0x370 [ 2893.062468][T21663] ? ksys_write+0x1cf/0x290 [ 2893.066991][T21663] ? __ia32_sys_read+0xb0/0xb0 [ 2893.071792][T21663] __x64_sys_mbind+0xe1/0x1a0 [ 2893.076495][T21663] do_syscall_64+0xfd/0x6a0 [ 2893.076512][T21663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2893.076523][T21663] RIP: 0033:0x459829 [ 2893.076538][T21663] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2893.076545][T21663] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2893.076559][T21663] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2893.076566][T21663] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 15:04:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:45 executing program 5 (fault-call:1 fault-nth:2): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2893.076573][T21663] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2893.076580][T21663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2893.076587][T21663] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 15:04:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2893.185669][T21681] FAULT_INJECTION: forcing a failure. [ 2893.185669][T21681] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.316444][T21681] CPU: 1 PID: 21681 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2893.324557][T21681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2893.334724][T21681] Call Trace: [ 2893.338116][T21681] dump_stack+0x172/0x1f0 [ 2893.342789][T21681] should_fail.cold+0xa/0x15 [ 2893.347580][T21681] ? percpu_ref_put_many+0x94/0x190 [ 2893.353336][T21681] ? fault_create_debugfs_attr+0x180/0x180 [ 2893.359277][T21681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2893.365660][T21681] ? lock_downgrade+0x920/0x920 [ 2893.365679][T21681] __should_failslab+0x121/0x190 [ 2893.365696][T21681] should_failslab+0x9/0x14 [ 2893.365708][T21681] kmem_cache_alloc+0x47/0x710 [ 2893.365723][T21681] ? percpu_ref_put_many+0xb6/0x190 [ 2893.365736][T21681] ? memcg_kmem_put_cache+0x3e/0x50 [ 2893.365760][T21681] anon_vma_clone+0xde/0x480 [ 2893.375940][T21681] __split_vma+0x17e/0x560 [ 2893.375962][T21681] ? vmacache_find+0x65/0x310 [ 2893.410944][T21681] split_vma+0xa6/0xf0 15:04:45 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x4) [ 2893.415042][T21681] kernel_mbind+0x9e5/0xd90 [ 2893.419570][T21681] ? wait_for_completion+0x440/0x440 [ 2893.424885][T21681] ? __mpol_equal+0x370/0x370 [ 2893.429576][T21681] ? ksys_write+0x1cf/0x290 [ 2893.434099][T21681] ? __ia32_sys_read+0xb0/0xb0 [ 2893.438891][T21681] __x64_sys_mbind+0xe1/0x1a0 [ 2893.443598][T21681] do_syscall_64+0xfd/0x6a0 [ 2893.447902][T21694] FAULT_INJECTION: forcing a failure. [ 2893.447902][T21694] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.448475][T21681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2893.467271][T21681] RIP: 0033:0x459829 [ 2893.471174][T21681] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2893.490799][T21681] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2893.499223][T21681] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2893.507380][T21681] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2893.515540][T21681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2893.523630][T21681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2893.531613][T21681] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 [ 2893.539785][T21694] CPU: 0 PID: 21694 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2893.547782][T21694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2893.557856][T21694] Call Trace: [ 2893.561165][T21694] dump_stack+0x172/0x1f0 [ 2893.565527][T21694] should_fail.cold+0xa/0x15 [ 2893.570231][T21694] ? fault_create_debugfs_attr+0x180/0x180 [ 2893.576070][T21694] ? page_to_nid.part.0+0x20/0x20 [ 2893.581135][T21694] ? ___might_sleep+0x163/0x280 [ 2893.586001][T21694] __should_failslab+0x121/0x190 [ 2893.590965][T21694] should_failslab+0x9/0x14 [ 2893.595482][T21694] __kmalloc+0x2e0/0x770 [ 2893.600008][T21694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2893.606549][T21694] ? fput_many+0x12c/0x1a0 [ 2893.611091][T21694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2893.617340][T21694] ? strnlen_user+0x1ed/0x2e0 [ 2893.622120][T21694] ? __x64_sys_memfd_create+0x13c/0x470 [ 2893.627670][T21694] __x64_sys_memfd_create+0x13c/0x470 [ 2893.633038][T21694] ? switch_fpu_return+0x1fa/0x4f0 [ 2893.638165][T21694] ? memfd_fcntl+0x1580/0x1580 [ 2893.642931][T21694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2893.648987][T21694] ? trace_hardirqs_off_caller+0x65/0x230 [ 2893.654700][T21694] ? trace_hardirqs_on+0x67/0x240 [ 2893.659736][T21694] do_syscall_64+0xfd/0x6a0 [ 2893.664235][T21694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2893.670118][T21694] RIP: 0033:0x459829 [ 2893.673997][T21694] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2893.693693][T21694] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2893.702117][T21694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 2893.710245][T21694] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 2893.718235][T21694] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2893.726633][T21694] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6b1e80f6d4 [ 2893.734724][T21694] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:46 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:46 executing program 5 (fault-call:1 fault-nth:3): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:46 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x3f00) [ 2893.887045][T21710] FAULT_INJECTION: forcing a failure. [ 2893.887045][T21710] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.904724][T21711] FAULT_INJECTION: forcing a failure. [ 2893.904724][T21711] name failslab, interval 1, probability 0, space 0, times 0 15:04:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2893.936872][T21711] CPU: 1 PID: 21711 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2893.944921][T21711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2893.955163][T21711] Call Trace: [ 2893.958473][T21711] dump_stack+0x172/0x1f0 [ 2893.962830][T21711] should_fail.cold+0xa/0x15 [ 2893.967465][T21711] ? fault_create_debugfs_attr+0x180/0x180 [ 2893.973595][T21711] ? page_to_nid.part.0+0x20/0x20 [ 2893.973612][T21711] ? ___might_sleep+0x163/0x280 [ 2893.973630][T21711] __should_failslab+0x121/0x190 [ 2893.973655][T21711] should_failslab+0x9/0x14 [ 2893.988483][T21711] kmem_cache_alloc+0x2aa/0x710 [ 2893.988507][T21711] vm_area_dup+0x21/0x170 [ 2893.988529][T21711] __split_vma+0xab/0x560 [ 2894.006524][T21711] ? vmacache_find+0x65/0x310 [ 2894.011649][T21711] split_vma+0xa6/0xf0 [ 2894.015842][T21711] kernel_mbind+0xa55/0xd90 [ 2894.020441][T21711] ? wait_for_completion+0x440/0x440 [ 2894.025752][T21711] ? __mpol_equal+0x370/0x370 [ 2894.030526][T21711] ? ksys_write+0x1cf/0x290 15:04:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) [ 2894.035155][T21711] ? __ia32_sys_read+0xb0/0xb0 [ 2894.039931][T21711] ? switch_fpu_return+0x1fa/0x4f0 [ 2894.045125][T21711] __x64_sys_mbind+0xe1/0x1a0 [ 2894.049828][T21711] do_syscall_64+0xfd/0x6a0 [ 2894.054345][T21711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.060244][T21711] RIP: 0033:0x459829 [ 2894.064214][T21711] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.083914][T21711] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2894.092456][T21711] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2894.100446][T21711] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2894.108432][T21711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2894.116418][T21711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2894.124419][T21711] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 [ 2894.132438][T21710] CPU: 0 PID: 21710 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2894.140427][T21710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2894.150667][T21710] Call Trace: [ 2894.153980][T21710] dump_stack+0x172/0x1f0 [ 2894.158334][T21710] should_fail.cold+0xa/0x15 [ 2894.162942][T21710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.169040][T21710] ? fault_create_debugfs_attr+0x180/0x180 [ 2894.174873][T21710] ? page_to_nid.part.0+0x20/0x20 [ 2894.179921][T21710] ? ___might_sleep+0x163/0x280 [ 2894.185154][T21710] __should_failslab+0x121/0x190 [ 2894.190223][T21710] ? shmem_destroy_inode+0x80/0x80 [ 2894.195352][T21710] should_failslab+0x9/0x14 [ 2894.199864][T21710] kmem_cache_alloc+0x2aa/0x710 [ 2894.204829][T21710] ? __alloc_fd+0x487/0x620 [ 2894.204843][T21710] ? __kasan_check_read+0x11/0x20 [ 2894.204858][T21710] ? shmem_destroy_inode+0x80/0x80 [ 2894.204869][T21710] shmem_alloc_inode+0x1c/0x50 [ 2894.204884][T21710] alloc_inode+0x68/0x1e0 [ 2894.204897][T21710] new_inode_pseudo+0x19/0xf0 [ 2894.204917][T21710] new_inode+0x1f/0x40 [ 2894.237797][T21710] shmem_get_inode+0x84/0x7e0 [ 2894.242608][T21710] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2894.244283][T21732] FAULT_INJECTION: forcing a failure. [ 2894.244283][T21732] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.248182][T21710] shmem_file_setup+0x66/0x90 [ 2894.248202][T21710] __x64_sys_memfd_create+0x2a2/0x470 [ 2894.248227][T21710] ? memfd_fcntl+0x1580/0x1580 [ 2894.276890][T21710] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2894.283446][T21710] ? trace_hardirqs_off_caller+0x65/0x230 [ 2894.289363][T21710] ? trace_hardirqs_on+0x67/0x240 [ 2894.294502][T21710] do_syscall_64+0xfd/0x6a0 [ 2894.299050][T21710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.305157][T21710] RIP: 0033:0x459829 [ 2894.309057][T21710] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.328932][T21710] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 15:04:46 executing program 5 (fault-call:1 fault-nth:4): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) [ 2894.337361][T21710] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 2894.345612][T21710] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 2894.353610][T21710] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2894.361606][T21710] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6b1e80f6d4 [ 2894.370893][T21710] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2894.379055][T21732] CPU: 1 PID: 21732 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 15:04:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:46 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2894.387064][T21732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2894.397231][T21732] Call Trace: [ 2894.400539][T21732] dump_stack+0x172/0x1f0 [ 2894.405176][T21732] should_fail.cold+0xa/0x15 [ 2894.409793][T21732] ? percpu_ref_put_many+0x94/0x190 [ 2894.415015][T21732] ? fault_create_debugfs_attr+0x180/0x180 [ 2894.420976][T21732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2894.427235][T21732] ? lock_downgrade+0x920/0x920 [ 2894.432102][T21732] __should_failslab+0x121/0x190 [ 2894.437148][T21732] should_failslab+0x9/0x14 [ 2894.441666][T21732] kmem_cache_alloc+0x47/0x710 [ 2894.446441][T21732] ? percpu_ref_put_many+0xb6/0x190 [ 2894.451649][T21732] ? memcg_kmem_put_cache+0x3e/0x50 [ 2894.456865][T21732] anon_vma_clone+0xde/0x480 [ 2894.457009][T21735] FAULT_INJECTION: forcing a failure. [ 2894.457009][T21735] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.461474][T21732] __split_vma+0x17e/0x560 [ 2894.461488][T21732] ? vmacache_find+0x65/0x310 [ 2894.461501][T21732] split_vma+0xa6/0xf0 [ 2894.461520][T21732] kernel_mbind+0xa55/0xd90 [ 2894.461544][T21732] ? wait_for_completion+0x440/0x440 [ 2894.497025][T21732] ? __mpol_equal+0x370/0x370 [ 2894.501717][T21732] ? ksys_write+0x1cf/0x290 [ 2894.506238][T21732] ? __ia32_sys_read+0xb0/0xb0 [ 2894.511019][T21732] ? switch_fpu_return+0x1fa/0x4f0 [ 2894.516181][T21732] __x64_sys_mbind+0xe1/0x1a0 [ 2894.520884][T21732] do_syscall_64+0xfd/0x6a0 [ 2894.525404][T21732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.531589][T21732] RIP: 0033:0x459829 [ 2894.535497][T21732] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.555113][T21732] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2894.563813][T21732] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2894.571794][T21732] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2894.579773][T21732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2894.587939][T21732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2894.596023][T21732] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 [ 2894.605875][T21735] CPU: 1 PID: 21735 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2894.613881][T21735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2894.623941][T21735] Call Trace: [ 2894.623971][T21735] dump_stack+0x172/0x1f0 [ 2894.623989][T21735] should_fail.cold+0xa/0x15 15:04:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2894.624005][T21735] ? fault_create_debugfs_attr+0x180/0x180 [ 2894.624022][T21735] ? page_to_nid.part.0+0x20/0x20 [ 2894.624039][T21735] ? ___might_sleep+0x163/0x280 [ 2894.624065][T21735] __should_failslab+0x121/0x190 [ 2894.657904][T21735] should_failslab+0x9/0x14 [ 2894.657921][T21735] kmem_cache_alloc+0x2aa/0x710 [ 2894.657945][T21735] ? lock_acquire+0x190/0x410 [ 2894.671986][T21735] ? current_time+0x6b/0x140 [ 2894.676596][T21735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2894.682857][T21735] ? timespec64_trunc+0xf0/0x180 [ 2894.687892][T21735] __d_alloc+0x2e/0x8c0 [ 2894.692120][T21735] d_alloc_pseudo+0x1e/0x70 [ 2894.696637][T21735] alloc_file_pseudo+0xe2/0x280 [ 2894.701525][T21735] ? alloc_file+0x4d0/0x4d0 [ 2894.706043][T21735] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2894.706067][T21735] __shmem_file_setup.part.0+0x108/0x2b0 [ 2894.706094][T21735] shmem_file_setup+0x66/0x90 [ 2894.717970][T21735] __x64_sys_memfd_create+0x2a2/0x470 [ 2894.717987][T21735] ? memfd_fcntl+0x1580/0x1580 [ 2894.718009][T21735] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2894.739028][T21735] ? trace_hardirqs_off_caller+0x65/0x230 [ 2894.744788][T21735] ? trace_hardirqs_on+0x67/0x240 [ 2894.749857][T21735] do_syscall_64+0xfd/0x6a0 [ 2894.754468][T21735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.760560][T21735] RIP: 0033:0x459829 [ 2894.764488][T21735] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.784646][T21735] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2894.793107][T21735] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 2894.801231][T21735] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 2894.809238][T21735] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2894.817337][T21735] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6b1e80f6d4 [ 2894.825492][T21735] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:47 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000e00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:47 executing program 5 (fault-call:1 fault-nth:5): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x4000) 15:04:47 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2894.987526][T21759] FAULT_INJECTION: forcing a failure. [ 2894.987526][T21759] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.026564][T21763] FAULT_INJECTION: forcing a failure. [ 2895.026564][T21763] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.030137][T21759] CPU: 0 PID: 21759 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2895.047166][T21759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2895.057520][T21759] Call Trace: [ 2895.060826][T21759] dump_stack+0x172/0x1f0 [ 2895.065264][T21759] should_fail.cold+0xa/0x15 [ 2895.069871][T21759] ? fault_create_debugfs_attr+0x180/0x180 [ 2895.075692][T21759] ? page_to_nid.part.0+0x20/0x20 [ 2895.081175][T21759] ? ___might_sleep+0x163/0x280 [ 2895.086037][T21759] __should_failslab+0x121/0x190 [ 2895.090994][T21759] should_failslab+0x9/0x14 [ 2895.095506][T21759] kmem_cache_alloc+0x2aa/0x710 [ 2895.100377][T21759] __mpol_dup+0x7b/0x390 [ 2895.104719][T21759] ? mempolicy_nodemask_intersects+0x180/0x180 [ 2895.110882][T21759] ? split_vma+0xae/0xf0 [ 2895.115139][T21759] kernel_mbind+0x689/0xd90 [ 2895.119649][T21759] ? wait_for_completion+0x440/0x440 [ 2895.124946][T21759] ? __mpol_equal+0x370/0x370 [ 2895.129629][T21759] ? ksys_write+0x1cf/0x290 [ 2895.134661][T21759] ? __ia32_sys_read+0xb0/0xb0 [ 2895.139453][T21759] ? switch_fpu_return+0x1fa/0x4f0 [ 2895.144623][T21759] __x64_sys_mbind+0xe1/0x1a0 [ 2895.149308][T21759] do_syscall_64+0xfd/0x6a0 [ 2895.153817][T21759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2895.159706][T21759] RIP: 0033:0x459829 [ 2895.163626][T21759] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2895.183672][T21759] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2895.192184][T21759] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 [ 2895.200169][T21759] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2895.208231][T21759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2895.216203][T21759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2895.224178][T21759] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 15:04:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r0, &(0x7f0000000080)=""/134) 15:04:47 executing program 5 (fault-call:1 fault-nth:6): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) [ 2895.232179][T21763] CPU: 1 PID: 21763 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2895.240177][T21763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2895.250262][T21763] Call Trace: [ 2895.253574][T21763] dump_stack+0x172/0x1f0 [ 2895.257914][T21763] should_fail.cold+0xa/0x15 [ 2895.262518][T21763] ? __kasan_check_read+0x11/0x20 [ 2895.267565][T21763] ? fault_create_debugfs_attr+0x180/0x180 [ 2895.273473][T21763] ? page_to_nid.part.0+0x20/0x20 [ 2895.278509][T21763] ? ___might_sleep+0x163/0x280 [ 2895.283546][T21763] __should_failslab+0x121/0x190 [ 2895.288733][T21763] should_failslab+0x9/0x14 [ 2895.293581][T21763] kmem_cache_alloc+0x2aa/0x710 [ 2895.298792][T21763] ? rwlock_bug.part.0+0x90/0x90 [ 2895.303741][T21763] ? __d_instantiate+0x82/0x470 [ 2895.308603][T21763] ? lock_downgrade+0x920/0x920 [ 2895.313475][T21763] __alloc_file+0x27/0x340 [ 2895.317905][T21763] alloc_empty_file+0x72/0x170 [ 2895.322694][T21763] alloc_file+0x5e/0x4d0 [ 2895.326970][T21763] alloc_file_pseudo+0x189/0x280 [ 2895.332136][T21763] ? alloc_file+0x4d0/0x4d0 [ 2895.336633][T21763] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2895.342871][T21763] __shmem_file_setup.part.0+0x108/0x2b0 [ 2895.348500][T21763] shmem_file_setup+0x66/0x90 [ 2895.353173][T21763] __x64_sys_memfd_create+0x2a2/0x470 [ 2895.358538][T21763] ? memfd_fcntl+0x1580/0x1580 [ 2895.363320][T21763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2895.369394][T21763] ? trace_hardirqs_off_caller+0x65/0x230 [ 2895.375157][T21763] ? trace_hardirqs_on+0x67/0x240 [ 2895.380203][T21763] do_syscall_64+0xfd/0x6a0 [ 2895.387479][T21763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2895.393365][T21763] RIP: 0033:0x459829 [ 2895.397346][T21763] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2895.417317][T21763] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2895.425741][T21763] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 15:04:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2895.435813][T21763] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 2895.443799][T21763] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2895.451864][T21763] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6b1e80f6d4 [ 2895.459816][T21763] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2895.471925][T21772] FAULT_INJECTION: forcing a failure. [ 2895.471925][T21772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2895.489394][T21772] CPU: 0 PID: 21772 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #89 [ 2895.497394][T21772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2895.507451][T21772] Call Trace: [ 2895.507482][T21772] dump_stack+0x172/0x1f0 [ 2895.507505][T21772] should_fail.cold+0xa/0x15 [ 2895.507535][T21772] ? fault_create_debugfs_attr+0x180/0x180 [ 2895.515137][T21772] ? ___might_sleep+0x163/0x280 [ 2895.515163][T21772] should_fail_alloc_page+0x50/0x60 [ 2895.525540][T21772] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2895.525556][T21772] ? validate_mm+0x32f/0x620 [ 2895.525570][T21772] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2895.525596][T21772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.525620][T21772] ? should_fail+0x1de/0x852 [ 2895.562115][T21772] ? current_cpuset_is_being_rebound+0x130/0x2f0 [ 2895.568540][T21772] ? __kasan_check_read+0x11/0x20 [ 2895.573588][T21772] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2895.580017][T21772] alloc_pages_vma+0x3c5/0x560 [ 2895.584785][T21772] new_page+0x325/0x440 [ 2895.588945][T21772] migrate_pages+0x358/0x2e20 [ 2895.593637][T21772] ? __kasan_check_write+0x14/0x20 [ 2895.598761][T21772] ? alloc_pages_vma+0x560/0x560 [ 2895.603709][T21772] kernel_mbind+0xaf1/0xd90 [ 2895.608222][T21772] ? wait_for_completion+0x440/0x440 [ 2895.613529][T21772] ? __mpol_equal+0x370/0x370 [ 2895.618225][T21772] ? ksys_write+0x1cf/0x290 [ 2895.622740][T21772] ? __ia32_sys_read+0xb0/0xb0 [ 2895.627513][T21772] ? switch_fpu_return+0x1fa/0x4f0 [ 2895.632640][T21772] __x64_sys_mbind+0xe1/0x1a0 [ 2895.637364][T21772] do_syscall_64+0xfd/0x6a0 [ 2895.641866][T21772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2895.647753][T21772] RIP: 0033:0x459829 [ 2895.647768][T21772] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2895.647775][T21772] RSP: 002b:00007fa5c8dc6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 2895.647787][T21772] RAX: ffffffffffffffda RBX: 00007fa5c8dc6c90 RCX: 0000000000459829 15:04:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r0, &(0x7f0000000080)=""/134) 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2895.647804][T21772] RDX: 0000000000000004 RSI: 0000000000c00000 RDI: 0000000020012000 [ 2895.695713][T21772] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000010000000002 [ 2895.703723][T21772] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5c8dc76d4 [ 2895.711726][T21772] R13: 00000000004c5c8d R14: 00000000004da548 R15: 0000000000000004 15:04:48 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000021800"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x34000) 15:04:48 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r0, &(0x7f0000000080)=""/134) 15:04:48 executing program 5 (fault-call:1 fault-nth:7): memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2895.961608][T21806] FAULT_INJECTION: forcing a failure. [ 2895.961608][T21806] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.016456][T21806] CPU: 1 PID: 21806 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2896.024676][T21806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2896.034764][T21806] Call Trace: [ 2896.038078][T21806] dump_stack+0x172/0x1f0 [ 2896.042435][T21806] should_fail.cold+0xa/0x15 [ 2896.047060][T21806] ? fault_create_debugfs_attr+0x180/0x180 [ 2896.052893][T21806] ? page_to_nid.part.0+0x20/0x20 [ 2896.057932][T21806] ? ___might_sleep+0x163/0x280 [ 2896.063066][T21806] __should_failslab+0x121/0x190 [ 2896.068127][T21806] should_failslab+0x9/0x14 [ 2896.072651][T21806] kmem_cache_alloc+0x2aa/0x710 [ 2896.077521][T21806] ? memcg_kmem_put_cache+0x3e/0x50 [ 2896.082750][T21806] ? kmem_cache_alloc+0x314/0x710 [ 2896.087809][T21806] security_file_alloc+0x39/0x170 [ 2896.092861][T21806] __alloc_file+0xde/0x340 [ 2896.097296][T21806] alloc_empty_file+0x72/0x170 [ 2896.102100][T21806] alloc_file+0x5e/0x4d0 [ 2896.106372][T21806] alloc_file_pseudo+0x189/0x280 [ 2896.111334][T21806] ? alloc_file+0x4d0/0x4d0 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2896.115893][T21806] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2896.122169][T21806] __shmem_file_setup.part.0+0x108/0x2b0 [ 2896.127903][T21806] shmem_file_setup+0x66/0x90 [ 2896.132600][T21806] __x64_sys_memfd_create+0x2a2/0x470 [ 2896.137992][T21806] ? memfd_fcntl+0x1580/0x1580 [ 2896.142771][T21806] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2896.148856][T21806] ? trace_hardirqs_off_caller+0x65/0x230 [ 2896.154591][T21806] ? trace_hardirqs_on+0x67/0x240 [ 2896.159641][T21806] do_syscall_64+0xfd/0x6a0 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2896.164168][T21806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2896.170515][T21806] RIP: 0033:0x459829 [ 2896.174420][T21806] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2896.194403][T21806] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2896.202922][T21806] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 15:04:48 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x400300) 15:04:48 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:48 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2896.211098][T21806] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 2896.219616][T21806] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2896.227864][T21806] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6b1e80f6d4 [ 2896.227873][T21806] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:48 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00002, 0x4, 0x0, 0x0, 0x10000000002) 15:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x1000000) 15:04:48 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:48 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:48 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0001e, 0x4, 0x0, 0x0, 0x10000000002) 15:04:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:49 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x2000000) [ 2896.650903][T21862] FAULT_INJECTION: forcing a failure. [ 2896.650903][T21862] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.666077][T21862] CPU: 1 PID: 21862 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2896.674085][T21862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2896.684171][T21862] Call Trace: [ 2896.687478][T21862] dump_stack+0x172/0x1f0 [ 2896.691922][T21862] should_fail.cold+0xa/0x15 15:04:49 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2896.696528][T21862] ? fault_create_debugfs_attr+0x180/0x180 [ 2896.702350][T21862] ? unwind_get_return_address+0x61/0xa0 [ 2896.707994][T21862] ? profile_setup.cold+0xbb/0xbb [ 2896.713032][T21862] ? ___might_sleep+0x163/0x280 [ 2896.718599][T21862] __should_failslab+0x121/0x190 [ 2896.723820][T21862] should_failslab+0x9/0x14 [ 2896.728322][T21862] __kmalloc+0x2e0/0x770 [ 2896.732583][T21862] ? mark_held_locks+0xf0/0xf0 [ 2896.737348][T21862] ? stack_trace_save+0xac/0xe0 [ 2896.742206][T21862] ? stack_trace_consume_entry+0x190/0x190 15:04:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2896.748019][T21862] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2896.753834][T21862] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2896.759559][T21862] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2896.765135][T21862] ? tomoyo_path_perm+0x1cb/0x430 [ 2896.770385][T21862] tomoyo_path_perm+0x230/0x430 [ 2896.775837][T21862] ? tomoyo_path_perm+0x1cb/0x430 [ 2896.780980][T21862] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2896.787070][T21862] ? __fget+0x35d/0x560 [ 2896.791263][T21862] ? __kasan_check_read+0x11/0x20 [ 2896.796302][T21862] ? __kasan_check_read+0x11/0x20 [ 2896.801341][T21862] ? __fget+0xa3/0x560 [ 2896.805434][T21862] ? lock_acquire+0x190/0x410 [ 2896.810128][T21862] ? do_sys_ftruncate+0x282/0x550 [ 2896.815193][T21862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.821807][T21862] tomoyo_path_truncate+0x1d/0x30 [ 2896.826858][T21862] security_path_truncate+0xf2/0x150 [ 2896.832181][T21862] do_sys_ftruncate+0x3d9/0x550 [ 2896.837060][T21862] __x64_sys_ftruncate+0x59/0x80 [ 2896.842467][T21862] do_syscall_64+0xfd/0x6a0 [ 2896.847010][T21862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2896.852907][T21862] RIP: 0033:0x4597f7 [ 2896.856805][T21862] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2896.876728][T21862] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2896.885232][T21862] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 2896.885240][T21862] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 2896.885247][T21862] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2896.885254][T21862] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2896.885260][T21862] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2896.901380][T21862] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:49 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000e02e00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:49 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc01e00, 0x4, 0x0, 0x0, 0x10000000002) 15:04:49 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x4000000) 15:04:49 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2897.217732][T21902] FAULT_INJECTION: forcing a failure. [ 2897.217732][T21902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2897.231079][T21902] CPU: 0 PID: 21902 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2897.239069][T21902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2897.249493][T21902] Call Trace: [ 2897.252823][T21902] dump_stack+0x172/0x1f0 [ 2897.257968][T21902] should_fail.cold+0xa/0x15 [ 2897.262629][T21902] ? fault_create_debugfs_attr+0x180/0x180 [ 2897.268465][T21902] ? is_bpf_text_address+0xac/0x170 [ 2897.273686][T21902] ? __kasan_check_read+0x11/0x20 [ 2897.278735][T21902] should_fail_alloc_page+0x50/0x60 [ 2897.283953][T21902] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2897.289353][T21902] ? __bpf_address_lookup+0x310/0x310 [ 2897.296329][T21902] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2897.302107][T21902] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2897.307857][T21902] ? kernel_text_address+0x73/0xf0 [ 2897.313022][T21902] ? fault_create_debugfs_attr+0x180/0x180 [ 2897.318854][T21902] cache_grow_begin+0x90/0xd20 [ 2897.323637][T21902] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2897.329643][T21902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2897.335920][T21902] __kmalloc+0x6b2/0x770 [ 2897.340181][T21902] ? mark_held_locks+0xf0/0xf0 [ 2897.344970][T21902] ? stack_trace_save+0xac/0xe0 [ 2897.350046][T21902] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2897.355785][T21902] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2897.361462][T21902] ? tomoyo_path_perm+0x1cb/0x430 [ 2897.366521][T21902] tomoyo_path_perm+0x230/0x430 [ 2897.371414][T21902] ? tomoyo_path_perm+0x1cb/0x430 [ 2897.376463][T21902] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2897.382670][T21902] ? __fget+0x35d/0x560 [ 2897.386856][T21902] ? __kasan_check_read+0x11/0x20 [ 2897.391998][T21902] ? __kasan_check_read+0x11/0x20 [ 2897.397737][T21902] ? __fget+0xa3/0x560 [ 2897.403223][T21902] ? lock_acquire+0x190/0x410 [ 2897.408114][T21902] ? do_sys_ftruncate+0x282/0x550 [ 2897.413170][T21902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.419445][T21902] tomoyo_path_truncate+0x1d/0x30 [ 2897.424592][T21902] security_path_truncate+0xf2/0x150 [ 2897.429920][T21902] do_sys_ftruncate+0x3d9/0x550 [ 2897.434794][T21902] __x64_sys_ftruncate+0x59/0x80 [ 2897.434811][T21902] do_syscall_64+0xfd/0x6a0 [ 2897.434826][T21902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2897.434837][T21902] RIP: 0033:0x4597f7 15:04:49 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc01f00, 0x4, 0x0, 0x0, 0x10000000002) 15:04:49 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:49 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2897.434853][T21902] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2897.434869][T21902] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2897.482172][T21902] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 2897.491200][T21902] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 2897.499187][T21902] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2897.507179][T21902] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 15:04:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2897.515194][T21902] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:50 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc03f00, 0x4, 0x0, 0x0, 0x10000000002) 15:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x3f000000) 15:04:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:50 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:50 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc04000, 0x4, 0x0, 0x0, 0x10000000002) 15:04:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x40000000) [ 2897.795930][T21942] FAULT_INJECTION: forcing a failure. [ 2897.795930][T21942] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.881439][T21942] CPU: 0 PID: 21942 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2897.889471][T21942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2897.899577][T21942] Call Trace: [ 2897.902914][T21942] dump_stack+0x172/0x1f0 [ 2897.907280][T21942] should_fail.cold+0xa/0x15 [ 2897.911973][T21942] ? __kasan_check_read+0x11/0x20 [ 2897.917056][T21942] ? fault_create_debugfs_attr+0x180/0x180 [ 2897.922877][T21942] ? __kasan_check_write+0x14/0x20 [ 2897.922898][T21942] ? lock_downgrade+0x920/0x920 [ 2897.922922][T21942] ? ___might_sleep+0x163/0x280 [ 2897.932891][T21942] __should_failslab+0x121/0x190 [ 2897.932908][T21942] should_failslab+0x9/0x14 [ 2897.932919][T21942] __kmalloc+0x2e0/0x770 [ 2897.932936][T21942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.932958][T21942] ? simple_dname+0xd1/0x1f0 [ 2897.962394][T21942] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2897.967781][T21942] tomoyo_encode2.part.0+0xf5/0x400 [ 2897.973521][T21942] tomoyo_encode+0x2b/0x50 15:04:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r1, &(0x7f0000000080)=""/134) 15:04:50 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8000000000000000, 0x0, 0x0, 0x10000000002) [ 2897.977949][T21942] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2897.983626][T21942] ? tomoyo_path_perm+0x1cb/0x430 [ 2897.988672][T21942] tomoyo_path_perm+0x230/0x430 [ 2897.993537][T21942] ? tomoyo_path_perm+0x1cb/0x430 [ 2897.998579][T21942] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2898.004774][T21942] ? __fget+0x35d/0x560 [ 2898.008945][T21942] ? __kasan_check_read+0x11/0x20 [ 2898.014083][T21942] ? __kasan_check_read+0x11/0x20 [ 2898.019121][T21942] ? __fget+0xa3/0x560 [ 2898.023248][T21942] ? lock_acquire+0x190/0x410 [ 2898.027941][T21942] ? do_sys_ftruncate+0x282/0x550 [ 2898.033280][T21942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2898.039537][T21942] tomoyo_path_truncate+0x1d/0x30 [ 2898.044573][T21942] security_path_truncate+0xf2/0x150 [ 2898.049886][T21942] do_sys_ftruncate+0x3d9/0x550 [ 2898.054739][T21942] __x64_sys_ftruncate+0x59/0x80 [ 2898.059685][T21942] do_syscall_64+0xfd/0x6a0 [ 2898.064648][T21942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2898.070621][T21942] RIP: 0033:0x4597f7 [ 2898.074521][T21942] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2898.094202][T21942] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2898.102629][T21942] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 2898.110819][T21942] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 2898.119153][T21942] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2898.127284][T21942] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2898.135336][T21942] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2898.157689][T21942] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:50 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000024000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:50 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x2, 0x10000000002) 15:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0xffffff7f) 15:04:50 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:50 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1e, 0x10000000002) [ 2898.366157][T21978] FAULT_INJECTION: forcing a failure. [ 2898.366157][T21978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 15:04:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) [ 2898.454992][T21978] CPU: 0 PID: 21978 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2898.463083][T21978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2898.473445][T21978] Call Trace: [ 2898.476788][T21978] dump_stack+0x172/0x1f0 [ 2898.481153][T21978] should_fail.cold+0xa/0x15 [ 2898.485885][T21978] ? fault_create_debugfs_attr+0x180/0x180 [ 2898.491718][T21978] ? ___might_sleep+0x163/0x280 [ 2898.496602][T21978] should_fail_alloc_page+0x50/0x60 15:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x40030000000000) [ 2898.501824][T21978] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2898.507305][T21978] ? ima_match_policy+0x825/0x1270 [ 2898.512441][T21978] ? __kasan_check_read+0x11/0x20 [ 2898.517492][T21978] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2898.523238][T21978] ? __kasan_check_read+0x11/0x20 [ 2898.528287][T21978] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2898.534819][T21978] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2898.541201][T21978] alloc_pages_vma+0xdd/0x560 [ 2898.546028][T21978] shmem_alloc_page+0xc0/0x180 [ 2898.551014][T21978] ? shmem_swapin+0x1a0/0x1a0 [ 2898.556014][T21978] ? xas_start+0x166/0x560 [ 2898.560570][T21978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2898.566406][T21978] ? __vm_enough_memory+0x17e/0x3a0 [ 2898.571656][T21978] shmem_alloc_and_acct_page+0x165/0x990 [ 2898.577414][T21978] shmem_getpage_gfp+0x598/0x2680 [ 2898.582466][T21978] ? current_time+0x6b/0x140 [ 2898.587156][T21978] ? shmem_unuse_inode+0x1010/0x1010 [ 2898.592634][T21978] ? lock_acquire+0x190/0x410 [ 2898.597431][T21978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2898.603859][T21978] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2898.609853][T21978] shmem_write_begin+0x105/0x1e0 [ 2898.615544][T21978] generic_perform_write+0x23b/0x540 [ 2898.632616][T21978] ? timespec64_trunc+0x180/0x180 [ 2898.637642][T21978] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2898.649277][T21978] ? current_time+0x140/0x140 [ 2898.654186][T21978] ? __kasan_check_write+0x14/0x20 [ 2898.659665][T21978] ? down_write+0xdf/0x150 [ 2898.664080][T21978] __generic_file_write_iter+0x25e/0x630 [ 2898.669804][T21978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2898.675526][T21978] generic_file_write_iter+0x356/0x620 [ 2898.680983][T21978] ? __generic_file_write_iter+0x630/0x630 [ 2898.686778][T21978] ? aa_path_link+0x460/0x460 [ 2898.691446][T21978] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2898.697246][T21978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2898.703666][T21978] ? iov_iter_init+0xee/0x210 [ 2898.714255][T21978] new_sync_write+0x4d3/0x770 [ 2898.718947][T21978] ? new_sync_read+0x800/0x800 [ 2898.723907][T21978] ? mark_held_locks+0xf0/0xf0 [ 2898.728678][T21978] ? common_file_perm+0x238/0x720 [ 2898.733784][T21978] ? vfs_write+0x485/0x5d0 [ 2898.738310][T21978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2898.744753][T21978] __vfs_write+0xe1/0x110 [ 2898.749277][T21978] vfs_write+0x268/0x5d0 [ 2898.753509][T21978] ksys_pwrite64+0x183/0x1c0 [ 2898.758186][T21978] ? __ia32_sys_pread64+0xf0/0xf0 [ 2898.763223][T21978] ? fput+0x1b/0x20 [ 2898.767133][T21978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2898.774988][T21978] __x64_sys_pwrite64+0x97/0xf0 [ 2898.779870][T21978] do_syscall_64+0xfd/0x6a0 [ 2898.784668][T21978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2898.790648][T21978] RIP: 0033:0x413777 [ 2898.795862][T21978] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2898.815717][T21978] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2898.824128][T21978] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 2898.832187][T21978] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 2898.840188][T21978] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2898.848191][T21978] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 15:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2898.856185][T21978] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:51 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1e00, 0x10000000002) 15:04:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:51 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x100000000000000) 15:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:51 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:51 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1f00, 0x10000000002) [ 2899.167756][T22021] FAULT_INJECTION: forcing a failure. [ 2899.167756][T22021] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.180663][T22021] CPU: 1 PID: 22021 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2899.188656][T22021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2899.198722][T22021] Call Trace: [ 2899.202031][T22021] dump_stack+0x172/0x1f0 [ 2899.206382][T22021] should_fail.cold+0xa/0x15 [ 2899.210990][T22021] ? fault_create_debugfs_attr+0x180/0x180 [ 2899.216815][T22021] ? __kasan_check_read+0x11/0x20 [ 2899.221858][T22021] __should_failslab+0x121/0x190 [ 2899.226811][T22021] should_failslab+0x9/0x14 [ 2899.231334][T22021] kmem_cache_alloc+0x47/0x710 [ 2899.236128][T22021] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2899.241870][T22021] xas_alloc+0x346/0x460 [ 2899.246136][T22021] xas_create+0x2cd/0x1060 [ 2899.250574][T22021] xas_create_range+0x198/0x5d0 [ 2899.255540][T22021] shmem_add_to_page_cache+0x8ed/0x14c0 [ 2899.261125][T22021] ? shmem_writepage+0xee0/0xee0 15:04:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2899.266124][T22021] shmem_getpage_gfp+0xeb0/0x2680 [ 2899.271176][T22021] ? shmem_unuse_inode+0x1010/0x1010 [ 2899.276484][T22021] ? lock_acquire+0x190/0x410 [ 2899.281176][T22021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2899.287454][T22021] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2899.294826][T22021] shmem_write_begin+0x105/0x1e0 [ 2899.299783][T22021] generic_perform_write+0x23b/0x540 [ 2899.305097][T22021] ? timespec64_trunc+0x180/0x180 [ 2899.310152][T22021] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2899.318241][T22021] ? current_time+0x140/0x140 [ 2899.322959][T22021] ? __kasan_check_write+0x14/0x20 [ 2899.328077][T22021] ? down_write+0xdf/0x150 [ 2899.332517][T22021] __generic_file_write_iter+0x25e/0x630 [ 2899.332533][T22021] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2899.332548][T22021] generic_file_write_iter+0x356/0x620 [ 2899.332565][T22021] ? __generic_file_write_iter+0x630/0x630 [ 2899.332579][T22021] ? aa_path_link+0x460/0x460 [ 2899.332592][T22021] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2899.332606][T22021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2899.332629][T22021] ? iov_iter_init+0xee/0x210 [ 2899.376907][T22021] new_sync_write+0x4d3/0x770 [ 2899.381601][T22021] ? new_sync_read+0x800/0x800 [ 2899.386392][T22021] ? mark_held_locks+0xf0/0xf0 [ 2899.391181][T22021] ? common_file_perm+0x238/0x720 [ 2899.396241][T22021] ? vfs_write+0x485/0x5d0 [ 2899.401973][T22021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.408246][T22021] __vfs_write+0xe1/0x110 [ 2899.412692][T22021] vfs_write+0x268/0x5d0 15:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2899.416962][T22021] ksys_pwrite64+0x183/0x1c0 [ 2899.421673][T22021] ? __ia32_sys_pread64+0xf0/0xf0 [ 2899.426833][T22021] ? fput+0x1b/0x20 [ 2899.430702][T22021] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2899.436797][T22021] __x64_sys_pwrite64+0x97/0xf0 [ 2899.441834][T22021] do_syscall_64+0xfd/0x6a0 [ 2899.446617][T22021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2899.452541][T22021] RIP: 0033:0x413777 15:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2899.456484][T22021] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2899.476113][T22021] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2899.484548][T22021] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 2899.492669][T22021] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 2899.500681][T22021] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2899.508953][T22021] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2899.517205][T22021] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x3f00, 0x10000000002) 15:04:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:52 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000fe8000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x200000000000000) 15:04:52 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x4000, 0x10000000002) 15:04:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) 15:04:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2899.955594][T22078] FAULT_INJECTION: forcing a failure. [ 2899.955594][T22078] name failslab, interval 1, probability 0, space 0, times 0 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x20000, 0x10000000002) [ 2899.999753][T22078] CPU: 0 PID: 22078 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2900.007784][T22078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2900.018128][T22078] Call Trace: [ 2900.021454][T22078] dump_stack+0x172/0x1f0 [ 2900.025823][T22078] should_fail.cold+0xa/0x15 [ 2900.030558][T22078] ? fault_create_debugfs_attr+0x180/0x180 [ 2900.036505][T22078] ? page_to_nid.part.0+0x20/0x20 [ 2900.041543][T22078] ? ___might_sleep+0x163/0x280 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x400000, 0x10000000002) 15:04:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) [ 2900.046761][T22078] __should_failslab+0x121/0x190 [ 2900.051717][T22078] should_failslab+0x9/0x14 [ 2900.056326][T22078] kmem_cache_alloc+0x2aa/0x710 [ 2900.061203][T22078] getname_flags+0xd6/0x5b0 [ 2900.065730][T22078] getname+0x1a/0x20 [ 2900.069652][T22078] do_sys_open+0x2c9/0x5d0 [ 2900.074229][T22078] ? filp_open+0x80/0x80 [ 2900.078658][T22078] ? fput+0x1b/0x20 [ 2900.082472][T22078] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2900.088636][T22078] __x64_sys_open+0x7e/0xc0 [ 2900.093436][T22078] do_syscall_64+0xfd/0x6a0 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x90581f, 0x10000000002) [ 2900.098230][T22078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2900.104219][T22078] RIP: 0033:0x413711 [ 2900.108125][T22078] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2900.127744][T22078] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2900.136278][T22078] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x2000000, 0x10000000002) [ 2900.144888][T22078] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2900.152879][T22078] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2900.162982][T22078] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2900.170970][T22078] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x400000000000000) 15:04:52 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000fec000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:52 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1e000000, 0x10000000002) 15:04:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:52 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) [ 2900.420803][T22115] FAULT_INJECTION: forcing a failure. [ 2900.420803][T22115] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.489619][T22115] CPU: 1 PID: 22115 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2900.497651][T22115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2900.507724][T22115] Call Trace: [ 2900.511041][T22115] dump_stack+0x172/0x1f0 [ 2900.515385][T22115] should_fail.cold+0xa/0x15 [ 2900.520014][T22115] ? fault_create_debugfs_attr+0x180/0x180 [ 2900.525840][T22115] ? page_to_nid.part.0+0x20/0x20 [ 2900.530879][T22115] ? ___might_sleep+0x163/0x280 15:04:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r2, &(0x7f0000000080)=""/134) [ 2900.535746][T22115] __should_failslab+0x121/0x190 [ 2900.540803][T22115] should_failslab+0x9/0x14 [ 2900.545334][T22115] kmem_cache_alloc+0x2aa/0x710 [ 2900.550199][T22115] ? memcg_kmem_put_cache+0x3e/0x50 [ 2900.555442][T22115] ? kmem_cache_alloc+0x314/0x710 [ 2900.560487][T22115] security_file_alloc+0x39/0x170 [ 2900.565562][T22115] __alloc_file+0xde/0x340 [ 2900.569989][T22115] alloc_empty_file+0x72/0x170 [ 2900.574783][T22115] path_openat+0xef/0x4630 [ 2900.579239][T22115] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2900.585053][T22115] ? kasan_slab_alloc+0xf/0x20 [ 2900.589797][T22115] ? kmem_cache_alloc+0x121/0x710 [ 2900.594819][T22115] ? getname_flags+0xd6/0x5b0 [ 2900.599580][T22115] ? getname+0x1a/0x20 [ 2900.603647][T22115] ? do_sys_open+0x2c9/0x5d0 [ 2900.608235][T22115] ? __x64_sys_open+0x7e/0xc0 [ 2900.612994][T22115] ? do_syscall_64+0xfd/0x6a0 [ 2900.617694][T22115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2900.623763][T22115] ? __kasan_check_write+0x14/0x20 [ 2900.629330][T22115] ? up_write+0x9d/0x280 [ 2900.633685][T22115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:04:53 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000002ee000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2900.639943][T22115] ? generic_file_write_iter+0x3b9/0x620 [ 2900.645602][T22115] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2900.650997][T22115] ? __generic_file_write_iter+0x630/0x630 [ 2900.656844][T22115] ? aa_path_link+0x460/0x460 [ 2900.661535][T22115] ? kmem_cache_alloc+0x58e/0x710 [ 2900.666564][T22115] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2900.672402][T22115] do_filp_open+0x1a1/0x280 [ 2900.676912][T22115] ? may_open_dev+0x100/0x100 [ 2900.681600][T22115] ? lock_downgrade+0x920/0x920 [ 2900.686667][T22115] ? rwlock_bug.part.0+0x90/0x90 [ 2900.691617][T22115] ? __alloc_fd+0x35/0x620 [ 2900.696043][T22115] ? __kasan_check_read+0x11/0x20 [ 2900.701093][T22115] ? do_raw_spin_unlock+0x57/0x270 [ 2900.706226][T22115] ? _raw_spin_unlock+0x2d/0x50 [ 2900.711102][T22115] ? __alloc_fd+0x487/0x620 [ 2900.715638][T22115] do_sys_open+0x3fe/0x5d0 [ 2900.720153][T22115] ? filp_open+0x80/0x80 [ 2900.724437][T22115] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2900.730517][T22115] __x64_sys_open+0x7e/0xc0 [ 2900.735039][T22115] do_syscall_64+0xfd/0x6a0 [ 2900.739578][T22115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2900.745724][T22115] RIP: 0033:0x413711 [ 2900.749631][T22115] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2900.769245][T22115] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2900.777761][T22115] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:53 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000003e800"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x3f00000000000000) 15:04:53 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1f000000, 0x10000000002) 15:04:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2900.785942][T22115] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2900.793953][T22115] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2900.802128][T22115] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2900.810396][T22115] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:53 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:53 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1f589000, 0x10000000002) 15:04:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x4000000000000000) [ 2901.061684][T22162] FAULT_INJECTION: forcing a failure. [ 2901.061684][T22162] name failslab, interval 1, probability 0, space 0, times 0 15:04:53 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000001f400"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:53 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x3f000000, 0x10000000002) [ 2901.116243][T22162] CPU: 1 PID: 22162 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2901.124270][T22162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2901.134334][T22162] Call Trace: [ 2901.137636][T22162] dump_stack+0x172/0x1f0 [ 2901.142001][T22162] should_fail.cold+0xa/0x15 [ 2901.146713][T22162] ? is_bpf_text_address+0xd3/0x170 [ 2901.151930][T22162] ? fault_create_debugfs_attr+0x180/0x180 [ 2901.157748][T22162] ? page_to_nid.part.0+0x20/0x20 [ 2901.162875][T22162] ? ___might_sleep+0x163/0x280 [ 2901.168104][T22162] __should_failslab+0x121/0x190 [ 2901.173095][T22162] should_failslab+0x9/0x14 [ 2901.177613][T22162] kmem_cache_alloc+0x2aa/0x710 [ 2901.182561][T22162] ? stack_trace_save+0xac/0xe0 [ 2901.182574][T22162] ? stack_trace_consume_entry+0x190/0x190 [ 2901.182590][T22162] __alloc_file+0x27/0x340 [ 2901.182604][T22162] alloc_empty_file+0x72/0x170 [ 2901.182621][T22162] path_openat+0xef/0x4630 [ 2901.182635][T22162] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2901.182647][T22162] ? kasan_slab_alloc+0xf/0x20 [ 2901.182659][T22162] ? kmem_cache_alloc+0x121/0x710 [ 2901.182681][T22162] ? getname_flags+0xd6/0x5b0 [ 2901.193350][T22162] ? getname+0x1a/0x20 [ 2901.193363][T22162] ? do_sys_open+0x2c9/0x5d0 [ 2901.193373][T22162] ? __x64_sys_open+0x7e/0xc0 [ 2901.193389][T22162] ? do_syscall_64+0xfd/0x6a0 [ 2901.193403][T22162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2901.193420][T22162] ? __isolate_free_page+0x4c0/0x4c0 [ 2901.193434][T22162] ? up_write+0x9d/0x280 15:04:53 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x40000000, 0x10000000002) [ 2901.193455][T22162] ? __kasan_check_read+0x11/0x20 [ 2901.268347][T22162] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2901.273739][T22162] ? __kasan_check_read+0x11/0x20 [ 2901.278772][T22162] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2901.284324][T22162] ? cache_grow_end+0xa4/0x190 [ 2901.289102][T22162] ? __kasan_check_read+0x11/0x20 [ 2901.295701][T22162] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2901.301444][T22162] do_filp_open+0x1a1/0x280 [ 2901.305964][T22162] ? may_open_dev+0x100/0x100 [ 2901.310766][T22162] ? lock_downgrade+0x920/0x920 [ 2901.315628][T22162] ? rwlock_bug.part.0+0x90/0x90 [ 2901.315642][T22162] ? __alloc_fd+0x35/0x620 [ 2901.315657][T22162] ? __kasan_check_read+0x11/0x20 [ 2901.315670][T22162] ? do_raw_spin_unlock+0x57/0x270 [ 2901.315693][T22162] ? _raw_spin_unlock+0x2d/0x50 [ 2901.339987][T22162] ? __alloc_fd+0x487/0x620 [ 2901.340010][T22162] do_sys_open+0x3fe/0x5d0 [ 2901.340029][T22162] ? filp_open+0x80/0x80 [ 2901.353183][T22162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2901.359266][T22162] __x64_sys_open+0x7e/0xc0 15:04:53 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x400000000000, 0x10000000002) [ 2901.363782][T22162] do_syscall_64+0xfd/0x6a0 [ 2901.368294][T22162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2901.374194][T22162] RIP: 0033:0x413711 [ 2901.378266][T22162] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2901.397878][T22162] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2901.407804][T22162] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2901.415963][T22162] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2901.424144][T22162] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2901.424151][T22162] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2901.424158][T22162] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:54 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1000000000000, 0x10000000002) 15:04:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:54 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0xffffff7f00000000) 15:04:54 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000fc00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2901.719875][T22207] FAULT_INJECTION: forcing a failure. [ 2901.719875][T22207] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.775693][T22207] CPU: 0 PID: 22207 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2901.783810][T22207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2901.793898][T22207] Call Trace: [ 2901.797213][T22207] dump_stack+0x172/0x1f0 [ 2901.801573][T22207] should_fail.cold+0xa/0x15 [ 2901.806188][T22207] ? fault_create_debugfs_attr+0x180/0x180 [ 2901.812008][T22207] ? kernel_text_address+0x73/0xf0 [ 2901.817135][T22207] ? ___might_sleep+0x163/0x280 [ 2901.822001][T22207] __should_failslab+0x121/0x190 [ 2901.826955][T22207] should_failslab+0x9/0x14 [ 2901.831471][T22207] __kmalloc+0x2e0/0x770 [ 2901.835731][T22207] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2901.841461][T22207] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2901.847386][T22207] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2901.853661][T22207] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2901.859575][T22207] ? tomoyo_path_number_perm+0x520/0x520 [ 2901.865248][T22207] ? lock_downgrade+0x920/0x920 [ 2901.870113][T22207] ? rwlock_bug.part.0+0x90/0x90 [ 2901.875238][T22207] ? lockref_get+0x16/0x60 [ 2901.879665][T22207] tomoyo_file_open+0xa9/0xd0 [ 2901.884360][T22207] security_file_open+0x71/0x300 [ 2901.889319][T22207] do_dentry_open+0x373/0x1250 [ 2901.894100][T22207] ? match_exception_partial+0x242/0x2d0 [ 2901.899759][T22207] ? chown_common+0x5c0/0x5c0 [ 2901.904464][T22207] ? inode_permission+0xb4/0x560 [ 2901.909441][T22207] vfs_open+0xa0/0xd0 [ 2901.913440][T22207] path_openat+0x10e9/0x4630 [ 2901.918042][T22207] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2901.923854][T22207] ? kasan_slab_alloc+0xf/0x20 [ 2901.928634][T22207] ? kmem_cache_alloc+0x121/0x710 [ 2901.933660][T22207] ? getname_flags+0xd6/0x5b0 [ 2901.933673][T22207] ? getname+0x1a/0x20 [ 2901.933685][T22207] ? do_sys_open+0x2c9/0x5d0 [ 2901.933708][T22207] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2901.947196][T22207] ? aa_path_link+0x460/0x460 [ 2901.947218][T22207] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2901.947236][T22207] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2901.947259][T22207] do_filp_open+0x1a1/0x280 [ 2901.973200][T22207] ? may_open_dev+0x100/0x100 [ 2901.977903][T22207] ? __kasan_check_read+0x11/0x20 [ 2901.982945][T22207] ? do_raw_spin_unlock+0x57/0x270 [ 2901.988074][T22207] ? _raw_spin_unlock+0x2d/0x50 [ 2901.992935][T22207] ? __alloc_fd+0x487/0x620 [ 2901.997463][T22207] do_sys_open+0x3fe/0x5d0 [ 2902.001925][T22207] ? filp_open+0x80/0x80 [ 2902.006186][T22207] ? fput+0x1b/0x20 [ 2902.010006][T22207] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2902.016179][T22207] __x64_sys_open+0x7e/0xc0 [ 2902.020692][T22207] do_syscall_64+0xfd/0x6a0 15:04:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xfd\xfd', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2902.025209][T22207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2902.031281][T22207] RIP: 0033:0x413711 [ 2902.035190][T22207] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2902.054977][T22207] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2902.054993][T22207] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:54 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x2000000000000, 0x10000000002) 15:04:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="0218000002000000000000000000000010e6b1c78c7f24add98f07a92826fd4512aee53dac5a1fbf8ed1a08cb07b5ce94261d4ef382fc87d880c8050d5426a075d54611e973d3b4cbfb4977b10b914aa1f222fee8ee62ec5138d6b24f485f17a977f7311694aa247cb950586e0e72eb91786bff50dfb71a83bc288ff239dd16dbefebf89071c2aa6ede80cd36ea47e85017d27e1b5bc630572de488b52b5de7e3f8904f85e6fbbc0aee50d2d89fc5685b2b474"], 0x10}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000200)='Xom_score\x00') [ 2902.054999][T22207] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2902.055005][T22207] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2902.055011][T22207] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2902.055018][T22207] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2902.066374][T22207] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:54 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:54 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x90581f00000000, 0x10000000002) [ 2902.363710][T22252] FAULT_INJECTION: forcing a failure. [ 2902.363710][T22252] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.410353][T22252] CPU: 1 PID: 22252 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2902.418375][T22252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2902.428571][T22252] Call Trace: [ 2902.431897][T22252] dump_stack+0x172/0x1f0 [ 2902.436254][T22252] should_fail.cold+0xa/0x15 [ 2902.440867][T22252] ? fault_create_debugfs_attr+0x180/0x180 [ 2902.446674][T22252] ? kernel_text_address+0x73/0xf0 [ 2902.451959][T22252] ? ___might_sleep+0x163/0x280 [ 2902.456813][T22252] __should_failslab+0x121/0x190 [ 2902.461744][T22252] should_failslab+0x9/0x14 [ 2902.466236][T22252] __kmalloc+0x2e0/0x770 [ 2902.470824][T22252] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2902.476559][T22252] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2902.482296][T22252] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2902.488535][T22252] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2902.494443][T22252] ? tomoyo_path_number_perm+0x520/0x520 [ 2902.500118][T22252] ? lock_downgrade+0x920/0x920 [ 2902.504985][T22252] ? rwlock_bug.part.0+0x90/0x90 [ 2902.509931][T22252] ? lockref_get+0x16/0x60 [ 2902.514340][T22252] tomoyo_file_open+0xa9/0xd0 [ 2902.519009][T22252] security_file_open+0x71/0x300 [ 2902.523933][T22252] do_dentry_open+0x373/0x1250 [ 2902.528686][T22252] ? match_exception_partial+0x242/0x2d0 [ 2902.534339][T22252] ? chown_common+0x5c0/0x5c0 [ 2902.539023][T22252] ? inode_permission+0xb4/0x560 [ 2902.543979][T22252] vfs_open+0xa0/0xd0 [ 2902.547979][T22252] path_openat+0x10e9/0x4630 [ 2902.552575][T22252] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 15:04:55 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000080fe00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:55 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x200000000000000, 0x10000000002) 15:04:55 executing program 1: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x9, 0x80000) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000500)={0x7, 0x80000001, 0x200, 0x4004, 0xffffffffffffffff}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x4942, 0x0) socket$kcm(0x29, 0x7, 0x0) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f0000000140)="4954a2598e7b2cea884e96235dc96fb911be6a00f4302a95557ccde8f1be2d49317855646594e32b887943c6fb8333743d4e59fb3f7246f05ab43003db544ff7e3c8ef961647f7d98150a8ac324b47e91d09e1e551bdd905ef2d39735877ff21646b5a49db5ff77970a16b434059363eab55e9e6e7b99fc680d9fe0171ad399986efefa6a8fd87a7ba3f16dd415a905ff7c8be7a894c0cd823612394feb87ab14d98be37b8b71c21f72f17cd38ba23e4cd733d49cdb6a04a1b413b3a5bdfade4a9c4c371e5b71f9a23a00b2c4824ad06f148ae16269791", 0xd7, 0x8, 0x0, 0x2, r3}]) r4 = socket$key(0xf, 0x3, 0x2) write$binfmt_elf32(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x1, 0x6, 0x2, 0x3, 0x3e, 0x9d4, 0xc7, 0x38, 0x3db, 0x46, 0x401, 0x20, 0x2, 0x8, 0xffffffff, 0xd4f}, [{0x2, 0x8001, 0x2, 0x2, 0x1ff, 0x2, 0x8000, 0xfffffffffffffeff}, {0x60000000, 0x4, 0x2, 0x1b, 0x0, 0x5, 0x1, 0x4}], "069b1351b43951cf11c9d9552fbbf626f693df3c", [[], [], []]}, 0x38c) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x1fffffffffffff85, 0x0, 0x0, 0xffffffffffffffc1}, 0x10}}, 0x0) sendmsg$key(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x8, 0x7, 0x10, 0x0, 0x70bd2b, 0x25dfdbfd, [@sadb_sa={0x2, 0x1, 0x4d2, 0x80000000, 0x3d, 0x34, 0x0, 0x1}, @sadb_x_filter={0x5, 0x1a, @in=@multicast1, @in=@multicast2, 0x3, 0x10, 0x4}, @sadb_address={0x5, 0x5, 0x7c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x80000001, @mcast2, 0x1}}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d6}]}, 0x80}}, 0x0) [ 2902.558392][T22252] ? kasan_slab_alloc+0xf/0x20 [ 2902.563177][T22252] ? kmem_cache_alloc+0x121/0x710 [ 2902.568221][T22252] ? getname_flags+0xd6/0x5b0 [ 2902.572924][T22252] ? getname+0x1a/0x20 [ 2902.577004][T22252] ? do_sys_open+0x2c9/0x5d0 [ 2902.581616][T22252] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2902.586996][T22252] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2902.592545][T22252] ? cache_grow_end+0xa4/0x190 [ 2902.592559][T22252] ? __kasan_check_read+0x11/0x20 [ 2902.592577][T22252] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2902.592607][T22252] do_filp_open+0x1a1/0x280 [ 2902.602391][T22252] ? may_open_dev+0x100/0x100 [ 2902.617390][T22252] ? __kasan_check_read+0x11/0x20 [ 2902.622433][T22252] ? do_raw_spin_unlock+0x57/0x270 [ 2902.627564][T22252] ? _raw_spin_unlock+0x2d/0x50 [ 2902.632460][T22252] ? __alloc_fd+0x487/0x620 [ 2902.636979][T22252] do_sys_open+0x3fe/0x5d0 [ 2902.641405][T22252] ? filp_open+0x80/0x80 [ 2902.645661][T22252] ? fput+0x1b/0x20 [ 2902.649475][T22252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2902.655554][T22252] __x64_sys_open+0x7e/0xc0 15:04:55 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000c0fe00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2902.660080][T22252] do_syscall_64+0xfd/0x6a0 [ 2902.664608][T22252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2902.670508][T22252] RIP: 0033:0x413711 [ 2902.674416][T22252] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2902.694054][T22252] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2902.702479][T22252] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 2902.702487][T22252] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2902.702494][T22252] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2902.702501][T22252] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2902.702508][T22252] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2902.748948][T22252] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:55 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1e00000000000000, 0x10000000002) 15:04:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02e74c9c7a00000000ff0000000000285460fd17d96b6ac094e6c305957cc3b1394827e9"], 0x10}}, 0x0) 15:04:55 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:55 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x1f00000000000000, 0x10000000002) 15:04:55 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000ff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2903.126812][T22306] FAULT_INJECTION: forcing a failure. [ 2903.126812][T22306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2903.140413][T22306] CPU: 1 PID: 22306 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2903.140424][T22306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2903.140429][T22306] Call Trace: [ 2903.140463][T22306] dump_stack+0x172/0x1f0 [ 2903.140484][T22306] should_fail.cold+0xa/0x15 [ 2903.140502][T22306] ? percpu_ref_put_many+0x94/0x190 [ 2903.140525][T22306] ? fault_create_debugfs_attr+0x180/0x180 [ 2903.166274][T22306] should_fail_alloc_page+0x50/0x60 [ 2903.166290][T22306] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2903.166315][T22306] ? lock_downgrade+0x920/0x920 [ 2903.197469][T22306] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2903.197488][T22306] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2903.197510][T22306] ? fault_create_debugfs_attr+0x180/0x180 [ 2903.197531][T22306] cache_grow_begin+0x90/0xd20 [ 2903.219529][T22306] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.225357][T22306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2903.231649][T22306] __kmalloc+0x6b2/0x770 [ 2903.231670][T22306] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.231686][T22306] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.231702][T22306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2903.231727][T22306] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2903.259540][T22306] ? tomoyo_path_number_perm+0x520/0x520 [ 2903.265219][T22306] ? lock_downgrade+0x920/0x920 [ 2903.270128][T22306] ? rwlock_bug.part.0+0x90/0x90 15:04:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0x2c1) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000140)) r1 = socket$key(0xf, 0x3, 0x2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000180)) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2903.275099][T22306] ? lockref_get+0x16/0x60 [ 2903.279624][T22306] tomoyo_file_open+0xa9/0xd0 [ 2903.284491][T22306] security_file_open+0x71/0x300 [ 2903.289453][T22306] do_dentry_open+0x373/0x1250 [ 2903.295824][T22306] ? match_exception_partial+0x242/0x2d0 [ 2903.301489][T22306] ? chown_common+0x5c0/0x5c0 [ 2903.306189][T22306] ? inode_permission+0xb4/0x560 [ 2903.311534][T22306] vfs_open+0xa0/0xd0 [ 2903.315714][T22306] path_openat+0x10e9/0x4630 [ 2903.320414][T22306] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2903.326345][T22306] ? kasan_slab_alloc+0xf/0x20 [ 2903.331256][T22306] ? kmem_cache_alloc+0x121/0x710 [ 2903.336327][T22306] ? getname_flags+0xd6/0x5b0 [ 2903.341153][T22306] ? getname+0x1a/0x20 [ 2903.345245][T22306] ? do_sys_open+0x2c9/0x5d0 [ 2903.349865][T22306] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2903.355324][T22306] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2903.360998][T22306] ? cache_grow_end+0xa4/0x190 [ 2903.365793][T22306] ? __kasan_check_read+0x11/0x20 [ 2903.370846][T22306] ? __sanitizer_cov_trace_cmp4+0x16/0x20 15:04:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2903.376689][T22306] do_filp_open+0x1a1/0x280 [ 2903.381246][T22306] ? may_open_dev+0x100/0x100 [ 2903.386040][T22306] ? __kasan_check_read+0x11/0x20 [ 2903.391514][T22306] ? do_raw_spin_unlock+0x57/0x270 [ 2903.396747][T22306] ? _raw_spin_unlock+0x2d/0x50 [ 2903.402479][T22306] ? __alloc_fd+0x487/0x620 [ 2903.407372][T22306] do_sys_open+0x3fe/0x5d0 [ 2903.411809][T22306] ? filp_open+0x80/0x80 [ 2903.416180][T22306] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2903.422628][T22306] __x64_sys_open+0x7e/0xc0 [ 2903.422647][T22306] do_syscall_64+0xfd/0x6a0 [ 2903.422662][T22306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2903.422673][T22306] RIP: 0033:0x413711 [ 2903.422688][T22306] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2903.422695][T22306] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2903.422708][T22306] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2903.422716][T22306] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2903.422732][T22306] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2903.493825][T22306] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2903.501994][T22306] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:56 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x3f00000000000000, 0x10000000002) 15:04:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:56 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x54d5, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000180)={@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, {&(0x7f0000000100)=""/8, 0x8}, &(0x7f0000000140), 0x10}, 0xa0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="0218000002000000000000000000000062b4f425e1e9e971a7b6e65115502cb7bbaa9a324e04822dbf495ef9c6383b376af98091442f0ce740025eedafe46a7d84fb5185802f52ba8464ea72e30808c239d264846947269d4cbb5c5832beb12c55b3eb68c57fce287311ff8f46234dd15b9d29c9de60ec444fe5624b80994ce2baf179ea613f54a7665bd8e8b6c87b4071700f0e7a8bc1d48900e27dabe7fd3f6df8ee78f5e7c2"], 0x10}}, 0x0) 15:04:56 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:56 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x4000000000000000, 0x10000000002) [ 2903.784579][T22353] FAULT_INJECTION: forcing a failure. [ 2903.784579][T22353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2903.797836][T22353] CPU: 1 PID: 22353 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2903.805826][T22353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2903.816304][T22353] Call Trace: [ 2903.819622][T22353] dump_stack+0x172/0x1f0 [ 2903.823974][T22353] should_fail.cold+0xa/0x15 [ 2903.828580][T22353] ? percpu_ref_put_many+0x94/0x190 [ 2903.833798][T22353] ? fault_create_debugfs_attr+0x180/0x180 [ 2903.839827][T22353] should_fail_alloc_page+0x50/0x60 [ 2903.845140][T22353] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2903.850525][T22353] ? lock_downgrade+0x920/0x920 [ 2903.855405][T22353] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2903.855420][T22353] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2903.855442][T22353] ? fault_create_debugfs_attr+0x180/0x180 [ 2903.855468][T22353] cache_grow_begin+0x90/0xd20 [ 2903.872685][T22353] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.872704][T22353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2903.872719][T22353] __kmalloc+0x6b2/0x770 [ 2903.872734][T22353] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.872748][T22353] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2903.872770][T22353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2903.899654][T22353] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2903.899673][T22353] ? tomoyo_path_number_perm+0x520/0x520 [ 2903.899709][T22353] ? lock_downgrade+0x920/0x920 [ 2903.911491][T22353] ? rwlock_bug.part.0+0x90/0x90 [ 2903.911506][T22353] ? lockref_get+0x16/0x60 [ 2903.911523][T22353] tomoyo_file_open+0xa9/0xd0 [ 2903.911542][T22353] security_file_open+0x71/0x300 [ 2903.911566][T22353] do_dentry_open+0x373/0x1250 [ 2903.951604][T22353] ? match_exception_partial+0x242/0x2d0 [ 2903.957259][T22353] ? chown_common+0x5c0/0x5c0 [ 2903.961952][T22353] ? inode_permission+0xb4/0x560 [ 2903.966913][T22353] vfs_open+0xa0/0xd0 [ 2903.970923][T22353] path_openat+0x10e9/0x4630 [ 2903.975526][T22353] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 15:04:56 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000fff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2903.981355][T22353] ? kasan_slab_alloc+0xf/0x20 [ 2903.986140][T22353] ? kmem_cache_alloc+0x121/0x710 [ 2903.991201][T22353] ? getname_flags+0xd6/0x5b0 [ 2903.995979][T22353] ? getname+0x1a/0x20 [ 2904.000163][T22353] ? do_sys_open+0x2c9/0x5d0 [ 2904.004781][T22353] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2904.010178][T22353] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2904.015742][T22353] ? cache_grow_end+0xa4/0x190 [ 2904.020525][T22353] ? __kasan_check_read+0x11/0x20 [ 2904.025567][T22353] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2904.031303][T22353] do_filp_open+0x1a1/0x280 [ 2904.035818][T22353] ? may_open_dev+0x100/0x100 [ 2904.040518][T22353] ? __kasan_check_read+0x11/0x20 [ 2904.045552][T22353] ? do_raw_spin_unlock+0x57/0x270 [ 2904.050798][T22353] ? _raw_spin_unlock+0x2d/0x50 [ 2904.055661][T22353] ? __alloc_fd+0x487/0x620 [ 2904.060191][T22353] do_sys_open+0x3fe/0x5d0 [ 2904.064618][T22353] ? filp_open+0x80/0x80 [ 2904.068873][T22353] ? fput+0x1b/0x20 [ 2904.072707][T22353] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2904.078789][T22353] __x64_sys_open+0x7e/0xc0 [ 2904.083309][T22353] do_syscall_64+0xfd/0x6a0 [ 2904.087836][T22353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2904.093742][T22353] RIP: 0033:0x413711 [ 2904.097657][T22353] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2904.117449][T22353] RSP: 002b:00007f6b1e80ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2904.125888][T22353] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 15:04:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2904.133884][T22353] RDX: 00007f6b1e80eb0a RSI: 0000000000000002 RDI: 00007f6b1e80eb00 [ 2904.141873][T22353] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2904.150180][T22353] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2904.158337][T22353] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:56 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x8000000000000000, 0x10000000002) 15:04:56 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:56 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:56 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffe5, 0x2) socket$tipc(0x1e, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x20, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000240)="a5a42b3e12bb246c6fb951baeec30113d939d7d2c737088c3f598b43e827c688290c37485175090d77b4948be7b1a7722e2a2f8170fb12fd54bdee587f3524a31c90932dd6104f7e97a99fd43872cf3770a4e75e0c3a618c275f747218167487714d6e4a3e3571610e2a9d4231a385120219ce76", 0x74, 0x100000000}, {&(0x7f00000001c0)="38c5c7cdf979507f5d", 0x9, 0xcb68}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB='logdev=./file0,allocsize=8=3x|\x00,logdev=./file0,uquota,fsuuid=3ftec7\x008-562u-7d7\x00-u}16-rw22879?,fsmagic=0x0000000000000002,subj_role=eth0,dont_hash,euid>', @ANYRESDEC=r1, @ANYBLOB="5d94f91a5bb9a92c00228b8e44e3090ea4661bf7b53196cd44056dad9978231ed476d392fa421b2d643cc316460f9312308a681882525d64c36366e3701819124f726b75b3ebcee51b847140a216065a90b4943eb13a104606f6e0cbd14fa755d8ab4842d2c3552d972471803be19e543edbe5dfab8814297d4969f44ea2d3629ccf87905c8070d817d8bab63397d6341765ae5026c963599353ebc017599bfb450d4c8632bf062caa7ee8e73155c431403690522592531842c0fceb"]) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="020000000000fcffffff000000000000"], 0x10}}, 0x0) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@random={'user.', 'xfs\x00'}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0xffffffff, 0xe0, 0x7, 0x32, 0x243}) openat$ion(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ion\x00', 0x2400, 0x0) 15:04:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:56 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000003) [ 2904.466968][T22497] FAULT_INJECTION: forcing a failure. [ 2904.466968][T22497] name failslab, interval 1, probability 0, space 0, times 0 [ 2904.510787][T22497] CPU: 1 PID: 22497 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2904.518830][T22497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2904.528996][T22497] Call Trace: [ 2904.532311][T22497] dump_stack+0x172/0x1f0 [ 2904.536669][T22497] should_fail.cold+0xa/0x15 [ 2904.541280][T22497] ? fault_create_debugfs_attr+0x180/0x180 [ 2904.547118][T22497] ? ___might_sleep+0x163/0x280 [ 2904.552024][T22497] __should_failslab+0x121/0x190 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000004) [ 2904.556980][T22497] should_failslab+0x9/0x14 [ 2904.561506][T22497] __kmalloc+0x2e0/0x770 [ 2904.565764][T22497] ? mark_held_locks+0xf0/0xf0 [ 2904.570549][T22497] ? kasan_slab_alloc+0xf/0x20 [ 2904.575329][T22497] ? kmem_cache_alloc+0x121/0x710 [ 2904.580366][T22497] ? getname_flags+0xd6/0x5b0 [ 2904.585062][T22497] ? getname+0x1a/0x20 [ 2904.589176][T22497] ? do_sys_open+0x2c9/0x5d0 [ 2904.593954][T22497] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2904.599713][T22497] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2904.605456][T22497] ? tomoyo_path_number_perm+0x193/0x520 [ 2904.611114][T22497] tomoyo_path_number_perm+0x1dd/0x520 [ 2904.616692][T22497] ? tomoyo_path_number_perm+0x193/0x520 [ 2904.616708][T22497] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2904.616722][T22497] ? __kasan_check_read+0x11/0x20 [ 2904.616737][T22497] ? __kasan_check_read+0x11/0x20 [ 2904.616759][T22497] ? __fget+0x384/0x560 [ 2904.616773][T22497] ? ksys_dup3+0x3e0/0x3e0 [ 2904.616786][T22497] ? do_sys_open+0x31d/0x5d0 [ 2904.616801][T22497] tomoyo_file_ioctl+0x23/0x30 [ 2904.616818][T22497] security_file_ioctl+0x77/0xc0 15:04:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0xbc9dc8fbd81cb4b1) fstatfs(r3, &(0x7f0000000080)=""/134) [ 2904.616841][T22497] ksys_ioctl+0x57/0xd0 [ 2904.665929][T22497] __x64_sys_ioctl+0x73/0xb0 [ 2904.670533][T22497] do_syscall_64+0xfd/0x6a0 [ 2904.675412][T22497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2904.681317][T22497] RIP: 0033:0x459697 [ 2904.685314][T22497] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2904.704929][T22497] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2904.713361][T22497] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2904.721351][T22497] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2904.729352][T22497] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2904.737344][T22497] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2904.745332][T22497] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000201) [ 2904.760482][T22497] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000300) 15:04:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x52b4, 0x10000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100)=0x8, 0x4) 15:04:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(r3, &(0x7f0000000080)=""/134) 15:04:57 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000301) 15:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:57 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0x25dfdbfe}, 0x10}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @empty}}, 0x3, 0x9}, &(0x7f0000000240)=0x90) [ 2905.215126][T22545] FAULT_INJECTION: forcing a failure. [ 2905.215126][T22545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2905.228360][T22545] CPU: 0 PID: 22545 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2905.228370][T22545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2905.228375][T22545] Call Trace: [ 2905.228404][T22545] dump_stack+0x172/0x1f0 [ 2905.228427][T22545] should_fail.cold+0xa/0x15 [ 2905.228446][T22545] ? fault_create_debugfs_attr+0x180/0x180 [ 2905.228466][T22545] ? lock_downgrade+0x920/0x920 [ 2905.228486][T22545] should_fail_alloc_page+0x50/0x60 [ 2905.228510][T22545] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2905.265050][T22545] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2905.265065][T22545] ? kernel_text_address+0x73/0xf0 [ 2905.265082][T22545] ? unwind_get_return_address+0x61/0xa0 [ 2905.265094][T22545] ? profile_setup.cold+0xbb/0xbb [ 2905.265112][T22545] ? fault_create_debugfs_attr+0x180/0x180 [ 2905.265136][T22545] cache_grow_begin+0x90/0xd20 [ 2905.314865][T22545] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2905.320621][T22545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2905.326898][T22545] __kmalloc+0x6b2/0x770 [ 2905.331176][T22545] ? mark_held_locks+0xf0/0xf0 [ 2905.335962][T22545] ? kasan_slab_alloc+0xf/0x20 [ 2905.340853][T22545] ? getname_flags+0xd6/0x5b0 [ 2905.345560][T22545] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2905.351404][T22545] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2905.356986][T22545] ? tomoyo_path_number_perm+0x193/0x520 [ 2905.363172][T22545] tomoyo_path_number_perm+0x1dd/0x520 [ 2905.363189][T22545] ? tomoyo_path_number_perm+0x193/0x520 [ 2905.363215][T22545] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2905.381152][T22545] ? __kasan_check_read+0x11/0x20 [ 2905.386203][T22545] ? __kasan_check_read+0x11/0x20 [ 2905.391390][T22545] ? __fget+0x384/0x560 [ 2905.395612][T22545] ? ksys_dup3+0x3e0/0x3e0 [ 2905.400064][T22545] ? do_sys_open+0x31d/0x5d0 [ 2905.405547][T22545] tomoyo_file_ioctl+0x23/0x30 [ 2905.410344][T22545] security_file_ioctl+0x77/0xc0 [ 2905.415334][T22545] ksys_ioctl+0x57/0xd0 [ 2905.419532][T22545] __x64_sys_ioctl+0x73/0xb0 [ 2905.424247][T22545] do_syscall_64+0xfd/0x6a0 [ 2905.428774][T22545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2905.435116][T22545] RIP: 0033:0x459697 [ 2905.439106][T22545] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:04:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000500) 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000501) 15:04:57 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000600) 15:04:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2905.439122][T22545] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2905.467243][T22545] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2905.475233][T22545] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2905.483217][T22545] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2905.483224][T22545] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2905.483231][T22545] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:58 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000601) 15:04:58 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000200"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0xfffffffffffffffd) 15:04:58 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/134) 15:04:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:58 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000700) 15:04:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(r3, 0x0) 15:04:58 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000701) [ 2906.150195][T22600] FAULT_INJECTION: forcing a failure. [ 2906.150195][T22600] name failslab, interval 1, probability 0, space 0, times 0 15:04:58 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000801) [ 2906.212593][T22600] CPU: 1 PID: 22600 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2906.221136][T22600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2906.231742][T22600] Call Trace: [ 2906.235074][T22600] dump_stack+0x172/0x1f0 [ 2906.239530][T22600] should_fail.cold+0xa/0x15 [ 2906.244149][T22600] ? fault_create_debugfs_attr+0x180/0x180 [ 2906.250095][T22600] ? ___might_sleep+0x163/0x280 15:04:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2906.258971][T22600] __should_failslab+0x121/0x190 [ 2906.263945][T22600] should_failslab+0x9/0x14 [ 2906.268554][T22600] __kmalloc+0x2e0/0x770 [ 2906.272809][T22600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2906.272822][T22600] ? d_absolute_path+0x11b/0x170 [ 2906.272832][T22600] ? __d_path+0x140/0x140 [ 2906.272845][T22600] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2906.272857][T22600] tomoyo_encode2.part.0+0xf5/0x400 [ 2906.272869][T22600] tomoyo_encode+0x2b/0x50 [ 2906.272879][T22600] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2906.272898][T22600] tomoyo_path_number_perm+0x1dd/0x520 [ 2906.272911][T22600] ? tomoyo_path_number_perm+0x193/0x520 [ 2906.272926][T22600] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2906.272938][T22600] ? __kasan_check_read+0x11/0x20 [ 2906.272958][T22600] ? __kasan_check_read+0x11/0x20 [ 2906.320849][T22600] ? __fget+0x384/0x560 [ 2906.320875][T22600] ? ksys_dup3+0x3e0/0x3e0 [ 2906.345793][T22600] ? do_sys_open+0x31d/0x5d0 [ 2906.350403][T22600] tomoyo_file_ioctl+0x23/0x30 [ 2906.350422][T22600] security_file_ioctl+0x77/0xc0 [ 2906.350438][T22600] ksys_ioctl+0x57/0xd0 [ 2906.350458][T22600] __x64_sys_ioctl+0x73/0xb0 [ 2906.369199][T22600] do_syscall_64+0xfd/0x6a0 [ 2906.373723][T22600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2906.379631][T22600] RIP: 0033:0x459697 [ 2906.383536][T22600] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2906.403583][T22600] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2906.412450][T22600] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2906.420446][T22600] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2906.428430][T22600] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2906.436500][T22600] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2906.444569][T22600] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(r3, 0x0) 15:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2600, 0x0) connect$tipc(r1, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x2, 0x4}}, 0x10) [ 2906.457312][T22600] ERROR: Out of memory at tomoyo_realpath_from_path. 15:04:59 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000300"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:04:59 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000900) 15:04:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:04:59 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fstatfs(r3, 0x0) 15:04:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) dup2(r0, r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0xd1) ioctl$TIOCSIG(r1, 0x40045436, 0x24) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2907.049669][T22744] FAULT_INJECTION: forcing a failure. [ 2907.049669][T22744] name failslab, interval 1, probability 0, space 0, times 0 [ 2907.064400][T22744] CPU: 1 PID: 22744 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2907.072442][T22744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2907.082542][T22744] Call Trace: [ 2907.085895][T22744] dump_stack+0x172/0x1f0 [ 2907.090682][T22744] should_fail.cold+0xa/0x15 15:04:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2907.095481][T22744] ? __blkdev_get+0x19b/0x1660 [ 2907.100372][T22744] ? fault_create_debugfs_attr+0x180/0x180 [ 2907.106314][T22744] ? page_to_nid.part.0+0x20/0x20 [ 2907.111357][T22744] ? ___might_sleep+0x163/0x280 [ 2907.116233][T22744] __should_failslab+0x121/0x190 [ 2907.121201][T22744] should_failslab+0x9/0x14 [ 2907.125724][T22744] kmem_cache_alloc_trace+0x2d3/0x790 [ 2907.131138][T22744] ? lockdep_init_map+0x1be/0x6d0 [ 2907.136160][T22744] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2907.141643][T22744] __kthread_create_on_node+0xf2/0x460 [ 2907.147200][T22744] ? lock_acquire+0x190/0x410 [ 2907.151982][T22744] ? __kthread_parkme+0x1c0/0x1c0 [ 2907.157019][T22744] ? loop_set_fd+0xb5/0x10c0 [ 2907.161607][T22744] ? mutex_lock_io_nested+0x1260/0x1260 [ 2907.167157][T22744] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2907.172612][T22744] kthread_create_on_node+0xbb/0xf0 [ 2907.177910][T22744] ? __kthread_create_on_node+0x460/0x460 [ 2907.183971][T22744] ? lockdep_init_map+0x1be/0x6d0 [ 2907.189003][T22744] ? lockdep_init_map+0x1be/0x6d0 [ 2907.194030][T22744] loop_set_fd+0x342/0x10c0 [ 2907.198542][T22744] lo_ioctl+0x1a3/0x1460 [ 2907.203233][T22744] ? trace_hardirqs_on+0x67/0x240 [ 2907.208417][T22744] ? loop_set_fd+0x10c0/0x10c0 [ 2907.213193][T22744] blkdev_ioctl+0xedb/0x1c1a [ 2907.217798][T22744] ? blkpg_ioctl+0xa90/0xa90 [ 2907.222495][T22744] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2907.228899][T22744] ? __kasan_check_read+0x11/0x20 [ 2907.233923][T22744] ? __kasan_check_read+0x11/0x20 [ 2907.239029][T22744] block_ioctl+0xee/0x130 [ 2907.243373][T22744] ? blkdev_fallocate+0x410/0x410 [ 2907.248414][T22744] do_vfs_ioctl+0xdb6/0x13e0 [ 2907.253006][T22744] ? ioctl_preallocate+0x210/0x210 [ 2907.258230][T22744] ? __fget+0x384/0x560 [ 2907.262390][T22744] ? ksys_dup3+0x3e0/0x3e0 [ 2907.266810][T22744] ? do_sys_open+0x31d/0x5d0 [ 2907.271583][T22744] ? tomoyo_file_ioctl+0x23/0x30 [ 2907.277454][T22744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.284432][T22744] ? security_file_ioctl+0x8d/0xc0 [ 2907.289557][T22744] ksys_ioctl+0xab/0xd0 [ 2907.293711][T22744] __x64_sys_ioctl+0x73/0xb0 [ 2907.299905][T22744] do_syscall_64+0xfd/0x6a0 [ 2907.304406][T22744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2907.310287][T22744] RIP: 0033:0x459697 [ 2907.314167][T22744] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2907.333856][T22744] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2907.342292][T22744] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 15:04:59 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000901) 15:04:59 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2907.350892][T22744] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2907.359831][T22744] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2907.367830][T22744] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2907.376116][T22744] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:04:59 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:04:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x10}}, 0x41) 15:05:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2907.648742][T22773] FAULT_INJECTION: forcing a failure. [ 2907.648742][T22773] name failslab, interval 1, probability 0, space 0, times 0 [ 2907.661813][T22773] CPU: 1 PID: 22773 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2907.670600][T22773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2907.680667][T22773] Call Trace: [ 2907.683957][T22773] dump_stack+0x172/0x1f0 [ 2907.688374][T22773] should_fail.cold+0xa/0x15 [ 2907.692962][T22773] ? lock_downgrade+0x920/0x920 [ 2907.697910][T22773] ? fault_create_debugfs_attr+0x180/0x180 [ 2907.704104][T22773] ? page_to_nid.part.0+0x20/0x20 [ 2907.709331][T22773] ? ___might_sleep+0x163/0x280 [ 2907.714450][T22773] __should_failslab+0x121/0x190 [ 2907.719417][T22773] should_failslab+0x9/0x14 [ 2907.724059][T22773] kmem_cache_alloc+0x2aa/0x710 [ 2907.729071][T22773] ? __schedule+0xfa5/0x1580 [ 2907.733808][T22773] ? __kasan_check_read+0x11/0x20 [ 2907.739792][T22773] __kernfs_new_node+0xf0/0x6c0 [ 2907.744666][T22773] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2907.750163][T22773] ? trace_hardirqs_on+0x67/0x240 [ 2907.755210][T22773] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2907.760440][T22773] ? __schedule+0xfa5/0x1580 [ 2907.765045][T22773] ? __sched_text_start+0x8/0x8 [ 2907.769908][T22773] ? account_entity_enqueue+0x244/0x390 [ 2907.775560][T22773] kernfs_new_node+0x96/0x120 [ 2907.780332][T22773] kernfs_create_dir_ns+0x52/0x160 [ 2907.785466][T22773] internal_create_group+0x7f4/0xc30 [ 2907.790763][T22773] ? bd_set_size+0x3f/0xb0 [ 2907.795179][T22773] ? remove_files.isra.0+0x190/0x190 [ 2907.800479][T22773] ? __down_timeout+0x2d0/0x2d0 [ 2907.805349][T22773] ? __kasan_check_write+0x14/0x20 [ 2907.810564][T22773] ? up_write+0x9d/0x280 [ 2907.814826][T22773] sysfs_create_group+0x20/0x30 [ 2907.819966][T22773] loop_set_fd+0xb3b/0x10c0 [ 2907.824463][T22773] lo_ioctl+0x1a3/0x1460 [ 2907.828704][T22773] ? trace_hardirqs_on+0x67/0x240 [ 2907.833894][T22773] ? loop_set_fd+0x10c0/0x10c0 [ 2907.838652][T22773] blkdev_ioctl+0xedb/0x1c1a [ 2907.843261][T22773] ? blkpg_ioctl+0xa90/0xa90 [ 2907.847859][T22773] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2907.853747][T22773] ? __kasan_check_read+0x11/0x20 [ 2907.858768][T22773] ? __kasan_check_read+0x11/0x20 [ 2907.863798][T22773] block_ioctl+0xee/0x130 [ 2907.868250][T22773] ? blkdev_fallocate+0x410/0x410 [ 2907.873386][T22773] do_vfs_ioctl+0xdb6/0x13e0 [ 2907.877979][T22773] ? ioctl_preallocate+0x210/0x210 [ 2907.883277][T22773] ? __fget+0x384/0x560 [ 2907.887449][T22773] ? ksys_dup3+0x3e0/0x3e0 [ 2907.891863][T22773] ? do_sys_open+0x31d/0x5d0 [ 2907.896928][T22773] ? tomoyo_file_ioctl+0x23/0x30 [ 2907.901869][T22773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.908130][T22773] ? security_file_ioctl+0x8d/0xc0 [ 2907.913251][T22773] ksys_ioctl+0xab/0xd0 [ 2907.917605][T22773] __x64_sys_ioctl+0x73/0xb0 [ 2907.922212][T22773] do_syscall_64+0xfd/0x6a0 [ 2907.926716][T22773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2907.932621][T22773] RIP: 0033:0x459697 [ 2907.936530][T22773] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2907.956445][T22773] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2907.964879][T22773] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2907.972867][T22773] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2907.980826][T22773] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2907.988786][T22773] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2907.996749][T22773] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:00 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000400"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:00 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000a00) 15:05:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0218006c7ca43022b01bcf22b424e1bf1a000000000000000000ff7fffff50"], 0x10}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x2d, 0x4, 0xff, "7ca9252d848cfcf03821edc953ea25f1", "8e664fcbefb88d76ce9e1fd059340caa0ebd32f51d250536"}, 0x2d, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'nr0\x00', 0x800}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x94000, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000100)={0x34, 0x6, 0x0, {0x5, 0x0, 0xb, 0x0, ':^)/em0self'}}, 0x34) 15:05:00 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:00 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000a01) 15:05:00 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2908.370895][T22802] FAULT_INJECTION: forcing a failure. [ 2908.370895][T22802] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.384580][T22802] CPU: 0 PID: 22802 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2908.392691][T22802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2908.403376][T22802] Call Trace: [ 2908.406700][T22802] dump_stack+0x172/0x1f0 [ 2908.411089][T22802] should_fail.cold+0xa/0x15 [ 2908.415741][T22802] ? fault_create_debugfs_attr+0x180/0x180 [ 2908.421623][T22802] ? page_to_nid.part.0+0x20/0x20 [ 2908.426760][T22802] ? ___might_sleep+0x163/0x280 [ 2908.431656][T22802] __should_failslab+0x121/0x190 [ 2908.436671][T22802] should_failslab+0x9/0x14 [ 2908.441185][T22802] kmem_cache_alloc+0x2aa/0x710 [ 2908.446066][T22802] ? __mutex_lock+0x45d/0x13c0 [ 2908.450848][T22802] __kernfs_new_node+0xf0/0x6c0 [ 2908.455876][T22802] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2908.461335][T22802] ? wait_for_completion+0x440/0x440 [ 2908.466659][T22802] ? __kasan_check_write+0x14/0x20 [ 2908.471784][T22802] ? mutex_unlock+0xd/0x10 [ 2908.476628][T22802] ? kernfs_activate+0x192/0x1f0 [ 2908.481672][T22802] kernfs_new_node+0x96/0x120 [ 2908.486377][T22802] __kernfs_create_file+0x51/0x33b [ 2908.492005][T22802] sysfs_add_file_mode_ns+0x222/0x560 [ 2908.497407][T22802] internal_create_group+0x359/0xc30 [ 2908.502714][T22802] ? bd_set_size+0x3f/0xb0 [ 2908.507234][T22802] ? remove_files.isra.0+0x190/0x190 [ 2908.512550][T22802] ? __down_timeout+0x2d0/0x2d0 [ 2908.517441][T22802] ? __kasan_check_write+0x14/0x20 [ 2908.522550][T22802] ? up_write+0x9d/0x280 [ 2908.526819][T22802] sysfs_create_group+0x20/0x30 [ 2908.531668][T22802] loop_set_fd+0xb3b/0x10c0 [ 2908.536166][T22802] lo_ioctl+0x1a3/0x1460 [ 2908.540507][T22802] ? trace_hardirqs_on+0x67/0x240 [ 2908.545533][T22802] ? loop_set_fd+0x10c0/0x10c0 [ 2908.550324][T22802] blkdev_ioctl+0xedb/0x1c1a [ 2908.554950][T22802] ? blkpg_ioctl+0xa90/0xa90 [ 2908.559575][T22802] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2908.565456][T22802] ? __kasan_check_read+0x11/0x20 [ 2908.570601][T22802] ? __kasan_check_read+0x11/0x20 [ 2908.575710][T22802] block_ioctl+0xee/0x130 [ 2908.580048][T22802] ? blkdev_fallocate+0x410/0x410 [ 2908.585101][T22802] do_vfs_ioctl+0xdb6/0x13e0 [ 2908.589860][T22802] ? ioctl_preallocate+0x210/0x210 [ 2908.595129][T22802] ? __fget+0x384/0x560 [ 2908.599368][T22802] ? ksys_dup3+0x3e0/0x3e0 [ 2908.603847][T22802] ? do_sys_open+0x31d/0x5d0 [ 2908.608540][T22802] ? tomoyo_file_ioctl+0x23/0x30 [ 2908.613600][T22802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.619874][T22802] ? security_file_ioctl+0x8d/0xc0 [ 2908.625072][T22802] ksys_ioctl+0xab/0xd0 [ 2908.629252][T22802] __x64_sys_ioctl+0x73/0xb0 [ 2908.633880][T22802] do_syscall_64+0xfd/0x6a0 [ 2908.638412][T22802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2908.644328][T22802] RIP: 0033:0x459697 [ 2908.648224][T22802] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:05:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2908.671205][T22802] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2908.679607][T22802] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2908.687574][T22802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2908.695759][T22802] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2908.703720][T22802] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2908.712186][T22802] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:01 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000b00) 15:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x5, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="021800dc8090a527498d475b6c5405ee"], 0x10}}, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x0, 0x80000) 15:05:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2908.915574][T22826] QAT: Invalid ioctl 15:05:01 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2908.984932][T22835] QAT: Invalid ioctl [ 2909.041723][T22839] FAULT_INJECTION: forcing a failure. [ 2909.041723][T22839] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.060551][T22839] CPU: 0 PID: 22839 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2909.068571][T22839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2909.079027][T22839] Call Trace: [ 2909.082624][T22839] dump_stack+0x172/0x1f0 [ 2909.086978][T22839] should_fail.cold+0xa/0x15 [ 2909.091619][T22839] ? fault_create_debugfs_attr+0x180/0x180 [ 2909.097449][T22839] ? page_to_nid.part.0+0x20/0x20 [ 2909.102516][T22839] ? ___might_sleep+0x163/0x280 [ 2909.107389][T22839] __should_failslab+0x121/0x190 [ 2909.112451][T22839] should_failslab+0x9/0x14 [ 2909.116980][T22839] kmem_cache_alloc+0x2aa/0x710 [ 2909.121844][T22839] ? kernfs_activate+0x192/0x1f0 [ 2909.126792][T22839] ? __kasan_check_read+0x11/0x20 [ 2909.131801][T22839] ? __mutex_lock+0x45d/0x13c0 [ 2909.136634][T22839] __kernfs_new_node+0xf0/0x6c0 [ 2909.141478][T22839] ? __mutex_lock+0x45d/0x13c0 [ 2909.146334][T22839] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2909.152025][T22839] ? __kasan_check_write+0x14/0x20 [ 2909.157345][T22839] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2909.162889][T22839] ? wait_for_completion+0x440/0x440 [ 2909.168641][T22839] kernfs_new_node+0x96/0x120 [ 2909.173339][T22839] __kernfs_create_file+0x51/0x33b [ 2909.178500][T22839] sysfs_add_file_mode_ns+0x222/0x560 [ 2909.183920][T22839] internal_create_group+0x359/0xc30 [ 2909.189309][T22839] ? bd_set_size+0x3f/0xb0 [ 2909.193923][T22839] ? remove_files.isra.0+0x190/0x190 [ 2909.199430][T22839] ? __down_timeout+0x2d0/0x2d0 [ 2909.204578][T22839] ? __kasan_check_write+0x14/0x20 [ 2909.209892][T22839] ? up_write+0x9d/0x280 [ 2909.214216][T22839] sysfs_create_group+0x20/0x30 [ 2909.219196][T22839] loop_set_fd+0xb3b/0x10c0 [ 2909.223725][T22839] lo_ioctl+0x1a3/0x1460 [ 2909.228000][T22839] ? trace_hardirqs_on+0x67/0x240 [ 2909.233042][T22839] ? loop_set_fd+0x10c0/0x10c0 [ 2909.237912][T22839] blkdev_ioctl+0xedb/0x1c1a 15:05:01 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:01 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000b01) 15:05:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0x4, 'syz0\x00'}) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:01 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000c00) [ 2909.242573][T22839] ? blkpg_ioctl+0xa90/0xa90 [ 2909.247190][T22839] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2909.253016][T22839] ? __kasan_check_read+0x11/0x20 [ 2909.258063][T22839] ? __kasan_check_read+0x11/0x20 [ 2909.263394][T22839] block_ioctl+0xee/0x130 [ 2909.268042][T22839] ? blkdev_fallocate+0x410/0x410 [ 2909.273373][T22839] do_vfs_ioctl+0xdb6/0x13e0 [ 2909.277981][T22839] ? ioctl_preallocate+0x210/0x210 [ 2909.283100][T22839] ? __fget+0x384/0x560 [ 2909.287465][T22839] ? ksys_dup3+0x3e0/0x3e0 [ 2909.291884][T22839] ? do_sys_open+0x31d/0x5d0 [ 2909.296494][T22839] ? tomoyo_file_ioctl+0x23/0x30 [ 2909.301889][T22839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2909.308416][T22839] ? security_file_ioctl+0x8d/0xc0 [ 2909.313537][T22839] ksys_ioctl+0xab/0xd0 [ 2909.317769][T22839] __x64_sys_ioctl+0x73/0xb0 [ 2909.322369][T22839] do_syscall_64+0xfd/0x6a0 [ 2909.326871][T22839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2909.332759][T22839] RIP: 0033:0x459697 [ 2909.336645][T22839] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2909.356637][T22839] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2909.365055][T22839] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2909.373488][T22839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2909.381799][T22839] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:05:01 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000c01) [ 2909.389894][T22839] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2909.400553][T22839] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:02 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:02 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x3, 0x80000001, &(0x7f0000000100)=0x7a1a}) 15:05:02 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:02 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000d00) 15:05:02 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1b, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2909.698664][T22876] FAULT_INJECTION: forcing a failure. [ 2909.698664][T22876] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.735261][T22876] CPU: 0 PID: 22876 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2909.743299][T22876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2909.753373][T22876] Call Trace: [ 2909.756707][T22876] dump_stack+0x172/0x1f0 [ 2909.761090][T22876] should_fail.cold+0xa/0x15 [ 2909.765706][T22876] ? fault_create_debugfs_attr+0x180/0x180 [ 2909.771532][T22876] ? page_to_nid.part.0+0x20/0x20 [ 2909.776607][T22876] ? ___might_sleep+0x163/0x280 [ 2909.781477][T22876] __should_failslab+0x121/0x190 [ 2909.786464][T22876] should_failslab+0x9/0x14 [ 2909.790988][T22876] kmem_cache_alloc+0x2aa/0x710 [ 2909.795867][T22876] ? __mutex_lock+0x45d/0x13c0 [ 2909.800670][T22876] __kernfs_new_node+0xf0/0x6c0 [ 2909.805725][T22876] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2909.811212][T22876] ? wait_for_completion+0x440/0x440 [ 2909.816554][T22876] ? __kasan_check_write+0x14/0x20 [ 2909.821703][T22876] ? mutex_unlock+0xd/0x10 [ 2909.826153][T22876] ? kernfs_activate+0x192/0x1f0 [ 2909.831117][T22876] kernfs_new_node+0x96/0x120 [ 2909.835845][T22876] __kernfs_create_file+0x51/0x33b [ 2909.841108][T22876] sysfs_add_file_mode_ns+0x222/0x560 [ 2909.846509][T22876] internal_create_group+0x359/0xc30 [ 2909.852255][T22876] ? bd_set_size+0x3f/0xb0 [ 2909.856696][T22876] ? remove_files.isra.0+0x190/0x190 [ 2909.861992][T22876] ? __down_timeout+0x2d0/0x2d0 [ 2909.867217][T22876] ? __kasan_check_write+0x14/0x20 [ 2909.873055][T22876] ? up_write+0x9d/0x280 [ 2909.878021][T22876] sysfs_create_group+0x20/0x30 [ 2909.882893][T22876] loop_set_fd+0xb3b/0x10c0 [ 2909.887421][T22876] lo_ioctl+0x1a3/0x1460 [ 2909.891668][T22876] ? trace_hardirqs_on+0x67/0x240 [ 2909.896688][T22876] ? loop_set_fd+0x10c0/0x10c0 [ 2909.901441][T22876] blkdev_ioctl+0xedb/0x1c1a [ 2909.906021][T22876] ? blkpg_ioctl+0xa90/0xa90 [ 2909.910648][T22876] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2909.916464][T22876] ? __kasan_check_read+0x11/0x20 [ 2909.921483][T22876] ? __kasan_check_read+0x11/0x20 [ 2909.926502][T22876] block_ioctl+0xee/0x130 [ 2909.930845][T22876] ? blkdev_fallocate+0x410/0x410 [ 2909.935862][T22876] do_vfs_ioctl+0xdb6/0x13e0 [ 2909.940437][T22876] ? ioctl_preallocate+0x210/0x210 [ 2909.945555][T22876] ? __fget+0x384/0x560 [ 2909.949702][T22876] ? ksys_dup3+0x3e0/0x3e0 [ 2909.954123][T22876] ? do_sys_open+0x31d/0x5d0 [ 2909.958826][T22876] ? tomoyo_file_ioctl+0x23/0x30 [ 2909.963787][T22876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2909.970024][T22876] ? security_file_ioctl+0x8d/0xc0 [ 2909.975135][T22876] ksys_ioctl+0xab/0xd0 [ 2909.979309][T22876] __x64_sys_ioctl+0x73/0xb0 [ 2909.983901][T22876] do_syscall_64+0xfd/0x6a0 [ 2909.988401][T22876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2909.994304][T22876] RIP: 0033:0x459697 [ 2909.998198][T22876] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2910.017968][T22876] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2910.026369][T22876] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2910.034420][T22876] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2910.042391][T22876] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2910.050366][T22876] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2910.058344][T22876] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:02 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000600"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:02 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000d01) 15:05:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="241800020000000000000000000020003dff3ad6c7e665108a77105d4b81e04c820bc84197fdab663f4c4d33e22973ed96ba0083484a4c4694633cc796"], 0x10}}, 0x0) listen(r0, 0x6d9) 15:05:02 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:02 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000e00) [ 2910.355732][T22907] FAULT_INJECTION: forcing a failure. [ 2910.355732][T22907] name failslab, interval 1, probability 0, space 0, times 0 [ 2910.369175][T22907] CPU: 0 PID: 22907 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2910.377176][T22907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2910.387243][T22907] Call Trace: [ 2910.390548][T22907] dump_stack+0x172/0x1f0 [ 2910.394900][T22907] should_fail.cold+0xa/0x15 [ 2910.399501][T22907] ? fault_create_debugfs_attr+0x180/0x180 [ 2910.405338][T22907] ? page_to_nid.part.0+0x20/0x20 [ 2910.410378][T22907] ? ___might_sleep+0x163/0x280 [ 2910.415278][T22907] __should_failslab+0x121/0x190 [ 2910.420249][T22907] should_failslab+0x9/0x14 [ 2910.424787][T22907] kmem_cache_alloc+0x2aa/0x710 [ 2910.429649][T22907] ? __mutex_lock+0x45d/0x13c0 [ 2910.434467][T22907] __kernfs_new_node+0xf0/0x6c0 [ 2910.439324][T22907] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2910.444886][T22907] ? wait_for_completion+0x440/0x440 [ 2910.450198][T22907] ? __kasan_check_write+0x14/0x20 [ 2910.455311][T22907] ? mutex_unlock+0xd/0x10 [ 2910.459733][T22907] ? kernfs_activate+0x192/0x1f0 [ 2910.464947][T22907] kernfs_new_node+0x96/0x120 [ 2910.469995][T22907] __kernfs_create_file+0x51/0x33b [ 2910.475127][T22907] sysfs_add_file_mode_ns+0x222/0x560 [ 2910.480520][T22907] internal_create_group+0x359/0xc30 [ 2910.486538][T22907] ? bd_set_size+0x3f/0xb0 [ 2910.490952][T22907] ? remove_files.isra.0+0x190/0x190 [ 2910.496233][T22907] ? __down_timeout+0x2d0/0x2d0 [ 2910.501080][T22907] ? __kasan_check_write+0x14/0x20 [ 2910.506183][T22907] ? up_write+0x9d/0x280 [ 2910.510714][T22907] sysfs_create_group+0x20/0x30 [ 2910.515582][T22907] loop_set_fd+0xb3b/0x10c0 [ 2910.520119][T22907] lo_ioctl+0x1a3/0x1460 [ 2910.524372][T22907] ? trace_hardirqs_on+0x67/0x240 [ 2910.529407][T22907] ? loop_set_fd+0x10c0/0x10c0 [ 2910.534165][T22907] blkdev_ioctl+0xedb/0x1c1a [ 2910.538750][T22907] ? blkpg_ioctl+0xa90/0xa90 [ 2910.543344][T22907] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2910.549157][T22907] ? __kasan_check_read+0x11/0x20 [ 2910.554196][T22907] ? __kasan_check_read+0x11/0x20 [ 2910.559220][T22907] block_ioctl+0xee/0x130 [ 2910.563542][T22907] ? blkdev_fallocate+0x410/0x410 [ 2910.568586][T22907] do_vfs_ioctl+0xdb6/0x13e0 [ 2910.573203][T22907] ? ioctl_preallocate+0x210/0x210 [ 2910.578324][T22907] ? __fget+0x384/0x560 [ 2910.582497][T22907] ? ksys_dup3+0x3e0/0x3e0 [ 2910.586920][T22907] ? do_sys_open+0x31d/0x5d0 [ 2910.591586][T22907] ? tomoyo_file_ioctl+0x23/0x30 [ 2910.596534][T22907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2910.602772][T22907] ? security_file_ioctl+0x8d/0xc0 [ 2910.607909][T22907] ksys_ioctl+0xab/0xd0 [ 2910.612049][T22907] __x64_sys_ioctl+0x73/0xb0 [ 2910.616642][T22907] do_syscall_64+0xfd/0x6a0 [ 2910.621144][T22907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2910.627048][T22907] RIP: 0033:0x459697 [ 2910.630957][T22907] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:05:03 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') 15:05:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2910.650878][T22907] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2910.659309][T22907] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2910.667273][T22907] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2910.675763][T22907] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2910.683751][T22907] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2910.691742][T22907] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000380)={0x4b, 0x7d, 0x2, {0x0, 0x44, 0x10000, 0x8, {0x40, 0x1, 0x8}, 0x8010000, 0x8, 0x104, 0x3f, 0x10, 'procselfnodevGPL', 0x0, '', 0x0, '', 0x1, '/'}}, 0x4b) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000000100)=""/108, &(0x7f0000000180)=""/230, &(0x7f0000000280)=""/179, 0x10000}) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="0218000002000000000000000000000099140463eb41d1b31b331473b54ec1"], 0x10}}, 0x0) 15:05:03 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:03 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000e01) 15:05:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2910.937814][T22936] FAULT_INJECTION: forcing a failure. [ 2910.937814][T22936] name failslab, interval 1, probability 0, space 0, times 0 [ 2910.955295][T22936] CPU: 0 PID: 22936 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2910.963323][T22936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2910.973390][T22936] Call Trace: [ 2910.976703][T22936] dump_stack+0x172/0x1f0 [ 2910.981045][T22936] should_fail.cold+0xa/0x15 [ 2910.986044][T22936] ? fault_create_debugfs_attr+0x180/0x180 [ 2910.991983][T22936] ? page_to_nid.part.0+0x20/0x20 [ 2910.997305][T22936] ? ___might_sleep+0x163/0x280 [ 2911.002159][T22936] __should_failslab+0x121/0x190 [ 2911.007099][T22936] should_failslab+0x9/0x14 [ 2911.011630][T22936] kmem_cache_alloc+0x2aa/0x710 [ 2911.016510][T22936] ? __mutex_lock+0x45d/0x13c0 [ 2911.021290][T22936] __kernfs_new_node+0xf0/0x6c0 [ 2911.027370][T22936] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2911.033092][T22936] ? wait_for_completion+0x440/0x440 [ 2911.038539][T22936] ? __kasan_check_write+0x14/0x20 [ 2911.044354][T22936] ? mutex_unlock+0xd/0x10 [ 2911.048817][T22936] ? kernfs_activate+0x192/0x1f0 [ 2911.053783][T22936] kernfs_new_node+0x96/0x120 [ 2911.058769][T22936] __kernfs_create_file+0x51/0x33b [ 2911.064264][T22936] sysfs_add_file_mode_ns+0x222/0x560 [ 2911.069656][T22936] internal_create_group+0x359/0xc30 [ 2911.074976][T22936] ? bd_set_size+0x3f/0xb0 [ 2911.079612][T22936] ? remove_files.isra.0+0x190/0x190 [ 2911.085202][T22936] ? __down_timeout+0x2d0/0x2d0 [ 2911.090167][T22936] ? __kasan_check_write+0x14/0x20 [ 2911.095826][T22936] ? up_write+0x9d/0x280 [ 2911.100169][T22936] sysfs_create_group+0x20/0x30 [ 2911.105141][T22936] loop_set_fd+0xb3b/0x10c0 [ 2911.109756][T22936] lo_ioctl+0x1a3/0x1460 [ 2911.114108][T22936] ? trace_hardirqs_on+0x67/0x240 [ 2911.119341][T22936] ? loop_set_fd+0x10c0/0x10c0 [ 2911.124138][T22936] blkdev_ioctl+0xedb/0x1c1a [ 2911.129665][T22936] ? blkpg_ioctl+0xa90/0xa90 [ 2911.134687][T22936] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2911.140490][T22936] ? __kasan_check_read+0x11/0x20 [ 2911.145534][T22936] ? __kasan_check_read+0x11/0x20 [ 2911.150572][T22936] block_ioctl+0xee/0x130 [ 2911.154935][T22936] ? blkdev_fallocate+0x410/0x410 [ 2911.161024][T22936] do_vfs_ioctl+0xdb6/0x13e0 [ 2911.165822][T22936] ? ioctl_preallocate+0x210/0x210 [ 2911.171062][T22936] ? __fget+0x384/0x560 [ 2911.175390][T22936] ? ksys_dup3+0x3e0/0x3e0 [ 2911.179803][T22936] ? do_sys_open+0x31d/0x5d0 [ 2911.184403][T22936] ? tomoyo_file_ioctl+0x23/0x30 [ 2911.189655][T22936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.197349][T22936] ? security_file_ioctl+0x8d/0xc0 [ 2911.203625][T22936] ksys_ioctl+0xab/0xd0 [ 2911.207791][T22936] __x64_sys_ioctl+0x73/0xb0 [ 2911.212395][T22936] do_syscall_64+0xfd/0x6a0 [ 2911.216909][T22936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2911.223205][T22936] RIP: 0033:0x459697 [ 2911.227106][T22936] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2911.247338][T22936] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2911.256110][T22936] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2911.264306][T22936] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2911.272286][T22936] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2911.280360][T22936] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2911.288657][T22936] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:04 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x400000, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x400c40, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB="c01100000000800000000000"]) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) chroot(&(0x7f0000000200)='./file0\x00') fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 15:05:04 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000f00) 15:05:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:04 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2911.626888][T22968] FAULT_INJECTION: forcing a failure. [ 2911.626888][T22968] name failslab, interval 1, probability 0, space 0, times 0 [ 2911.647924][T22968] CPU: 1 PID: 22968 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2911.655960][T22968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2911.666130][T22968] Call Trace: [ 2911.669479][T22968] dump_stack+0x172/0x1f0 [ 2911.674066][T22968] should_fail.cold+0xa/0x15 [ 2911.678825][T22968] ? fault_create_debugfs_attr+0x180/0x180 [ 2911.684758][T22968] ? page_to_nid.part.0+0x20/0x20 [ 2911.689785][T22968] ? ___might_sleep+0x163/0x280 [ 2911.694745][T22968] __should_failslab+0x121/0x190 [ 2911.700646][T22968] should_failslab+0x9/0x14 [ 2911.705163][T22968] kmem_cache_alloc+0x2aa/0x710 [ 2911.710815][T22968] ? __mutex_lock+0x45d/0x13c0 [ 2911.715883][T22968] __kernfs_new_node+0xf0/0x6c0 [ 2911.721866][T22968] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2911.727434][T22968] ? wait_for_completion+0x440/0x440 [ 2911.732725][T22968] ? __kasan_check_write+0x14/0x20 [ 2911.737860][T22968] ? mutex_unlock+0xd/0x10 [ 2911.742388][T22968] ? kernfs_activate+0x192/0x1f0 [ 2911.747347][T22968] kernfs_new_node+0x96/0x120 [ 2911.752360][T22968] __kernfs_create_file+0x51/0x33b [ 2911.757485][T22968] sysfs_add_file_mode_ns+0x222/0x560 [ 2911.762867][T22968] internal_create_group+0x359/0xc30 [ 2911.768305][T22968] ? bd_set_size+0x3f/0xb0 [ 2911.773102][T22968] ? remove_files.isra.0+0x190/0x190 [ 2911.778537][T22968] ? __down_timeout+0x2d0/0x2d0 [ 2911.783410][T22968] ? __kasan_check_write+0x14/0x20 [ 2911.788528][T22968] ? up_write+0x9d/0x280 [ 2911.792913][T22968] sysfs_create_group+0x20/0x30 [ 2911.797771][T22968] loop_set_fd+0xb3b/0x10c0 [ 2911.802284][T22968] lo_ioctl+0x1a3/0x1460 [ 2911.806543][T22968] ? trace_hardirqs_on+0x67/0x240 [ 2911.811594][T22968] ? loop_set_fd+0x10c0/0x10c0 [ 2911.816354][T22968] blkdev_ioctl+0xedb/0x1c1a [ 2911.821112][T22968] ? blkpg_ioctl+0xa90/0xa90 [ 2911.825797][T22968] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2911.832646][T22968] ? __kasan_check_read+0x11/0x20 [ 2911.837669][T22968] ? __kasan_check_read+0x11/0x20 [ 2911.842702][T22968] block_ioctl+0xee/0x130 [ 2911.847020][T22968] ? blkdev_fallocate+0x410/0x410 [ 2911.852055][T22968] do_vfs_ioctl+0xdb6/0x13e0 [ 2911.856758][T22968] ? ioctl_preallocate+0x210/0x210 [ 2911.861871][T22968] ? __fget+0x384/0x560 [ 2911.866017][T22968] ? ksys_dup3+0x3e0/0x3e0 [ 2911.870416][T22968] ? do_sys_open+0x31d/0x5d0 [ 2911.875016][T22968] ? tomoyo_file_ioctl+0x23/0x30 [ 2911.879995][T22968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.886471][T22968] ? security_file_ioctl+0x8d/0xc0 [ 2911.891597][T22968] ksys_ioctl+0xab/0xd0 [ 2911.895771][T22968] __x64_sys_ioctl+0x73/0xb0 [ 2911.900388][T22968] do_syscall_64+0xfd/0x6a0 [ 2911.904898][T22968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2911.910779][T22968] RIP: 0033:0x459697 [ 2911.915022][T22968] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2911.934963][T22968] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2911.943477][T22968] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2911.951444][T22968] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2911.959410][T22968] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2911.967376][T22968] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 15:05:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:04 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) 15:05:04 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000f01) 15:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02180000f369833215b88bcd00000000"], 0x10}}, 0x0) [ 2911.975620][T22968] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:04 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001001) 15:05:04 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="021800002000"/16], 0x10}}, 0x0) [ 2912.277049][T22998] FAULT_INJECTION: forcing a failure. [ 2912.277049][T22998] name failslab, interval 1, probability 0, space 0, times 0 [ 2912.293619][T22998] CPU: 1 PID: 22998 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2912.302149][T22998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2912.313079][T22998] Call Trace: [ 2912.316457][T22998] dump_stack+0x172/0x1f0 [ 2912.321197][T22998] should_fail.cold+0xa/0x15 [ 2912.326398][T22998] ? fault_create_debugfs_attr+0x180/0x180 [ 2912.332205][T22998] ? page_to_nid.part.0+0x20/0x20 [ 2912.337238][T22998] ? ___might_sleep+0x163/0x280 [ 2912.342162][T22998] __should_failslab+0x121/0x190 [ 2912.347135][T22998] should_failslab+0x9/0x14 [ 2912.351636][T22998] kmem_cache_alloc+0x2aa/0x710 [ 2912.356487][T22998] ? __mutex_lock+0x45d/0x13c0 [ 2912.361458][T22998] __kernfs_new_node+0xf0/0x6c0 [ 2912.366471][T22998] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2912.371943][T22998] ? wait_for_completion+0x440/0x440 [ 2912.377253][T22998] ? __kasan_check_write+0x14/0x20 [ 2912.382387][T22998] ? mutex_unlock+0xd/0x10 [ 2912.386904][T22998] ? kernfs_activate+0x192/0x1f0 [ 2912.391936][T22998] kernfs_new_node+0x96/0x120 [ 2912.396762][T22998] __kernfs_create_file+0x51/0x33b [ 2912.403538][T22998] sysfs_add_file_mode_ns+0x222/0x560 [ 2912.409729][T22998] internal_create_group+0x359/0xc30 [ 2912.415621][T22998] ? bd_set_size+0x3f/0xb0 [ 2912.420040][T22998] ? remove_files.isra.0+0x190/0x190 [ 2912.425324][T22998] ? __down_timeout+0x2d0/0x2d0 [ 2912.430533][T22998] ? __kasan_check_write+0x14/0x20 [ 2912.435980][T22998] ? up_write+0x9d/0x280 [ 2912.441051][T22998] sysfs_create_group+0x20/0x30 [ 2912.446258][T22998] loop_set_fd+0xb3b/0x10c0 [ 2912.450937][T22998] lo_ioctl+0x1a3/0x1460 [ 2912.455352][T22998] ? trace_hardirqs_on+0x67/0x240 [ 2912.460399][T22998] ? loop_set_fd+0x10c0/0x10c0 [ 2912.465182][T22998] blkdev_ioctl+0xedb/0x1c1a [ 2912.469783][T22998] ? blkpg_ioctl+0xa90/0xa90 [ 2912.474375][T22998] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2912.480427][T22998] ? __kasan_check_read+0x11/0x20 [ 2912.485503][T22998] ? __kasan_check_read+0x11/0x20 [ 2912.490543][T22998] block_ioctl+0xee/0x130 [ 2912.495071][T22998] ? blkdev_fallocate+0x410/0x410 [ 2912.500144][T22998] do_vfs_ioctl+0xdb6/0x13e0 [ 2912.504759][T22998] ? ioctl_preallocate+0x210/0x210 [ 2912.509878][T22998] ? __fget+0x384/0x560 [ 2912.514045][T22998] ? ksys_dup3+0x3e0/0x3e0 [ 2912.518469][T22998] ? do_sys_open+0x31d/0x5d0 [ 2912.523059][T22998] ? tomoyo_file_ioctl+0x23/0x30 [ 2912.527995][T22998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2912.534233][T22998] ? security_file_ioctl+0x8d/0xc0 [ 2912.539951][T22998] ksys_ioctl+0xab/0xd0 [ 2912.544192][T22998] __x64_sys_ioctl+0x73/0xb0 [ 2912.548816][T22998] do_syscall_64+0xfd/0x6a0 [ 2912.553329][T22998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2912.559358][T22998] RIP: 0033:0x459697 [ 2912.563275][T22998] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2912.583991][T22998] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2912.592409][T22998] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2912.600403][T22998] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2912.608396][T22998] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2912.616365][T22998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2912.624347][T22998] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:05 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:05 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001100) 15:05:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02f60c945b817e4240bf00e000000000"], 0x10}}, 0x0) 15:05:05 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:05 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) 15:05:05 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001101) 15:05:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2912.949952][T23021] FAULT_INJECTION: forcing a failure. [ 2912.949952][T23021] name failslab, interval 1, probability 0, space 0, times 0 [ 2912.979369][T23021] CPU: 0 PID: 23021 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2912.987437][T23021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2912.997515][T23021] Call Trace: [ 2913.000829][T23021] dump_stack+0x172/0x1f0 [ 2913.005188][T23021] should_fail.cold+0xa/0x15 [ 2913.009808][T23021] ? fault_create_debugfs_attr+0x180/0x180 [ 2913.015650][T23021] ? page_to_nid.part.0+0x20/0x20 [ 2913.020699][T23021] ? ___might_sleep+0x163/0x280 [ 2913.026027][T23021] __should_failslab+0x121/0x190 [ 2913.030985][T23021] should_failslab+0x9/0x14 [ 2913.036411][T23021] kmem_cache_alloc_trace+0x2d3/0x790 [ 2913.041824][T23021] kobject_uevent_env+0x387/0x1023 [ 2913.046973][T23021] ? __kasan_check_write+0x14/0x20 [ 2913.052172][T23021] ? up_write+0x9d/0x280 [ 2913.056440][T23021] kobject_uevent+0x20/0x26 [ 2913.061157][T23021] loop_set_fd+0xbcc/0x10c0 [ 2913.065719][T23021] lo_ioctl+0x1a3/0x1460 [ 2913.069989][T23021] ? trace_hardirqs_on+0x67/0x240 [ 2913.075399][T23021] ? loop_set_fd+0x10c0/0x10c0 [ 2913.080352][T23021] blkdev_ioctl+0xedb/0x1c1a [ 2913.086657][T23021] ? blkpg_ioctl+0xa90/0xa90 [ 2913.091431][T23021] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2913.097242][T23021] ? __kasan_check_read+0x11/0x20 [ 2913.102281][T23021] ? __kasan_check_read+0x11/0x20 [ 2913.107574][T23021] block_ioctl+0xee/0x130 [ 2913.111924][T23021] ? blkdev_fallocate+0x410/0x410 [ 2913.117435][T23021] do_vfs_ioctl+0xdb6/0x13e0 [ 2913.122763][T23021] ? ioctl_preallocate+0x210/0x210 [ 2913.128936][T23021] ? __fget+0x384/0x560 [ 2913.133428][T23021] ? ksys_dup3+0x3e0/0x3e0 [ 2913.138733][T23021] ? do_sys_open+0x31d/0x5d0 [ 2913.143606][T23021] ? tomoyo_file_ioctl+0x23/0x30 [ 2913.150582][T23021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2913.157727][T23021] ? security_file_ioctl+0x8d/0xc0 [ 2913.162856][T23021] ksys_ioctl+0xab/0xd0 [ 2913.167133][T23021] __x64_sys_ioctl+0x73/0xb0 [ 2913.171743][T23021] do_syscall_64+0xfd/0x6a0 [ 2913.176518][T23021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2913.186420][T23021] RIP: 0033:0x459697 [ 2913.190845][T23021] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2913.210706][T23021] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2913.219313][T23021] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2913.228756][T23021] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2913.236971][T23021] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2913.245754][T23021] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2913.254789][T23021] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:05 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x9, @mcast2, 0x8001}}, 0x8000, 0x1, 0x0, 0x8, 0x80}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000240)={r1, 0x0, 0x9}, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x101000) 15:05:05 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001200) 15:05:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:05 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001201) 15:05:06 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:06 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x48}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r2, 0x7, 0x30, 0x93f, 0x800}, &(0x7f0000000300)=0x18) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10001, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000100)) 15:05:06 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001300) 15:05:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:06 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 2914.166964][T23074] FAULT_INJECTION: forcing a failure. [ 2914.166964][T23074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2914.180414][T23074] CPU: 1 PID: 23074 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2914.188665][T23074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2914.199005][T23074] Call Trace: [ 2914.202354][T23074] dump_stack+0x172/0x1f0 [ 2914.206809][T23074] should_fail.cold+0xa/0x15 15:05:06 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001301) [ 2914.211948][T23074] ? rwlock_bug.part.0+0x90/0x90 [ 2914.217579][T23074] ? fault_create_debugfs_attr+0x180/0x180 [ 2914.224646][T23074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.231718][T23074] ? debug_smp_processor_id+0x3c/0x214 [ 2914.238008][T23074] should_fail_alloc_page+0x50/0x60 [ 2914.243610][T23074] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2914.249635][T23074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.267675][T23074] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2914.273597][T23074] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2914.279342][T23074] ? __kasan_check_read+0x11/0x20 [ 2914.284461][T23074] ? fault_create_debugfs_attr+0x180/0x180 [ 2914.290378][T23074] cache_grow_begin+0x90/0xd20 [ 2914.295266][T23074] ? kobject_uevent_env+0x387/0x1023 [ 2914.300581][T23074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2914.307030][T23074] kmem_cache_alloc_trace+0x6b3/0x790 [ 2914.313680][T23074] kobject_uevent_env+0x387/0x1023 [ 2914.318990][T23074] ? __kasan_check_write+0x14/0x20 [ 2914.324415][T23074] ? up_write+0x9d/0x280 [ 2914.329740][T23074] kobject_uevent+0x20/0x26 [ 2914.334345][T23074] loop_set_fd+0xbcc/0x10c0 [ 2914.338860][T23074] lo_ioctl+0x1a3/0x1460 [ 2914.343136][T23074] ? trace_hardirqs_on+0x67/0x240 [ 2914.348153][T23074] ? loop_set_fd+0x10c0/0x10c0 [ 2914.352941][T23074] blkdev_ioctl+0xedb/0x1c1a [ 2914.358793][T23074] ? blkpg_ioctl+0xa90/0xa90 [ 2914.363487][T23074] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2914.369324][T23074] ? __kasan_check_read+0x11/0x20 [ 2914.374574][T23074] ? __kasan_check_read+0x11/0x20 [ 2914.379906][T23074] block_ioctl+0xee/0x130 [ 2914.384477][T23074] ? blkdev_fallocate+0x410/0x410 [ 2914.389592][T23074] do_vfs_ioctl+0xdb6/0x13e0 [ 2914.394735][T23074] ? ioctl_preallocate+0x210/0x210 [ 2914.399849][T23074] ? __fget+0x384/0x560 [ 2914.404019][T23074] ? ksys_dup3+0x3e0/0x3e0 [ 2914.408467][T23074] ? do_sys_open+0x31d/0x5d0 [ 2914.413063][T23074] ? tomoyo_file_ioctl+0x23/0x30 [ 2914.418674][T23074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.424907][T23074] ? security_file_ioctl+0x8d/0xc0 [ 2914.430031][T23074] ksys_ioctl+0xab/0xd0 [ 2914.434200][T23074] __x64_sys_ioctl+0x73/0xb0 [ 2914.438826][T23074] do_syscall_64+0xfd/0x6a0 [ 2914.443455][T23074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2914.449345][T23074] RIP: 0033:0x459697 [ 2914.453487][T23074] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2914.473254][T23074] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2914.481749][T23074] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2914.489717][T23074] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2914.498972][T23074] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2914.507153][T23074] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 15:05:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2914.515250][T23074] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2040, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'raw\x00', 0x2, [{}, {}]}, 0x48) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0xfffffffffffffeb1}}, 0x0) 15:05:07 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001400) 15:05:07 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2914.821368][T23110] FAULT_INJECTION: forcing a failure. [ 2914.821368][T23110] name failslab, interval 1, probability 0, space 0, times 0 [ 2914.840773][T23110] CPU: 1 PID: 23110 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2914.848781][T23110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2914.858857][T23110] Call Trace: [ 2914.862153][T23110] dump_stack+0x172/0x1f0 [ 2914.866592][T23110] should_fail.cold+0xa/0x15 [ 2914.871325][T23110] ? fault_create_debugfs_attr+0x180/0x180 [ 2914.877127][T23110] ? page_to_nid.part.0+0x20/0x20 [ 2914.882142][T23110] ? ___might_sleep+0x163/0x280 [ 2914.886999][T23110] __should_failslab+0x121/0x190 [ 2914.891960][T23110] should_failslab+0x9/0x14 [ 2914.896474][T23110] __kmalloc+0x2e0/0x770 [ 2914.900713][T23110] ? kasan_kmalloc+0x9/0x10 [ 2914.905210][T23110] ? kobject_get_path+0xc4/0x1b0 [ 2914.910304][T23110] kobject_get_path+0xc4/0x1b0 [ 2914.915594][T23110] kobject_uevent_env+0x3ab/0x1023 [ 2914.920713][T23110] ? __kasan_check_write+0x14/0x20 [ 2914.925815][T23110] ? up_write+0x9d/0x280 [ 2914.930135][T23110] kobject_uevent+0x20/0x26 [ 2914.934630][T23110] loop_set_fd+0xbcc/0x10c0 [ 2914.939160][T23110] lo_ioctl+0x1a3/0x1460 [ 2914.943481][T23110] ? trace_hardirqs_on+0x67/0x240 [ 2914.949032][T23110] ? loop_set_fd+0x10c0/0x10c0 [ 2914.953791][T23110] blkdev_ioctl+0xedb/0x1c1a [ 2914.958398][T23110] ? blkpg_ioctl+0xa90/0xa90 [ 2914.963025][T23110] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2914.968826][T23110] ? __kasan_check_read+0x11/0x20 [ 2914.974827][T23110] ? __kasan_check_read+0x11/0x20 [ 2914.979881][T23110] block_ioctl+0xee/0x130 [ 2914.984243][T23110] ? blkdev_fallocate+0x410/0x410 [ 2914.989453][T23110] do_vfs_ioctl+0xdb6/0x13e0 [ 2914.994350][T23110] ? ioctl_preallocate+0x210/0x210 [ 2914.999627][T23110] ? __fget+0x384/0x560 [ 2915.003863][T23110] ? ksys_dup3+0x3e0/0x3e0 [ 2915.008265][T23110] ? do_sys_open+0x31d/0x5d0 [ 2915.012867][T23110] ? tomoyo_file_ioctl+0x23/0x30 [ 2915.017899][T23110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2915.024178][T23110] ? security_file_ioctl+0x8d/0xc0 [ 2915.029413][T23110] ksys_ioctl+0xab/0xd0 [ 2915.033583][T23110] __x64_sys_ioctl+0x73/0xb0 [ 2915.038352][T23110] do_syscall_64+0xfd/0x6a0 [ 2915.042856][T23110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2915.049102][T23110] RIP: 0033:0x459697 [ 2915.053011][T23110] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2915.072874][T23110] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2915.081289][T23110] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2915.089257][T23110] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2915.097396][T23110] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2915.105557][T23110] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2915.113547][T23110] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:07 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x2) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)=""/89) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:07 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001401) 15:05:07 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80), 0x0, 0x0, 0x0) 15:05:07 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:07 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001500) 15:05:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2915.437966][T23131] FAULT_INJECTION: forcing a failure. [ 2915.437966][T23131] name failslab, interval 1, probability 0, space 0, times 0 [ 2915.451142][T23131] CPU: 1 PID: 23131 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2915.459668][T23131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2915.469857][T23131] Call Trace: [ 2915.473175][T23131] dump_stack+0x172/0x1f0 [ 2915.477529][T23131] should_fail.cold+0xa/0x15 [ 2915.482145][T23131] ? fault_create_debugfs_attr+0x180/0x180 [ 2915.488251][T23131] ? page_to_nid.part.0+0x20/0x20 [ 2915.493290][T23131] ? ___might_sleep+0x163/0x280 [ 2915.498218][T23131] __should_failslab+0x121/0x190 [ 2915.503164][T23131] should_failslab+0x9/0x14 [ 2915.507683][T23131] kmem_cache_alloc_node+0x268/0x740 [ 2915.513561][T23131] ? vprintk_default+0x28/0x30 [ 2915.518368][T23131] ? netlink_has_listeners+0x23b/0x3f0 [ 2915.523837][T23131] ? __kasan_check_read+0x11/0x20 [ 2915.528869][T23131] __alloc_skb+0xd5/0x5e0 [ 2915.533284][T23131] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2915.538562][T23131] ? netlink_has_listeners+0x6e/0x3f0 [ 2915.544037][T23131] alloc_uevent_skb+0x83/0x1e2 [ 2915.548814][T23131] kobject_uevent_env+0xaa3/0x1023 [ 2915.553947][T23131] kobject_uevent+0x20/0x26 [ 2915.558470][T23131] loop_set_fd+0xbcc/0x10c0 [ 2915.562973][T23131] lo_ioctl+0x1a3/0x1460 [ 2915.567297][T23131] ? trace_hardirqs_on+0x67/0x240 [ 2915.572336][T23131] ? loop_set_fd+0x10c0/0x10c0 [ 2915.577120][T23131] blkdev_ioctl+0xedb/0x1c1a [ 2915.581703][T23131] ? blkpg_ioctl+0xa90/0xa90 [ 2915.586317][T23131] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2915.592298][T23131] ? __kasan_check_read+0x11/0x20 [ 2915.598003][T23131] ? __kasan_check_read+0x11/0x20 [ 2915.603123][T23131] block_ioctl+0xee/0x130 [ 2915.607729][T23131] ? blkdev_fallocate+0x410/0x410 [ 2915.613307][T23131] do_vfs_ioctl+0xdb6/0x13e0 [ 2915.620285][T23131] ? ioctl_preallocate+0x210/0x210 [ 2915.626355][T23131] ? __fget+0x384/0x560 [ 2915.630722][T23131] ? ksys_dup3+0x3e0/0x3e0 [ 2915.635133][T23131] ? do_sys_open+0x31d/0x5d0 [ 2915.639712][T23131] ? tomoyo_file_ioctl+0x23/0x30 [ 2915.644667][T23131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2915.651113][T23131] ? security_file_ioctl+0x8d/0xc0 [ 2915.656576][T23131] ksys_ioctl+0xab/0xd0 [ 2915.660724][T23131] __x64_sys_ioctl+0x73/0xb0 [ 2915.665305][T23131] do_syscall_64+0xfd/0x6a0 [ 2915.669816][T23131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2915.675794][T23131] RIP: 0033:0x459697 [ 2915.679886][T23131] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2915.699566][T23131] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2915.707970][T23131] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 2915.716523][T23131] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2915.725061][T23131] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2915.733046][T23131] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2915.741495][T23131] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:08 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001501) 15:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02180000020000000000000000000009"], 0x10}}, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') 15:05:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:08 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001600) 15:05:09 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000e00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:09 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02180000020000000000000044ca0000"], 0x10}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000100)={0x4010000000000000, 0x2, [0x1000, 0x0, 0xdf2, 0x7, 0x100], 0x6}) 15:05:09 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001601) 15:05:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:09 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2916.659886][T23186] FAULT_INJECTION: forcing a failure. [ 2916.659886][T23186] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.678576][T23186] CPU: 1 PID: 23186 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2916.686599][T23186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2916.696775][T23186] Call Trace: [ 2916.696807][T23186] dump_stack+0x172/0x1f0 [ 2916.696826][T23186] should_fail.cold+0xa/0x15 [ 2916.696840][T23186] ? __kasan_check_read+0x11/0x20 [ 2916.696864][T23186] ? fault_create_debugfs_attr+0x180/0x180 [ 2916.720154][T23186] ? page_to_nid.part.0+0x20/0x20 [ 2916.720174][T23186] ? ___might_sleep+0x163/0x280 [ 2916.720193][T23186] __should_failslab+0x121/0x190 [ 2916.720217][T23186] should_failslab+0x9/0x14 [ 2916.740657][T23186] kmem_cache_alloc+0x2aa/0x710 [ 2916.745527][T23186] ? __d_lookup+0x42f/0x760 [ 2916.750321][T23186] ? lock_acquire+0x190/0x410 [ 2916.755189][T23186] ? lookup_dcache+0x23/0x140 [ 2916.759880][T23186] __d_alloc+0x2e/0x8c0 [ 2916.764055][T23186] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2916.770251][T23186] d_alloc+0x4d/0x280 [ 2916.774446][T23186] __lookup_hash+0xcd/0x190 [ 2916.779590][T23186] filename_create+0x1a7/0x4f0 [ 2916.784457][T23186] ? kern_path_mountpoint+0x40/0x40 [ 2916.790196][T23186] ? strncpy_from_user+0x2b4/0x400 [ 2916.795625][T23186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2916.802063][T23186] ? getname_flags+0x277/0x5b0 [ 2916.806844][T23186] do_mkdirat+0xb5/0x2a0 [ 2916.811324][T23186] ? __ia32_sys_mknod+0xb0/0xb0 [ 2916.816183][T23186] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2916.822950][T23186] ? trace_hardirqs_off_caller+0x65/0x230 [ 2916.828786][T23186] __x64_sys_mkdir+0x5c/0x80 [ 2916.833602][T23186] do_syscall_64+0xfd/0x6a0 [ 2916.838217][T23186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2916.844213][T23186] RIP: 0033:0x458c47 [ 2916.848242][T23186] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2916.848263][T23186] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2916.876590][T23186] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2916.884596][T23186] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2916.892870][T23186] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2916.900853][T23186] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 15:05:09 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001700) 15:05:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:09 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001701) 15:05:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x20000000000000ea}, 0x10}}, 0x0) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000100)={'netdevsim0\x00', 0xe4eb}) [ 2916.908826][T23186] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:09 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:09 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001800) [ 2917.084381][T23212] FAULT_INJECTION: forcing a failure. [ 2917.084381][T23212] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.111941][T23212] CPU: 1 PID: 23212 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2917.120733][T23212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2917.131508][T23212] Call Trace: [ 2917.134913][T23212] dump_stack+0x172/0x1f0 [ 2917.139263][T23212] should_fail.cold+0xa/0x15 [ 2917.144036][T23212] ? fault_create_debugfs_attr+0x180/0x180 [ 2917.149854][T23212] ? ___might_sleep+0x163/0x280 [ 2917.155121][T23212] __should_failslab+0x121/0x190 [ 2917.160115][T23212] should_failslab+0x9/0x14 [ 2917.164903][T23212] __kmalloc+0x2e0/0x770 [ 2917.169195][T23212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2917.175460][T23212] ? d_absolute_path+0x11b/0x170 [ 2917.180431][T23212] ? __d_path+0x140/0x140 [ 2917.185159][T23212] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2917.190562][T23212] tomoyo_encode2.part.0+0xf5/0x400 [ 2917.195804][T23212] tomoyo_encode+0x2b/0x50 [ 2917.200232][T23212] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2917.205897][T23212] tomoyo_path_number_perm+0x1dd/0x520 [ 2917.211389][T23212] ? tomoyo_path_number_perm+0x193/0x520 [ 2917.217038][T23212] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2917.222879][T23212] ? __kasan_check_write+0x14/0x20 [ 2917.228124][T23212] ? quarantine_put+0x11c/0x1c0 [ 2917.233123][T23212] ? trace_hardirqs_on+0x67/0x240 [ 2917.238179][T23212] ? putname+0xef/0x130 [ 2917.242426][T23212] ? kmem_cache_free+0x1a7/0x320 [ 2917.247388][T23212] tomoyo_path_mkdir+0xaa/0xf0 [ 2917.252177][T23212] ? tomoyo_file_ioctl+0x30/0x30 [ 2917.257340][T23212] ? kern_path_mountpoint+0x40/0x40 [ 2917.274891][T23212] ? strncpy_from_user+0x2b4/0x400 [ 2917.280039][T23212] security_path_mkdir+0x113/0x170 [ 2917.285348][T23212] do_mkdirat+0x160/0x2a0 [ 2917.289782][T23212] ? __ia32_sys_mknod+0xb0/0xb0 [ 2917.295656][T23212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2917.302451][T23212] ? trace_hardirqs_off_caller+0x65/0x230 [ 2917.308212][T23212] __x64_sys_mkdir+0x5c/0x80 [ 2917.312838][T23212] do_syscall_64+0xfd/0x6a0 [ 2917.317642][T23212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2917.323839][T23212] RIP: 0033:0x458c47 [ 2917.327745][T23212] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2917.348390][T23212] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2917.357068][T23212] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2917.365845][T23212] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2917.374109][T23212] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2917.382098][T23212] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2917.390089][T23212] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2917.403048][T23212] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:10 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000021800"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:10 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001801) 15:05:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:10 executing program 1: chdir(&(0x7f0000000000)='./file0\x00') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="021800e718af61e100c1d700d88e891d0002000000007400005eb9cb00"], 0x10}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) 15:05:10 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r0) 15:05:10 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:10 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001900) [ 2917.667481][T23240] FAULT_INJECTION: forcing a failure. [ 2917.667481][T23240] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.711392][T23240] CPU: 1 PID: 23240 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2917.719861][T23240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2917.730121][T23240] Call Trace: [ 2917.733443][T23240] dump_stack+0x172/0x1f0 [ 2917.737798][T23240] should_fail.cold+0xa/0x15 [ 2917.742502][T23240] ? fault_create_debugfs_attr+0x180/0x180 [ 2917.748340][T23240] ? ___might_sleep+0x163/0x280 [ 2917.753394][T23240] __should_failslab+0x121/0x190 [ 2917.758358][T23240] should_failslab+0x9/0x14 [ 2917.762973][T23240] __kmalloc+0x2e0/0x770 [ 2917.767243][T23240] ? __getblk_gfp+0x5c/0xa10 [ 2917.773605][T23240] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2917.779374][T23240] ? ext4_find_extent+0x76e/0x9d0 [ 2917.784419][T23240] ext4_find_extent+0x76e/0x9d0 [ 2917.789291][T23240] ? ___might_sleep+0x163/0x280 [ 2917.794714][T23240] ext4_ext_map_blocks+0x1dc/0x5040 [ 2917.800338][T23240] ? __kasan_check_read+0x11/0x20 [ 2917.805405][T23240] ? ext4_ext_release+0x10/0x10 [ 2917.805424][T23240] ? __kasan_check_write+0x14/0x20 [ 2917.805440][T23240] ? down_read+0x10a/0x3f0 [ 2917.805453][T23240] ? down_read_killable+0x460/0x460 [ 2917.805469][T23240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2917.805483][T23240] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2917.805502][T23240] ext4_map_blocks+0xdc5/0x17f0 [ 2917.805525][T23240] ? ext4_issue_zeroout+0x190/0x190 [ 2917.815510][T23240] ? ext4_set_acl+0x4f0/0x4f0 [ 2917.815532][T23240] ? __kasan_check_write+0x14/0x20 [ 2917.815555][T23240] ext4_getblk+0xc4/0x570 15:05:10 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001901) 15:05:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2917.861603][T23240] ? ext4_iomap_begin+0x1000/0x1000 [ 2917.866826][T23240] ext4_bread+0x93/0x270 [ 2917.871103][T23240] ? ext4_getblk+0x570/0x570 [ 2917.875818][T23240] ext4_append+0x155/0x370 [ 2917.880253][T23240] ext4_mkdir+0x632/0xe20 [ 2917.884600][T23240] ? ext4_init_dot_dotdot+0x520/0x520 [ 2917.889990][T23240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2917.896360][T23240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2917.902618][T23240] ? security_inode_permission+0xcb/0x100 15:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) [ 2917.908355][T23240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2917.914880][T23240] ? security_inode_mkdir+0xe4/0x120 [ 2917.920229][T23240] vfs_mkdir+0x42e/0x670 [ 2917.924579][T23240] do_mkdirat+0x234/0x2a0 [ 2917.928955][T23240] ? __ia32_sys_mknod+0xb0/0xb0 [ 2917.933816][T23240] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2917.939899][T23240] ? trace_hardirqs_off_caller+0x65/0x230 [ 2917.945643][T23240] __x64_sys_mkdir+0x5c/0x80 [ 2917.950344][T23240] do_syscall_64+0xfd/0x6a0 [ 2917.954892][T23240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2917.960793][T23240] RIP: 0033:0x458c47 [ 2917.964695][T23240] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2917.984748][T23240] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2917.993173][T23240] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2918.001424][T23240] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 15:05:10 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001a00) [ 2918.009406][T23240] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2918.018103][T23240] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2918.026182][T23240] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2, 0x18, 0x0, 0xffffffffffffffff, 0x1d, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0xa, 0x18, 0x4, 0x8, 0x43, "8bc4106b92f3dcc3f0852b764c6c1cdf57345c4b67293d7163391d70794e7deb4905b261b9130099a812ba10f979cf9c1090cb870884592017bc6ba6962ef65f4290f4"}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d4}, @sadb_x_sa2={0x2, 0x13, 0x80, 0x0, 0x0, 0x70bd2a, 0x3504}, @sadb_x_filter={0x5, 0x1a, @in6=@rand_addr="b3e89a1d5546f8a03860acb50ebb5af9", @in=@local, 0x4, 0x10, 0x4}, @sadb_x_policy={0x8, 0x12, 0x2, 0x0, 0x0, 0x6e6bb3, 0x81, {0x6, 0x0, 0xfff, 0xff, 0x0, 0xa1, 0x0, @in=@broadcast, @in6=@remote}}]}, 0xe8}}, 0x4) 15:05:10 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001a01) 15:05:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:10 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:10 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:10 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001b00) [ 2918.556689][T23291] FAULT_INJECTION: forcing a failure. [ 2918.556689][T23291] name failslab, interval 1, probability 0, space 0, times 0 [ 2918.595817][T23291] CPU: 1 PID: 23291 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001b01) [ 2918.603854][T23291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2918.613956][T23291] Call Trace: [ 2918.617271][T23291] dump_stack+0x172/0x1f0 [ 2918.621631][T23291] should_fail.cold+0xa/0x15 [ 2918.626265][T23291] ? __kasan_check_read+0x11/0x20 [ 2918.631315][T23291] ? fault_create_debugfs_attr+0x180/0x180 [ 2918.637167][T23291] ? page_to_nid.part.0+0x20/0x20 [ 2918.642223][T23291] ? ___might_sleep+0x163/0x280 [ 2918.647191][T23291] __should_failslab+0x121/0x190 [ 2918.652189][T23291] should_failslab+0x9/0x14 [ 2918.657158][T23291] kmem_cache_alloc+0x2aa/0x710 [ 2918.662134][T23291] ? __d_lookup+0x42f/0x760 [ 2918.662150][T23291] ? lock_acquire+0x190/0x410 [ 2918.662168][T23291] ? lookup_dcache+0x23/0x140 [ 2918.662189][T23291] __d_alloc+0x2e/0x8c0 [ 2918.676056][T23291] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2918.676076][T23291] d_alloc+0x4d/0x280 [ 2918.676108][T23291] __lookup_hash+0xcd/0x190 [ 2918.694765][T23291] filename_create+0x1a7/0x4f0 [ 2918.699579][T23291] ? kern_path_mountpoint+0x40/0x40 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001c00) [ 2918.704978][T23291] ? strncpy_from_user+0x2b4/0x400 [ 2918.710120][T23291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2918.716382][T23291] ? getname_flags+0x277/0x5b0 [ 2918.721197][T23291] do_mkdirat+0xb5/0x2a0 [ 2918.725474][T23291] ? __ia32_sys_mknod+0xb0/0xb0 [ 2918.730343][T23291] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2918.736540][T23291] ? trace_hardirqs_off_caller+0x65/0x230 [ 2918.742293][T23291] __x64_sys_mkdir+0x5c/0x80 [ 2918.746912][T23291] do_syscall_64+0xfd/0x6a0 [ 2918.751446][T23291] entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001c01) [ 2918.757526][T23291] RIP: 0033:0x458c47 [ 2918.761444][T23291] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2918.781076][T23291] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2918.789601][T23291] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2918.797592][T23291] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001d00) 15:05:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2918.805674][T23291] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2918.813672][T23291] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2918.821663][T23291] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:11 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x8000, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0218020002000089af3d886226d323c5d3dda95536020000000000000000"], 0x10}}, 0x0) r2 = dup2(r0, r0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="f5195ba80f50a4097defd8d225c5c84204fa349a5afdf7b9c670a03c838f39b65d2993b96def524c1f49b10a850183010102f6eb9fa74622507db9b0ee1eadeed0bf3e4330fe1936b9753b3f479e1e4d28dff796039e2919003cf3ddc8cb29606891fc14dcb02177868e0202df458ada9154c7ae03ad6a722605869398157e8c27a3f8857ac2c6e144fcdd9d78d200899245d4a6aa36e3e95a69", 0x9a}, {&(0x7f00000002c0)="9270cb39dde2e9fbd77427f1012d828ed90860dd33d7d1500d3857179ac201f40628acc42d51524aa78b230bc0fd14abf98435ae7f858aceba908926e69dcd8b4e88ad5ca8afa7249a0bf4cf", 0x4c}, {&(0x7f0000000340)="ca303f8457678d4bfbaa5f7268c760649bd55858d6531b3fb56526e32e44edce90cc73ce011f56cd0c486d1583cc6cc41c2a782afb18fbce426db707b33f403c4d145bc1bee182b4d02a5af8e34e3f104d16f6b3ea4c6d77a5e836d4293623d2c8c19cab371eb1dac41ecc5f75c1cb00", 0x70}], 0x3) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001d01) 15:05:11 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2918.977485][T23325] FAULT_INJECTION: forcing a failure. [ 2918.977485][T23325] name failslab, interval 1, probability 0, space 0, times 0 [ 2918.992139][T23325] CPU: 1 PID: 23325 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2919.001363][T23325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2919.012396][T23325] Call Trace: [ 2919.015714][T23325] dump_stack+0x172/0x1f0 [ 2919.020065][T23325] should_fail.cold+0xa/0x15 [ 2919.024766][T23325] ? fault_create_debugfs_attr+0x180/0x180 [ 2919.030595][T23325] ? __kasan_check_write+0x14/0x20 [ 2919.035720][T23325] ? ___might_sleep+0x163/0x280 [ 2919.040595][T23325] __should_failslab+0x121/0x190 [ 2919.045584][T23325] ? ratelimit_state_init+0xb0/0xb0 [ 2919.050832][T23325] should_failslab+0x9/0x14 [ 2919.055674][T23325] kmem_cache_alloc+0x2aa/0x710 [ 2919.060759][T23325] ? __kasan_check_read+0x11/0x20 [ 2919.065906][T23325] ? ratelimit_state_init+0xb0/0xb0 [ 2919.071108][T23325] ext4_alloc_inode+0x1f/0x640 [ 2919.075881][T23325] ? ratelimit_state_init+0xb0/0xb0 [ 2919.081259][T23325] alloc_inode+0x68/0x1e0 [ 2919.085626][T23325] new_inode_pseudo+0x19/0xf0 [ 2919.090301][T23325] new_inode+0x1f/0x40 [ 2919.094362][T23325] __ext4_new_inode+0x3d5/0x4e50 [ 2919.099314][T23325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2919.105592][T23325] ? __dquot_initialize+0x525/0xd80 [ 2919.110810][T23325] ? ext4_free_inode+0x1490/0x1490 [ 2919.115926][T23325] ? dqget+0x10d0/0x10d0 [ 2919.120335][T23325] ? quarantine_put+0x11c/0x1c0 [ 2919.125178][T23325] ext4_mkdir+0x3df/0xe20 [ 2919.129587][T23325] ? ext4_init_dot_dotdot+0x520/0x520 [ 2919.136103][T23325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2919.142351][T23325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2919.148764][T23325] ? security_inode_permission+0xcb/0x100 [ 2919.154500][T23325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2919.160756][T23325] ? security_inode_mkdir+0xe4/0x120 [ 2919.166492][T23325] vfs_mkdir+0x42e/0x670 [ 2919.170815][T23325] do_mkdirat+0x234/0x2a0 [ 2919.175254][T23325] ? __ia32_sys_mknod+0xb0/0xb0 [ 2919.180135][T23325] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2919.186204][T23325] ? trace_hardirqs_off_caller+0x65/0x230 [ 2919.192290][T23325] __x64_sys_mkdir+0x5c/0x80 [ 2919.196878][T23325] do_syscall_64+0xfd/0x6a0 [ 2919.201376][T23325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2919.207371][T23325] RIP: 0033:0x458c47 [ 2919.211267][T23325] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2919.230860][T23325] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2919.239384][T23325] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2919.247721][T23325] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2919.259038][T23325] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2919.267027][T23325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001e00) [ 2919.274994][T23325] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x80, 0x1, 0x2}, 0x10}}, 0x0) 15:05:11 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) 15:05:11 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:11 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:11 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001e01) [ 2919.538676][T23354] FAULT_INJECTION: forcing a failure. [ 2919.538676][T23354] name failslab, interval 1, probability 0, space 0, times 0 [ 2919.588216][T23354] CPU: 0 PID: 23354 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2919.596514][T23354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2919.606843][T23354] Call Trace: [ 2919.610855][T23354] dump_stack+0x172/0x1f0 [ 2919.615326][T23354] should_fail.cold+0xa/0x15 [ 2919.619946][T23354] ? fault_create_debugfs_attr+0x180/0x180 [ 2919.625893][T23354] ? __kernel_text_address+0xd/0x40 [ 2919.631291][T23354] ? unwind_get_return_address+0x61/0xa0 [ 2919.637050][T23354] ? profile_setup.cold+0xbb/0xbb [ 2919.642207][T23354] ? ___might_sleep+0x163/0x280 [ 2919.647102][T23354] __should_failslab+0x121/0x190 [ 2919.652181][T23354] should_failslab+0x9/0x14 [ 2919.656737][T23354] __kmalloc+0x2e0/0x770 [ 2919.661002][T23354] ? mark_held_locks+0xf0/0xf0 [ 2919.665822][T23354] ? stack_trace_save+0xac/0xe0 [ 2919.670780][T23354] ? stack_trace_consume_entry+0x190/0x190 [ 2919.676859][T23354] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2919.682591][T23354] tomoyo_realpath_from_path+0xcd/0x7b0 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001f00) 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000001f01) 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002000) [ 2919.688247][T23354] ? tomoyo_path_number_perm+0x193/0x520 [ 2919.693897][T23354] tomoyo_path_number_perm+0x1dd/0x520 [ 2919.693911][T23354] ? tomoyo_path_number_perm+0x193/0x520 [ 2919.693926][T23354] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2919.693946][T23354] ? __kasan_check_write+0x14/0x20 [ 2919.693972][T23354] ? quarantine_put+0x11c/0x1c0 [ 2919.721111][T23354] ? trace_hardirqs_on+0x67/0x240 [ 2919.726251][T23354] ? putname+0xef/0x130 [ 2919.730432][T23354] ? kmem_cache_free+0x1a7/0x320 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002001) [ 2919.735417][T23354] tomoyo_path_mkdir+0xaa/0xf0 [ 2919.740242][T23354] ? tomoyo_file_ioctl+0x30/0x30 [ 2919.745203][T23354] ? kern_path_mountpoint+0x40/0x40 [ 2919.750424][T23354] ? strncpy_from_user+0x2b4/0x400 [ 2919.755575][T23354] security_path_mkdir+0x113/0x170 [ 2919.760722][T23354] do_mkdirat+0x160/0x2a0 [ 2919.765247][T23354] ? __ia32_sys_mknod+0xb0/0xb0 [ 2919.770333][T23354] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2919.776882][T23354] ? trace_hardirqs_off_caller+0x65/0x230 [ 2919.782640][T23354] __x64_sys_mkdir+0x5c/0x80 [ 2919.787258][T23354] do_syscall_64+0xfd/0x6a0 [ 2919.791782][T23354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2919.797704][T23354] RIP: 0033:0x458c47 [ 2919.797719][T23354] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2919.797725][T23354] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2919.797736][T23354] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 15:05:12 executing program 1: syz_init_net_socket$llc(0x1a, 0x3, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfff, 0x2000) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000100)) 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002100) 15:05:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2919.797743][T23354] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2919.797749][T23354] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2919.797755][T23354] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2919.797762][T23354] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2919.831884][T23354] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002101) 15:05:12 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:12 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000024000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:12 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002200) 15:05:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@can={0x1d, r1}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)="1662a7b761b91267d4c0e08e7635c57a6e5273b102e109de9f14ff453b5dc02021b453e6093354522de49a457e974818ea6681d870c78a0eb4b11187c0fe35fa63ea14085b156364a49d6ef9d2d460f6ea93b36e0574dd8bc7b663474f64c3361e6c8299ea58b15dde2f321b90da56a91519", 0x72}, {&(0x7f0000000300)='|C', 0x2}, {&(0x7f0000000340)="7409e563f29988873f5193889917f6bb261b6207055e5058395a55f166114c7211ca0ea5186fbbe94c5b92c493c7c12a68284a4e4e93f0c6a6f16167ff33a88f258c0148fb42b235ff1845a83a1a9f24c7d5867ae4ec0e453646af1064e3ba66501a78b6944b372d3ba63ad84ca5aa3de84d1c7cb67f43f415889ab0bdc1eabf1d09227b1803d2eeaa48e8dca21799169f532afcfa4d525b", 0x98}, {&(0x7f0000000400)="b681c06a812a53b47bbc591284d0ffd8a5da8e5962dbe08a383b5e99f4b4dc784f08fafc64c883a0e8e6e9657dd74c124ea9730a8b253878c12cb8893df375e58fec35b5b2d6c5116d", 0x49}, {&(0x7f0000000480)="f1bb603232c52fd66e4187521062d7e218f0b8486add3b2c98bfbb427677243564a20076ab2beb4e4fa369d8552b6263b9c6c4a8fa15e513a11a99832a6769fa26b19231a80da6c7b298f5f95292e700885d1a5db11a60d309977eab16bb12af1a3ed1ed7962cd7515472d3f4088388fc690c0d7272beeebc97ec0b9d5b9f539243be930fb7edc89a29d2443aed96614f8c9e7de598a2769c80a47c3dd47b65df251815334fe50efbdfaf56428aabec835d729ef4a0ed78d227dd0870b843dff9609fbef42d141c962a9632d50c4cbe7cbeee90e3a1f195d70c4e25cca359154d36686a2a33529eeed86", 0xea}, {&(0x7f0000000580)="f1096a4dfd22f2150a0ff1e62f932fc333421b30f4542ff7f6c0f595404cfbd7e705b45da2be413c116544d5b47de41331848b35fef9eb9cbc0a20c6de3d538a8f628ab73d12c701badf9c5fd764680e4f8f4d78c122d90c5eba83819aed6de42051fcad95b6060e34d45c2bf9e85abc89b153832148720e0ef88f0625275802c0d02c0235414e30a41766ea1e2c9131da11c0cf172348713f22aa11e4e1c7be340a4e737f90db960dcb4e9b6cabca5c1e955060545cab71204b51d1f154951271387d04e3b3", 0xc6}], 0x6, &(0x7f0000000700)=[@txtime={{0x18, 0x1, 0x3d, 0x8d8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffeff}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0xc0}, 0x4000000) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f00000008c0)=""/4096) r3 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x0, 0x20000) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000840)=[0x3, 0x4], 0x2) 15:05:12 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2920.435395][T23409] FAULT_INJECTION: forcing a failure. [ 2920.435395][T23409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2920.448665][T23409] CPU: 1 PID: 23409 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2920.456766][T23409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2920.466830][T23409] Call Trace: [ 2920.470147][T23409] dump_stack+0x172/0x1f0 [ 2920.474504][T23409] should_fail.cold+0xa/0x15 [ 2920.479122][T23409] ? fault_create_debugfs_attr+0x180/0x180 [ 2920.484945][T23409] ? is_bpf_text_address+0xac/0x170 [ 2920.490164][T23409] ? __kasan_check_read+0x11/0x20 [ 2920.495307][T23409] should_fail_alloc_page+0x50/0x60 [ 2920.500527][T23409] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2920.505917][T23409] ? __bpf_address_lookup+0x310/0x310 [ 2920.511596][T23409] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2920.517368][T23409] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2920.523130][T23409] ? fault_create_debugfs_attr+0x180/0x180 [ 2920.529149][T23409] ? __kernel_text_address+0xd/0x40 [ 2920.534384][T23409] cache_grow_begin+0x90/0xd20 [ 2920.539171][T23409] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2920.544924][T23409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2920.551186][T23409] __kmalloc+0x6b2/0x770 [ 2920.555449][T23409] ? mark_held_locks+0xf0/0xf0 [ 2920.560235][T23409] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2920.566002][T23409] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2920.571617][T23409] ? tomoyo_path_number_perm+0x193/0x520 [ 2920.577309][T23409] tomoyo_path_number_perm+0x1dd/0x520 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002201) 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002300) [ 2920.582802][T23409] ? tomoyo_path_number_perm+0x193/0x520 [ 2920.588457][T23409] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2920.594290][T23409] ? __kasan_check_write+0x14/0x20 [ 2920.599432][T23409] ? quarantine_put+0x11c/0x1c0 [ 2920.604303][T23409] ? trace_hardirqs_on+0x67/0x240 [ 2920.609357][T23409] ? putname+0xef/0x130 [ 2920.613579][T23409] ? kmem_cache_free+0x1a7/0x320 [ 2920.618562][T23409] tomoyo_path_mkdir+0xaa/0xf0 [ 2920.623433][T23409] ? tomoyo_file_ioctl+0x30/0x30 [ 2920.628418][T23409] ? kern_path_mountpoint+0x40/0x40 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002301) [ 2920.633633][T23409] ? strncpy_from_user+0x2b4/0x400 [ 2920.638765][T23409] security_path_mkdir+0x113/0x170 [ 2920.643996][T23409] do_mkdirat+0x160/0x2a0 [ 2920.648728][T23409] ? __ia32_sys_mknod+0xb0/0xb0 [ 2920.653872][T23409] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2920.660050][T23409] ? trace_hardirqs_off_caller+0x65/0x230 [ 2920.665792][T23409] __x64_sys_mkdir+0x5c/0x80 [ 2920.665810][T23409] do_syscall_64+0xfd/0x6a0 [ 2920.665825][T23409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2920.665836][T23409] RIP: 0033:0x458c47 [ 2920.665850][T23409] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2920.665858][T23409] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2920.704916][T23409] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2920.704925][T23409] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002400) 15:05:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2920.704931][T23409] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2920.704937][T23409] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2920.704943][T23409] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:13 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002401) 15:05:13 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000040)='bond_slave_1\x00'}) 15:05:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:13 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002500) 15:05:13 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002501) [ 2921.341346][T23459] FAULT_INJECTION: forcing a failure. [ 2921.341346][T23459] name failslab, interval 1, probability 0, space 0, times 0 [ 2921.440202][T23459] CPU: 0 PID: 23459 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2921.448244][T23459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2921.458393][T23459] Call Trace: [ 2921.461703][T23459] dump_stack+0x172/0x1f0 [ 2921.466057][T23459] should_fail.cold+0xa/0x15 [ 2921.470675][T23459] ? fault_create_debugfs_attr+0x180/0x180 [ 2921.476514][T23459] ? ___might_sleep+0x163/0x280 [ 2921.481393][T23459] __should_failslab+0x121/0x190 [ 2921.486541][T23459] should_failslab+0x9/0x14 [ 2921.491163][T23459] __kmalloc+0x2e0/0x770 [ 2921.495422][T23459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2921.501680][T23459] ? d_absolute_path+0x11b/0x170 [ 2921.506877][T23459] ? __d_path+0x140/0x140 [ 2921.511228][T23459] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2921.516626][T23459] tomoyo_encode2.part.0+0xf5/0x400 [ 2921.521825][T23459] tomoyo_encode+0x2b/0x50 [ 2921.526231][T23459] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2921.531861][T23459] tomoyo_path_number_perm+0x1dd/0x520 [ 2921.537329][T23459] ? tomoyo_path_number_perm+0x193/0x520 [ 2921.542962][T23459] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2921.548771][T23459] ? __kasan_check_write+0x14/0x20 [ 2921.553905][T23459] ? quarantine_put+0x11c/0x1c0 [ 2921.558781][T23459] ? trace_hardirqs_on+0x67/0x240 [ 2921.563924][T23459] ? putname+0xef/0x130 [ 2921.568184][T23459] ? kmem_cache_free+0x1a7/0x320 [ 2921.573128][T23459] tomoyo_path_mkdir+0xaa/0xf0 [ 2921.577925][T23459] ? tomoyo_file_ioctl+0x30/0x30 [ 2921.582968][T23459] ? kern_path_mountpoint+0x40/0x40 [ 2921.588174][T23459] ? strncpy_from_user+0x2b4/0x400 [ 2921.593289][T23459] security_path_mkdir+0x113/0x170 [ 2921.598433][T23459] do_mkdirat+0x160/0x2a0 [ 2921.602886][T23459] ? __ia32_sys_mknod+0xb0/0xb0 [ 2921.607775][T23459] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2921.614364][T23459] ? trace_hardirqs_off_caller+0x65/0x230 [ 2921.620274][T23459] __x64_sys_mkdir+0x5c/0x80 [ 2921.624960][T23459] do_syscall_64+0xfd/0x6a0 [ 2921.629914][T23459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2921.635791][T23459] RIP: 0033:0x458c47 [ 2921.639773][T23459] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2921.660682][T23459] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2921.669109][T23459] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2921.677178][T23459] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 15:05:14 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002600) 15:05:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt(r0, 0x8000, 0x5adf, &(0x7f0000000100)="42136c5a46ac5a04460b43b80dc7e9cc3e0a429eb24cf9bc936bca443b69b3504a3a914fc1679ed026f635ce02abec7a1bf2670a54f781bc933eca8693c01e5e5752c3c5ab680b2f272e300005b039e93dd47de79065fd5d431e1dae7bb10dc5d2f354e8509d6b50252153bbd6d02c4a20debc2742883cc699fa2385882545fc1950777a15b1d9036231b7bd200db48a2faf2e453ec1d0f329b0f4c20a50814b824992608c81bea6c9a76bd7eaaf3535b054dde3005bd12b7f92f9cf3d86300d6dbac6a361", 0xc5) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2921.685242][T23459] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2921.693311][T23459] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2921.701281][T23459] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2921.713895][T23459] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:14 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002601) 15:05:14 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x40) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:14 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000ffffff8d00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:14 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002700) 15:05:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:14 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:14 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:14 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="02180000020000000000000000000000db8c011309ebb1c59fdec6b41b7e1d2461d532f2441843de41dd84f6646b8066aa9b55c81359d7e209c1951d9fa88637a9aca64283410afa69e5764f03fb31"], 0x4f}}, 0x0) open_by_handle_at(r0, &(0x7f0000000180)={0x74, 0x4, "cc7c18dad35db2184c2c8124dbc5b60bbe6dbd990077d0ea22010000803ff6eec01cbe62f97a10a89f2c21512388fd2401d06286c8db53d3483d853ec93aa9d197841ec4615c5bdd6f0d0db0a4364efca3c1557e4b9bf0081dee887910481fb5c2a296d31b83b522932fde46"}, 0x200000) 15:05:14 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002701) [ 2922.254576][T23515] FAULT_INJECTION: forcing a failure. [ 2922.254576][T23515] name failslab, interval 1, probability 0, space 0, times 0 [ 2922.284284][T23515] CPU: 0 PID: 23515 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2922.292403][T23515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2922.303002][T23515] Call Trace: [ 2922.306431][T23515] dump_stack+0x172/0x1f0 [ 2922.310780][T23515] should_fail.cold+0xa/0x15 [ 2922.315387][T23515] ? fault_create_debugfs_attr+0x180/0x180 [ 2922.321212][T23515] ? __kasan_check_write+0x14/0x20 [ 2922.326347][T23515] ? ___might_sleep+0x163/0x280 [ 2922.331210][T23515] __should_failslab+0x121/0x190 [ 2922.338658][T23515] should_failslab+0x9/0x14 [ 2922.343632][T23515] __kmalloc+0x2e0/0x770 [ 2922.347989][T23515] ? quarantine_put+0x11c/0x1c0 [ 2922.353134][T23515] ? ext4_find_extent+0x76e/0x9d0 [ 2922.358358][T23515] ext4_find_extent+0x76e/0x9d0 [ 2922.363235][T23515] ? ext4_ext_map_blocks+0x910/0x5040 [ 2922.368632][T23515] ext4_ext_map_blocks+0x1dc/0x5040 [ 2922.373873][T23515] ? ext4_map_blocks+0xda6/0x17f0 [ 2922.379012][T23515] ? mark_held_locks+0xf0/0xf0 [ 2922.383793][T23515] ? ext4_ext_release+0x10/0x10 [ 2922.389191][T23515] ? lock_acquire+0x190/0x410 [ 2922.393882][T23515] ? ext4_map_blocks+0x4b1/0x17f0 [ 2922.399092][T23515] ? __kasan_check_write+0x14/0x20 [ 2922.405633][T23515] ? down_write+0xdf/0x150 [ 2922.405646][T23515] ? __down_timeout+0x2d0/0x2d0 [ 2922.405661][T23515] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2922.405677][T23515] ext4_map_blocks+0x529/0x17f0 [ 2922.405695][T23515] ? ext4_issue_zeroout+0x190/0x190 [ 2922.405712][T23515] ? ext4_set_acl+0x4f0/0x4f0 [ 2922.405729][T23515] ? __kasan_check_write+0x14/0x20 [ 2922.405742][T23515] ext4_getblk+0xc4/0x570 [ 2922.405755][T23515] ? ext4_iomap_begin+0x1000/0x1000 [ 2922.405775][T23515] ext4_bread+0x93/0x270 [ 2922.455874][T23515] ? ext4_getblk+0x570/0x570 [ 2922.455894][T23515] ext4_append+0x155/0x370 [ 2922.455909][T23515] ext4_mkdir+0x632/0xe20 [ 2922.455929][T23515] ? ext4_init_dot_dotdot+0x520/0x520 [ 2922.455945][T23515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2922.455958][T23515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2922.455975][T23515] ? security_inode_permission+0xcb/0x100 [ 2922.455991][T23515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2922.456013][T23515] ? security_inode_mkdir+0xe4/0x120 [ 2922.487773][T23515] vfs_mkdir+0x42e/0x670 [ 2922.487793][T23515] do_mkdirat+0x234/0x2a0 [ 2922.487810][T23515] ? __ia32_sys_mknod+0xb0/0xb0 [ 2922.487833][T23515] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2922.525129][T23515] ? trace_hardirqs_off_caller+0x65/0x230 [ 2922.531113][T23515] __x64_sys_mkdir+0x5c/0x80 [ 2922.535782][T23515] do_syscall_64+0xfd/0x6a0 [ 2922.540393][T23515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2922.546510][T23515] RIP: 0033:0x458c47 15:05:14 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002800) 15:05:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6589e9300200000000000000000000006bc67aea8e9450ccaa191d9338c4dde98da0d7fc78ff38b3c3caa7b5f1d9dcdda9a93e0a5750b1bbe2ae79c622561f2534ea9e1cc3ca911cd2d5904d55a1e05dfac730eed6e1890cc4670c973b3eb0a9e788e5e09601000000ed65610ca6278bfa2d7b9496ebbc6b212072b8513202811fb71e227b99b8acae1a045636abf9e36c320ccae533e3247080ae8f8f5fa86706159b245697dfd901dd9001917c3f4686227c49dfddecf91a2b00000000000000000000000033a0d50b305ef491f94cd54958a65bf95936fc1dee5d817dc1d9ccb4dba8e6fc"], 0x10}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) sendto$llc(r1, &(0x7f0000000640), 0x0, 0x8000, &(0x7f0000000680)={0x1a, 0x1, 0x5, 0xdea8, 0x5, 0x4, @local}, 0x10) [ 2922.550604][T23515] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2922.570490][T23515] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2922.578919][T23515] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2922.586943][T23515] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2922.595128][T23515] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 15:05:15 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) [ 2922.603118][T23515] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2922.611394][T23515] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:15 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000ffffff9100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:15 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002801) 15:05:15 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x18, 0x1, 0x0, 0x2, 0x0, 0x3}, 0x10}}, 0x0) 15:05:15 executing program 2: dup(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:15 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002900) 15:05:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:15 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002901) [ 2922.941682][T23566] FAULT_INJECTION: forcing a failure. [ 2922.941682][T23566] name failslab, interval 1, probability 0, space 0, times 0 [ 2923.010328][T23566] CPU: 1 PID: 23566 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2923.018458][T23566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2923.028609][T23566] Call Trace: [ 2923.031935][T23566] dump_stack+0x172/0x1f0 [ 2923.036366][T23566] should_fail.cold+0xa/0x15 [ 2923.036382][T23566] ? fault_create_debugfs_attr+0x180/0x180 [ 2923.036397][T23566] ? __kasan_check_write+0x14/0x20 [ 2923.036412][T23566] ? ___might_sleep+0x163/0x280 [ 2923.036428][T23566] __should_failslab+0x121/0x190 [ 2923.036452][T23566] ? ratelimit_state_init+0xb0/0xb0 [ 2923.067406][T23566] should_failslab+0x9/0x14 [ 2923.071949][T23566] kmem_cache_alloc+0x2aa/0x710 [ 2923.076816][T23566] ? __kasan_check_read+0x11/0x20 [ 2923.081871][T23566] ? ratelimit_state_init+0xb0/0xb0 [ 2923.087434][T23566] ext4_alloc_inode+0x1f/0x640 [ 2923.092531][T23566] ? ratelimit_state_init+0xb0/0xb0 [ 2923.097937][T23566] alloc_inode+0x68/0x1e0 [ 2923.102273][T23566] new_inode_pseudo+0x19/0xf0 [ 2923.106960][T23566] new_inode+0x1f/0x40 [ 2923.111045][T23566] __ext4_new_inode+0x3d5/0x4e50 [ 2923.116025][T23566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.122287][T23566] ? __dquot_initialize+0x525/0xd80 [ 2923.127533][T23566] ? ext4_free_inode+0x1490/0x1490 [ 2923.132661][T23566] ? dqget+0x10d0/0x10d0 [ 2923.137013][T23566] ? quarantine_put+0x11c/0x1c0 [ 2923.142069][T23566] ext4_mkdir+0x3df/0xe20 [ 2923.146415][T23566] ? ext4_init_dot_dotdot+0x520/0x520 [ 2923.151808][T23566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.158160][T23566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.164442][T23566] ? security_inode_permission+0xcb/0x100 [ 2923.170194][T23566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.176499][T23566] ? security_inode_mkdir+0xe4/0x120 [ 2923.182164][T23566] vfs_mkdir+0x42e/0x670 [ 2923.186431][T23566] do_mkdirat+0x234/0x2a0 [ 2923.190781][T23566] ? __ia32_sys_mknod+0xb0/0xb0 [ 2923.195738][T23566] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2923.201824][T23566] ? trace_hardirqs_off_caller+0x65/0x230 [ 2923.207769][T23566] __x64_sys_mkdir+0x5c/0x80 [ 2923.212378][T23566] do_syscall_64+0xfd/0x6a0 [ 2923.217110][T23566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2923.223059][T23566] RIP: 0033:0x458c47 [ 2923.227002][T23566] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2923.246623][T23566] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 15:05:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02180200020000000000009b00000000"], 0x10}}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x400000) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000001c0)={0x6, &(0x7f0000000100)="4e288ea1a95339919b087e58f6534a23f4e8d491a21a05b019997458c03ed0d5dcac78d0c900efe190f8d51608ffd9d8a7dd2e0c2e88c9c74448c8aa3f3c2511948ebc170467b5a6f6a27a974a37c6237374f8aee61e7aba493af78f66cc14c04d940a74baffa5208880a944740b806831dbb000e6a2b404b62b8e478f3f02df8dbc403396f663aad7f1a3a233"}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000200)={0x100000001, 0x0, 0x10003}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000240)={0x40c5, r2}) socket$caif_seqpacket(0x25, 0x5, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) 15:05:15 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000002ee000"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:15 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002a00) [ 2923.255085][T23566] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2923.263077][T23566] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2923.263084][T23566] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2923.263091][T23566] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2923.263106][T23566] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:15 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:15 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002a01) 15:05:15 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x0, 0x2, 0xf, 0x7, 0xbd}, 0x20) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x3, 0x4ad, 0x5, 0x4, 0x2, 0x0, 0x1, 0x2, 0xc0b, 0x20, 0x2}, 0xb) [ 2923.460385][T23605] FAULT_INJECTION: forcing a failure. [ 2923.460385][T23605] name failslab, interval 1, probability 0, space 0, times 0 [ 2923.473525][T23605] CPU: 1 PID: 23605 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2923.481612][T23605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2923.491682][T23605] Call Trace: [ 2923.494999][T23605] dump_stack+0x172/0x1f0 [ 2923.499535][T23605] should_fail.cold+0xa/0x15 [ 2923.504163][T23605] ? fault_create_debugfs_attr+0x180/0x180 [ 2923.510005][T23605] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2923.516033][T23605] ? save_stack+0x5c/0x90 [ 2923.520483][T23605] __should_failslab+0x121/0x190 [ 2923.525463][T23605] should_failslab+0x9/0x14 [ 2923.530093][T23605] kmem_cache_alloc+0x47/0x710 [ 2923.534895][T23605] ? __es_shrink+0xad0/0xad0 [ 2923.539791][T23605] ? do_raw_write_lock+0x124/0x290 [ 2923.544953][T23605] __es_insert_extent+0x2cc/0xf20 [ 2923.550017][T23605] ext4_es_insert_extent+0x2d0/0xa70 [ 2923.555681][T23605] ? ext4_es_scan_clu+0x50/0x50 [ 2923.561176][T23605] ? __es_find_extent_range+0x361/0x490 [ 2923.566747][T23605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2923.573006][T23605] ? ext4_es_find_extent_range+0x131/0x660 [ 2923.578844][T23605] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2923.584528][T23605] ? ext4_rereserve_cluster+0x240/0x240 [ 2923.590121][T23605] ? ext4_find_extent+0x76e/0x9d0 [ 2923.595181][T23605] ? ext4_find_extent+0x6a6/0x9d0 [ 2923.600271][T23605] ext4_ext_map_blocks+0x20c4/0x5040 [ 2923.605591][T23605] ? ext4_ext_release+0x10/0x10 [ 2923.610474][T23605] ? __kasan_check_write+0x14/0x20 [ 2923.615608][T23605] ? down_read+0x10a/0x3f0 [ 2923.620094][T23605] ? down_read_killable+0x460/0x460 [ 2923.626039][T23605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2923.632660][T23605] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2923.638433][T23605] ext4_map_blocks+0xdc5/0x17f0 [ 2923.643588][T23605] ? ext4_issue_zeroout+0x190/0x190 [ 2923.643608][T23605] ? ext4_set_acl+0x4f0/0x4f0 [ 2923.643627][T23605] ? __kasan_check_write+0x14/0x20 [ 2923.643640][T23605] ext4_getblk+0xc4/0x570 [ 2923.643655][T23605] ? ext4_iomap_begin+0x1000/0x1000 [ 2923.643674][T23605] ext4_bread+0x93/0x270 [ 2923.653663][T23605] ? ext4_getblk+0x570/0x570 [ 2923.653685][T23605] ext4_append+0x155/0x370 [ 2923.653702][T23605] ext4_mkdir+0x632/0xe20 [ 2923.653721][T23605] ? ext4_init_dot_dotdot+0x520/0x520 [ 2923.653737][T23605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.653750][T23605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.653776][T23605] ? security_inode_permission+0xcb/0x100 [ 2923.710624][T23605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2923.717067][T23605] ? security_inode_mkdir+0xe4/0x120 [ 2923.722389][T23605] vfs_mkdir+0x42e/0x670 [ 2923.726755][T23605] do_mkdirat+0x234/0x2a0 [ 2923.731113][T23605] ? __ia32_sys_mknod+0xb0/0xb0 [ 2923.735989][T23605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2923.742066][T23605] ? trace_hardirqs_off_caller+0x65/0x230 [ 2923.747916][T23605] __x64_sys_mkdir+0x5c/0x80 [ 2923.752518][T23605] do_syscall_64+0xfd/0x6a0 15:05:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:16 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002b00) 15:05:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2923.757076][T23605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2923.763504][T23605] RIP: 0033:0x458c47 [ 2923.767407][T23605] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2923.787293][T23605] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2923.796013][T23605] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2923.803993][T23605] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 15:05:16 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002b01) [ 2923.804000][T23605] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2923.804007][T23605] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2923.804013][T23605] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:16 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000003e800"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:16 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002c00) 15:05:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) 15:05:16 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:16 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002c01) 15:05:16 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x100, 0x200000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0xb00, 0x70bd2b, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @rand_addr=0x7ff}}, 0x0, 0x9, 0x0, "c28e67ac1839273d520bcf2fa80feb50e4d50de4d0a0de892a4cd96f81457f0570b2644900ece5fc9499767f7d3b4f0f9f088359003b4dbdd09a448b86195df41d0bbf8cf0b0e03b8d5442af212b4869"}, 0xd8) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) close(r3) [ 2924.194845][T23652] FAULT_INJECTION: forcing a failure. [ 2924.194845][T23652] name failslab, interval 1, probability 0, space 0, times 0 [ 2924.207494][T23652] CPU: 1 PID: 23652 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2924.215489][T23652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2924.225595][T23652] Call Trace: [ 2924.228927][T23652] dump_stack+0x172/0x1f0 [ 2924.233274][T23652] should_fail.cold+0xa/0x15 [ 2924.237996][T23652] ? fault_create_debugfs_attr+0x180/0x180 [ 2924.243825][T23652] ? __sigqueue_alloc+0x173/0x4d0 [ 2924.248870][T23652] ? __kasan_check_read+0x11/0x20 [ 2924.253917][T23652] __should_failslab+0x121/0x190 [ 2924.258885][T23652] should_failslab+0x9/0x14 [ 2924.263443][T23652] kmem_cache_alloc+0x47/0x710 [ 2924.268239][T23652] ? trace_event_raw_event_signal_deliver+0x4f0/0x4f0 [ 2924.275024][T23652] __sigqueue_alloc+0x268/0x4d0 [ 2924.279899][T23652] __send_signal+0x863/0x1090 [ 2924.284598][T23652] send_signal+0x4c1/0x7d0 [ 2924.289211][T23652] force_sig_info_to_task+0x278/0x340 [ 2924.294620][T23652] force_sig_fault+0xbe/0x100 [ 2924.299341][T23652] ? force_sig_fault_to_task+0xf0/0xf0 [ 2924.304820][T23652] ? trace_hardirqs_on+0x67/0x240 [ 2924.309882][T23652] __bad_area_nosemaphore+0x32e/0x420 [ 2924.315272][T23652] ? vmacache_find+0x65/0x310 [ 2924.320014][T23652] bad_area+0x69/0x80 [ 2924.324020][T23652] __do_page_fault+0xa28/0xdd0 [ 2924.328816][T23652] ? page_fault+0x16/0x40 [ 2924.333368][T23652] do_page_fault+0x38/0x590 [ 2924.337895][T23652] page_fault+0x39/0x40 [ 2924.342067][T23652] RIP: 0033:0x45342f [ 2924.345978][T23652] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 2924.365622][T23652] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00010283 [ 2924.371704][T23652] RAX: 00007f6b1e80eb40 RBX: 0000000020000228 RCX: 0000000000000000 [ 2924.379736][T23652] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f6b1e80eb40 [ 2924.387820][T23652] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 2924.395786][T23652] R10: 0000000000000075 R11: 00000000004e50e0 R12: 0000000000000004 [ 2924.403769][T23652] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:17 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002d00) 15:05:17 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4800, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0x57) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xefd2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x88, "efe493ac1826a8ad2dbb384d5479663a9d33e0ff59932375eb06060f40455831bd7987a6c1a779d5b1d5eb65a67a4310237121d239cd5edb8b78741d1a6cb915b1bde4b642938de17868b6118481e4fd6fa57d96e348a76c8a1921b00b312e6a21fefbc699490695ad6286e7ba78a279f1f6310f4bcde7416399eec3f41a208073ccdd99d2a9a933"}, &(0x7f0000000280)=0x90) 15:05:17 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2924.721285][T23681] FAULT_INJECTION: forcing a failure. [ 2924.721285][T23681] name failslab, interval 1, probability 0, space 0, times 0 [ 2924.761872][T23681] CPU: 0 PID: 23681 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2924.770077][T23681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2924.780146][T23681] Call Trace: [ 2924.783459][T23681] dump_stack+0x172/0x1f0 [ 2924.787838][T23681] should_fail.cold+0xa/0x15 [ 2924.792454][T23681] ? fault_create_debugfs_attr+0x180/0x180 [ 2924.798402][T23681] ? lock_downgrade+0x920/0x920 [ 2924.803375][T23681] ? ___might_sleep+0x163/0x280 [ 2924.808247][T23681] __should_failslab+0x121/0x190 [ 2924.813363][T23681] should_failslab+0x9/0x14 [ 2924.817951][T23681] kmem_cache_alloc+0x2aa/0x710 [ 2924.822912][T23681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2924.822929][T23681] ? __mark_inode_dirty+0x3d1/0x1390 [ 2924.822944][T23681] ext4_mb_new_blocks+0x5b9/0x3870 [ 2924.822960][T23681] ? quarantine_put+0x11c/0x1c0 [ 2924.822973][T23681] ? ext4_find_extent+0x76e/0x9d0 [ 2924.822992][T23681] ext4_ext_map_blocks+0x2b34/0x5040 [ 2924.823009][T23681] ? ext4_ext_release+0x10/0x10 [ 2924.823033][T23681] ? lock_acquire+0x190/0x410 [ 2924.864731][T23681] ? ext4_map_blocks+0x4b1/0x17f0 [ 2924.869772][T23681] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2924.875245][T23681] ext4_map_blocks+0x529/0x17f0 [ 2924.880114][T23681] ? ext4_issue_zeroout+0x190/0x190 [ 2924.885329][T23681] ? ext4_set_acl+0x4f0/0x4f0 [ 2924.890380][T23681] ? __kasan_check_write+0x14/0x20 [ 2924.895493][T23681] ext4_getblk+0xc4/0x570 [ 2924.899816][T23681] ? ext4_iomap_begin+0x1000/0x1000 [ 2924.905017][T23681] ext4_bread+0x93/0x270 [ 2924.909252][T23681] ? ext4_getblk+0x570/0x570 [ 2924.913940][T23681] ext4_append+0x155/0x370 [ 2924.918580][T23681] ext4_mkdir+0x632/0xe20 [ 2924.923215][T23681] ? ext4_init_dot_dotdot+0x520/0x520 [ 2924.928635][T23681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2924.934887][T23681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2924.941149][T23681] ? security_inode_permission+0xcb/0x100 [ 2924.946866][T23681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2924.953215][T23681] ? security_inode_mkdir+0xe4/0x120 [ 2924.958807][T23681] vfs_mkdir+0x42e/0x670 [ 2924.963075][T23681] do_mkdirat+0x234/0x2a0 [ 2924.967859][T23681] ? __ia32_sys_mknod+0xb0/0xb0 [ 2924.972745][T23681] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2924.978814][T23681] ? trace_hardirqs_off_caller+0x65/0x230 [ 2924.984558][T23681] __x64_sys_mkdir+0x5c/0x80 [ 2924.989190][T23681] do_syscall_64+0xfd/0x6a0 [ 2924.993714][T23681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2924.999615][T23681] RIP: 0033:0x458c47 [ 2925.003619][T23681] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2925.023882][T23681] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2925.032296][T23681] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 2925.040345][T23681] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 2925.048309][T23681] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2925.056739][T23681] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2925.066333][T23681] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:17 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000001f400"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:17 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002d01) 15:05:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000100)={0x5, 0x3, 0xffffffff, 0x1f, 0x8001, 0x0, 0x200000}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:17 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:17 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002e00) 15:05:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xfd', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2925.296690][T23709] FAULT_INJECTION: forcing a failure. [ 2925.296690][T23709] name failslab, interval 1, probability 0, space 0, times 0 [ 2925.386444][T23709] CPU: 0 PID: 23709 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2925.394478][T23709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2925.405300][T23709] Call Trace: [ 2925.408706][T23709] dump_stack+0x172/0x1f0 [ 2925.413067][T23709] should_fail.cold+0xa/0x15 [ 2925.417937][T23709] ? do_syscall_64+0xfd/0x6a0 [ 2925.422642][T23709] ? fault_create_debugfs_attr+0x180/0x180 [ 2925.428468][T23709] ? page_to_nid.part.0+0x20/0x20 [ 2925.433516][T23709] ? ___might_sleep+0x163/0x280 [ 2925.438394][T23709] __should_failslab+0x121/0x190 [ 2925.443337][T23709] should_failslab+0x9/0x14 [ 2925.443350][T23709] kmem_cache_alloc+0x2aa/0x710 [ 2925.443365][T23709] ? __kasan_check_write+0x14/0x20 [ 2925.443383][T23709] getname_flags+0xd6/0x5b0 [ 2925.443400][T23709] user_path_at_empty+0x2f/0x50 [ 2925.443416][T23709] do_mount+0x150/0x1c30 [ 2925.443430][T23709] ? kasan_kmalloc+0x9/0x10 [ 2925.443451][T23709] ? copy_mount_string+0x40/0x40 15:05:17 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002e01) 15:05:17 executing program 1: socket$key(0xf, 0x3, 0x2) 15:05:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) [ 2925.452803][T23709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2925.452819][T23709] ? copy_mount_options+0x2e8/0x3f0 [ 2925.452836][T23709] ksys_mount+0xdb/0x150 [ 2925.452853][T23709] __x64_sys_mount+0xbe/0x150 [ 2925.452879][T23709] do_syscall_64+0xfd/0x6a0 [ 2925.505816][T23709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2925.511814][T23709] RIP: 0033:0x45c27a [ 2925.515738][T23709] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2925.535583][T23709] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2925.544360][T23709] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2925.544368][T23709] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2925.544375][T23709] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2925.544382][T23709] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2925.544389][T23709] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:18 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000fffffff500"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:18 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002f00) 15:05:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:18 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0xbf9, 0x240) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f00000003c0)={0x0, 0x80, 0x2, [], &(0x7f0000000380)=0x6383c623}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[@mss, @mss={0x2, 0xe758}, @sack_perm], 0x3) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x8400, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000100)=0x1) sendmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000540)="b38d23b7019efad93c5a57f98bc23f6cb4d377fb6263eacd65c6dae633450ffb237f82fbb9fd969ebd0b07efcce1916120c6e48db9501e42b331960b4e133588603e773c7d36ae22074b800e9bbbc123119b27d6b2d565fb7e6f9c2f4d4197ac77806f85800a662b905bc76a975b14629132db4f239fe5c979af43e1a1288525c0e4f0ac3bec6a7d0709260a30594c9ed8", 0x91}], 0x1, &(0x7f00000004c0)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r3]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}], 0x48, 0x8000}, 0x10) 15:05:18 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000002f01) 15:05:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) [ 2926.260933][T23762] FAULT_INJECTION: forcing a failure. [ 2926.260933][T23762] name failslab, interval 1, probability 0, space 0, times 0 15:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0xc2, 0x0, 0x2000000000000125, 0x0, 0x0, 0x1}, 0x10}}, 0xffffffffffffffff) 15:05:18 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000fc00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2926.358078][T23762] CPU: 0 PID: 23762 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2926.366561][T23762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2926.376768][T23762] Call Trace: [ 2926.380081][T23762] dump_stack+0x172/0x1f0 [ 2926.384448][T23762] should_fail.cold+0xa/0x15 [ 2926.389074][T23762] ? fault_create_debugfs_attr+0x180/0x180 [ 2926.395184][T23762] ? page_to_nid.part.0+0x20/0x20 [ 2926.400233][T23762] ? ___might_sleep+0x163/0x280 [ 2926.405123][T23762] __should_failslab+0x121/0x190 [ 2926.410078][T23762] should_failslab+0x9/0x14 [ 2926.414596][T23762] __kmalloc_track_caller+0x2dc/0x760 [ 2926.414662][T23762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2926.426553][T23762] ? strndup_user+0x77/0xd0 [ 2926.431084][T23762] memdup_user+0x26/0xb0 [ 2926.435426][T23762] strndup_user+0x77/0xd0 [ 2926.439794][T23762] ksys_mount+0x7b/0x150 [ 2926.444166][T23762] __x64_sys_mount+0xbe/0x150 [ 2926.448860][T23762] do_syscall_64+0xfd/0x6a0 15:05:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) [ 2926.453472][T23762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2926.459387][T23762] RIP: 0033:0x45c27a [ 2926.463315][T23762] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2926.483028][T23762] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2926.491645][T23762] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2926.499691][T23762] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003000) 15:05:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2926.507688][T23762] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2926.515675][T23762] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2926.523664][T23762] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) 15:05:19 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x8000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x2, 0x5}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x8}, &(0x7f0000000280)=0x8) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0xcb}}, 0x0) 15:05:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003001) 15:05:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x11, 0x3, 0x4, 0x22, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_lifetime={0x4, 0x4, 0x8000, 0x5, 0xffffffffffff8001, 0x4a}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e20}, @sadb_ident={0x2, 0x0, 0xfffffffffffffffd, 0x0, 0x7fff}, @sadb_x_sec_ctx={0xd, 0x18, 0x6, 0x10001, 0x5d, "02e16b9894566f269ea80a576596bfa8d00d596aceb599855651804df3d5f939aa4e2a60ecec7b761902c2c8cfd059038d6a7a0f823e9026d33b56830332f864154b11ec14ba754b5e538675ea628bc0dca1f5a4697341d86d1e5b89fc"}, @sadb_lifetime={0x4, 0x2, 0x8001, 0x1, 0x80000001, 0x7f}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d3}, @sadb_x_filter={0x5, 0x1a, @in=@local, @in6=@mcast1, 0x4, 0x14, 0x10}]}, 0x110}}, 0x0) 15:05:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) [ 2926.805410][T23809] FAULT_INJECTION: forcing a failure. [ 2926.805410][T23809] name failslab, interval 1, probability 0, space 0, times 0 [ 2926.890700][T23809] CPU: 0 PID: 23809 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2926.898761][T23809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2926.908855][T23809] Call Trace: [ 2926.912842][T23809] dump_stack+0x172/0x1f0 [ 2926.917384][T23809] should_fail.cold+0xa/0x15 [ 2926.922001][T23809] ? fault_create_debugfs_attr+0x180/0x180 [ 2926.928304][T23809] ? page_to_nid.part.0+0x20/0x20 [ 2926.933619][T23809] ? ___might_sleep+0x163/0x280 [ 2926.938518][T23809] __should_failslab+0x121/0x190 [ 2926.943570][T23809] should_failslab+0x9/0x14 [ 2926.948366][T23809] __kmalloc_track_caller+0x2dc/0x760 [ 2926.953800][T23809] ? setup_sigcontext+0x7d0/0x7d0 [ 2926.953817][T23809] ? preempt_schedule_irq+0xf3/0x160 [ 2926.953830][T23809] ? strndup_user+0x77/0xd0 [ 2926.953843][T23809] memdup_user+0x26/0xb0 [ 2926.953856][T23809] strndup_user+0x77/0xd0 [ 2926.953870][T23809] ksys_mount+0x3c/0x150 [ 2926.953896][T23809] __x64_sys_mount+0xbe/0x150 [ 2926.987474][T23809] do_syscall_64+0xfd/0x6a0 [ 2926.992292][T23809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2926.998213][T23809] RIP: 0033:0x45c27a [ 2927.002384][T23809] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2927.022102][T23809] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2927.030714][T23809] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2927.038715][T23809] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2927.047144][T23809] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2927.055244][T23809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2927.063644][T23809] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003100) 15:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fdatasync(r1) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:19 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000080fe00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:19 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003101) [ 2927.312248][T23839] FAULT_INJECTION: forcing a failure. [ 2927.312248][T23839] name failslab, interval 1, probability 0, space 0, times 0 [ 2927.351594][T23839] CPU: 0 PID: 23839 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2927.360515][T23839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2927.370865][T23839] Call Trace: [ 2927.376669][T23839] dump_stack+0x172/0x1f0 [ 2927.383075][T23839] should_fail.cold+0xa/0x15 [ 2927.389958][T23839] ? fault_create_debugfs_attr+0x180/0x180 [ 2927.395908][T23839] ? page_to_nid.part.0+0x20/0x20 [ 2927.403827][T23839] ? ___might_sleep+0x163/0x280 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003200) [ 2927.408722][T23839] __should_failslab+0x121/0x190 [ 2927.413700][T23839] should_failslab+0x9/0x14 [ 2927.418241][T23839] __kmalloc_track_caller+0x2dc/0x760 [ 2927.423659][T23839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2927.430362][T23839] ? strndup_user+0x77/0xd0 [ 2927.434986][T23839] memdup_user+0x26/0xb0 [ 2927.439266][T23839] strndup_user+0x77/0xd0 [ 2927.443707][T23839] ksys_mount+0x7b/0x150 [ 2927.448067][T23839] __x64_sys_mount+0xbe/0x150 [ 2927.452912][T23839] do_syscall_64+0xfd/0x6a0 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003201) [ 2927.457442][T23839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2927.463524][T23839] RIP: 0033:0x45c27a [ 2927.467431][T23839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2927.488006][T23839] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2927.496524][T23839] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2927.504506][T23839] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 15:05:19 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003300) 15:05:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2927.512490][T23839] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2927.520993][T23839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2927.528977][T23839] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)={{0x1cc, 0x4a, 0x5877, 0x8f, 0x382, 0xfffffffffffffb90, 0x353, 0x2}, "4d9220ac142fa2ddb80ac634bc238878f4f6729ba5bfd04e07dfc8ba961ed9d2cd3cd4504abfd8c725b855829a6fc7171199788fb95b20eaa9ff42bec31b7b1d13916d31ad1efc7b287a34fdafe10a6803c447848f5fd47e028ee4066ff48c92c3a0679303390a2d673e0bc02f3043635d6c9c87c3d6a96a17e30a16a4b158c5e76731b116cddea34f1e3eb6843255e3b7e3379c668c7faf44cffddd472e2b87f52a65cfcb14433290bbab9ff4d3b46c6df5c641e7bfeb20fa78d30a7d334eb7cff85a36aa0abaabfc0e877dcf18c9dd20a9215d31ba51c3387dacb73bfc1e3c19d76a70d913821c248abc"}, 0x10b) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x8000) sync_file_range(r0, 0x0, 0x1f, 0x2) 15:05:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="0208010000000de167ab16d11055b2a89545851e0000000000000000"], 0x10}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x602d82) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000100)=0x8) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000140)=0x8000) 15:05:20 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:20 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003301) 15:05:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2927.843098][T23882] FAULT_INJECTION: forcing a failure. [ 2927.843098][T23882] name failslab, interval 1, probability 0, space 0, times 0 [ 2927.863624][T23882] CPU: 0 PID: 23882 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2927.871940][T23882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2927.882013][T23882] Call Trace: [ 2927.885332][T23882] dump_stack+0x172/0x1f0 [ 2927.889695][T23882] should_fail.cold+0xa/0x15 [ 2927.894402][T23882] ? fault_create_debugfs_attr+0x180/0x180 [ 2927.901190][T23882] ? ___might_sleep+0x163/0x280 [ 2927.906065][T23882] __should_failslab+0x121/0x190 [ 2927.911039][T23882] should_failslab+0x9/0x14 [ 2927.915731][T23882] __kmalloc+0x2e0/0x770 [ 2927.915745][T23882] ? save_stack+0x5c/0x90 [ 2927.915755][T23882] ? save_stack+0x23/0x90 [ 2927.915769][T23882] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2927.915790][T23882] tomoyo_encode2.part.0+0xf5/0x400 [ 2927.939649][T23882] ? do_syscall_64+0xfd/0x6a0 [ 2927.944337][T23882] tomoyo_encode+0x2b/0x50 [ 2927.948933][T23882] tomoyo_mount_acl+0xe0/0x840 [ 2927.953878][T23882] ? __kasan_check_read+0x11/0x20 [ 2927.958910][T23882] ? __kasan_check_write+0x14/0x20 [ 2927.964023][T23882] ? lock_downgrade+0x920/0x920 [ 2927.968877][T23882] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2927.974428][T23882] ? debug_check_no_obj_freed+0xc0/0x43f [ 2927.980061][T23882] ? trace_hardirqs_off+0x62/0x240 [ 2927.985406][T23882] ? lock_acquire+0x190/0x410 [ 2927.990085][T23882] ? tomoyo_mount_permission+0x10a/0x410 [ 2927.995776][T23882] tomoyo_mount_permission+0x16a/0x410 [ 2928.001260][T23882] ? tomoyo_mount_permission+0x10a/0x410 [ 2928.006907][T23882] ? tomoyo_mount_acl+0x840/0x840 [ 2928.011966][T23882] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2928.018207][T23882] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2928.024609][T23882] ? strncpy_from_user+0x2b4/0x400 [ 2928.029833][T23882] tomoyo_sb_mount+0x35/0x40 [ 2928.034433][T23882] security_sb_mount+0x87/0xd0 [ 2928.039220][T23882] do_mount+0x1d4/0x1c30 [ 2928.048057][T23882] ? kasan_kmalloc+0x9/0x10 [ 2928.052585][T23882] ? copy_mount_string+0x40/0x40 [ 2928.057537][T23882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2928.063776][T23882] ? copy_mount_options+0x2e8/0x3f0 [ 2928.068970][T23882] ksys_mount+0xdb/0x150 [ 2928.073211][T23882] __x64_sys_mount+0xbe/0x150 [ 2928.077891][T23882] do_syscall_64+0xfd/0x6a0 [ 2928.082383][T23882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2928.088284][T23882] RIP: 0033:0x45c27a [ 2928.092283][T23882] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2928.111880][T23882] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2928.120297][T23882] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2928.128268][T23882] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2928.136230][T23882] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 15:05:20 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000c0fe00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:20 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) 15:05:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:20 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003400) [ 2928.144203][T23882] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2928.152178][T23882] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000003c0)={0x2, [0x0, 0x0]}, &(0x7f0000000400)=0x8) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x5, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) sendmsg$can_raw(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r3}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x0, 0x6, 0x0, 0x7}, 0x1, 0x1, 0x0, 0x0, "164e3cb5825725be"}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:20 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:20 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003401) 15:05:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2928.434188][T23919] FAULT_INJECTION: forcing a failure. [ 2928.434188][T23919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2928.447427][T23919] CPU: 1 PID: 23919 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2928.455425][T23919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2928.465496][T23919] Call Trace: [ 2928.468840][T23919] dump_stack+0x172/0x1f0 [ 2928.473194][T23919] should_fail.cold+0xa/0x15 [ 2928.477810][T23919] ? fault_create_debugfs_attr+0x180/0x180 [ 2928.483633][T23919] ? stack_trace_save+0xac/0xe0 [ 2928.488502][T23919] ? stack_trace_consume_entry+0x190/0x190 [ 2928.494336][T23919] should_fail_alloc_page+0x50/0x60 [ 2928.499555][T23919] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2928.504959][T23919] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2928.510708][T23919] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2928.516354][T23919] ? __kasan_check_read+0x11/0x20 [ 2928.521393][T23919] ? fault_create_debugfs_attr+0x180/0x180 [ 2928.527214][T23919] cache_grow_begin+0x90/0xd20 [ 2928.532074][T23919] ? getname_flags+0xd6/0x5b0 [ 2928.536765][T23919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2928.543020][T23919] kmem_cache_alloc+0x64e/0x710 [ 2928.547893][T23919] getname_flags+0xd6/0x5b0 [ 2928.552419][T23919] user_path_at_empty+0x2f/0x50 [ 2928.557298][T23919] do_mount+0x150/0x1c30 [ 2928.561553][T23919] ? kasan_kmalloc+0x9/0x10 [ 2928.566071][T23919] ? copy_mount_string+0x40/0x40 [ 2928.571036][T23919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2928.577341][T23919] ? copy_mount_options+0x2e8/0x3f0 [ 2928.582604][T23919] ksys_mount+0xdb/0x150 [ 2928.586978][T23919] __x64_sys_mount+0xbe/0x150 [ 2928.591709][T23919] do_syscall_64+0xfd/0x6a0 [ 2928.596261][T23919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2928.602520][T23919] RIP: 0033:0x45c27a [ 2928.606437][T23919] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2928.626597][T23919] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003500) 15:05:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003501) [ 2928.635118][T23919] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2928.643131][T23919] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2928.651128][T23919] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2928.659146][T23919] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2928.667737][T23919] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x0) io_uring_enter(r1, 0x0, 0xf8c, 0x1, &(0x7f0000000100)={0x1ff}, 0x8) 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003600) 15:05:21 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:21 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000ff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:21 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003601) [ 2929.178197][T23964] FAULT_INJECTION: forcing a failure. [ 2929.178197][T23964] name failslab, interval 1, probability 0, space 0, times 0 [ 2929.230047][T23964] CPU: 1 PID: 23964 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2929.238105][T23964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2929.248966][T23964] Call Trace: [ 2929.252288][T23964] dump_stack+0x172/0x1f0 [ 2929.261723][T23964] should_fail.cold+0xa/0x15 [ 2929.266364][T23964] ? fault_create_debugfs_attr+0x180/0x180 [ 2929.272788][T23964] ? page_to_nid.part.0+0x20/0x20 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003700) [ 2929.278035][T23964] ? ___might_sleep+0x163/0x280 [ 2929.282923][T23964] __should_failslab+0x121/0x190 [ 2929.288012][T23964] should_failslab+0x9/0x14 [ 2929.292530][T23964] kmem_cache_alloc+0x2aa/0x710 [ 2929.298923][T23964] ? __schedule+0x75d/0x1580 [ 2929.303565][T23964] getname_flags+0xd6/0x5b0 [ 2929.303582][T23964] user_path_at_empty+0x2f/0x50 [ 2929.303598][T23964] do_mount+0x150/0x1c30 [ 2929.303610][T23964] ? retint_kernel+0x2b/0x2b [ 2929.303627][T23964] ? copy_mount_string+0x40/0x40 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003701) [ 2929.303649][T23964] ? copy_mount_options+0x270/0x3f0 [ 2929.332061][T23964] ? audit_add_tree_rule.cold+0x37/0x37 [ 2929.337639][T23964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2929.343925][T23964] ? copy_mount_options+0x2e8/0x3f0 [ 2929.349346][T23964] ksys_mount+0xdb/0x150 [ 2929.353697][T23964] __x64_sys_mount+0xbe/0x150 [ 2929.358484][T23964] do_syscall_64+0xfd/0x6a0 [ 2929.363037][T23964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2929.369441][T23964] RIP: 0033:0x45c27a 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003800) [ 2929.373373][T23964] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2929.393012][T23964] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2929.402617][T23964] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2929.411041][T23964] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2929.419050][T23964] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 15:05:21 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003801) 15:05:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0218000002001085c800100000000000"], 0x10}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) [ 2929.427038][T23964] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2929.435390][T23964] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:22 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003900) 15:05:22 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2929.687353][T24008] FAULT_INJECTION: forcing a failure. [ 2929.687353][T24008] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2929.700616][T24008] CPU: 1 PID: 24008 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2929.708614][T24008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2929.718767][T24008] Call Trace: [ 2929.722137][T24008] dump_stack+0x172/0x1f0 [ 2929.726581][T24008] should_fail.cold+0xa/0x15 [ 2929.731189][T24008] ? __kmalloc+0x163/0x770 [ 2929.735631][T24008] ? fault_create_debugfs_attr+0x180/0x180 [ 2929.741538][T24008] ? do_mount+0x1d4/0x1c30 [ 2929.745980][T24008] ? ksys_mount+0xdb/0x150 [ 2929.750432][T24008] ? __x64_sys_mount+0xbe/0x150 [ 2929.755664][T24008] ? do_syscall_64+0xfd/0x6a0 [ 2929.760352][T24008] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2929.766521][T24008] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2929.772281][T24008] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 2929.777731][T24008] should_fail_alloc_page+0x50/0x60 [ 2929.782951][T24008] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2929.788318][T24008] ? kernel_text_address+0x73/0xf0 [ 2929.793422][T24008] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2929.799327][T24008] ? unwind_get_return_address+0x61/0xa0 [ 2929.804953][T24008] ? profile_setup.cold+0xbb/0xbb [ 2929.809987][T24008] ? should_fail+0x1de/0x852 [ 2929.814707][T24008] ? fault_create_debugfs_attr+0x180/0x180 [ 2929.820535][T24008] cache_grow_begin+0x90/0xd20 [ 2929.825292][T24008] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2929.831131][T24008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2929.837388][T24008] __kmalloc+0x6b2/0x770 [ 2929.841762][T24008] ? kasan_kmalloc+0x9/0x10 [ 2929.846258][T24008] ? __kmalloc+0x351/0x770 [ 2929.850677][T24008] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2929.856406][T24008] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2929.862058][T24008] tomoyo_mount_acl+0x149/0x840 [ 2929.867166][T24008] ? __kasan_check_read+0x11/0x20 [ 2929.872397][T24008] ? __kasan_check_write+0x14/0x20 [ 2929.877537][T24008] ? lock_downgrade+0x920/0x920 [ 2929.882385][T24008] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2929.887941][T24008] ? debug_check_no_obj_freed+0xc0/0x43f [ 2929.893686][T24008] ? trace_hardirqs_off+0x62/0x240 [ 2929.898806][T24008] ? lock_acquire+0x190/0x410 [ 2929.903499][T24008] ? tomoyo_mount_permission+0x10a/0x410 [ 2929.909163][T24008] tomoyo_mount_permission+0x16a/0x410 [ 2929.914624][T24008] ? tomoyo_mount_permission+0x10a/0x410 [ 2929.920289][T24008] ? tomoyo_mount_acl+0x840/0x840 [ 2929.925329][T24008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2929.931674][T24008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2929.937929][T24008] ? strncpy_from_user+0x2b4/0x400 [ 2929.943046][T24008] tomoyo_sb_mount+0x35/0x40 [ 2929.947835][T24008] security_sb_mount+0x87/0xd0 [ 2929.952699][T24008] do_mount+0x1d4/0x1c30 [ 2929.956962][T24008] ? kasan_kmalloc+0x9/0x10 [ 2929.961481][T24008] ? copy_mount_string+0x40/0x40 [ 2929.966432][T24008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2929.972692][T24008] ? copy_mount_options+0x2e8/0x3f0 [ 2929.977895][T24008] ksys_mount+0xdb/0x150 [ 2929.982155][T24008] __x64_sys_mount+0xbe/0x150 [ 2929.986839][T24008] do_syscall_64+0xfd/0x6a0 [ 2929.991351][T24008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2929.997249][T24008] RIP: 0033:0x45c27a [ 2930.001230][T24008] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2930.020942][T24008] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2930.029368][T24008] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2930.037437][T24008] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2930.045517][T24008] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2930.053508][T24008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2930.061490][T24008] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:22 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000fff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:22 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003901) 15:05:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'batadv0\x00', {0x2, 0x4e23, @empty}}) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x15, 0x4ba, 0x0, 0x2368, 0x0, 0x800000, 0x3}, 0x10}}, 0x0) alarm(0x20000000a) 15:05:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:22 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) 15:05:22 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003a00) 15:05:22 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:22 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x2dd, 0x406000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000240)={r1, 0x80000, r2}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="02180000020000000000000000000000cb5e0c73d0e0c998fd0a22f121f04cec0089a2ba2402ec8baa8d35a076610523ae28e263ca9449cccf91c5728bed029e699a188244be0e65cc28794e277b348711245ec5a0b0ff28d1090023e9509b49e0f94caec825f518ee18bcb2e591e7891c3991721a9498e1fcb3aeafb3efd6066947530daadafb748e77bc69ac91f6126a9c26f367772ddfd024dff3c4009032b555e666a96dc62abd6fa7298743d989ab93985df2c453fc225967264201670718cef1ccc3838e0000000000"], 0x10}}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dsp\x00', 0x20001, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000006c0)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xaaa9, 0x61ef73fe, 0x4, 0x0, 0x10c3}, &(0x7f0000000780)=0x260) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000007c0)={r5, 0x8}, &(0x7f0000000800)=0x8) 15:05:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:22 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003a01) 15:05:22 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003b00) [ 2930.438925][T24053] FAULT_INJECTION: forcing a failure. [ 2930.438925][T24053] name failslab, interval 1, probability 0, space 0, times 0 [ 2930.477743][T24053] CPU: 1 PID: 24053 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 15:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x168, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x0) [ 2930.485864][T24053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.496029][T24053] Call Trace: [ 2930.496066][T24053] dump_stack+0x172/0x1f0 [ 2930.496087][T24053] should_fail.cold+0xa/0x15 [ 2930.496110][T24053] ? __kasan_check_read+0x11/0x20 [ 2930.496128][T24053] ? fault_create_debugfs_attr+0x180/0x180 [ 2930.496161][T24053] ? page_to_nid.part.0+0x20/0x20 [ 2930.524958][T24053] ? ___might_sleep+0x163/0x280 [ 2930.529842][T24053] __should_failslab+0x121/0x190 [ 2930.534805][T24053] should_failslab+0x9/0x14 [ 2930.539505][T24053] kmem_cache_alloc_trace+0x2d3/0x790 [ 2930.545255][T24053] ? lockdep_init_map+0x1be/0x6d0 [ 2930.550568][T24053] legacy_init_fs_context+0x48/0xe0 [ 2930.557060][T24053] ? generic_parse_monolithic+0x200/0x200 [ 2930.562818][T24053] alloc_fs_context+0x3d1/0x6c0 [ 2930.567698][T24053] fs_context_for_mount+0x25/0x30 [ 2930.572754][T24053] do_mount+0x132d/0x1c30 [ 2930.577117][T24053] ? copy_mount_string+0x40/0x40 [ 2930.582106][T24053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2930.588368][T24053] ? _copy_from_user+0x12c/0x1a0 [ 2930.593331][T24053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2930.599625][T24053] ? copy_mount_options+0x2e8/0x3f0 [ 2930.605126][T24053] ksys_mount+0xdb/0x150 [ 2930.605144][T24053] __x64_sys_mount+0xbe/0x150 [ 2930.605162][T24053] do_syscall_64+0xfd/0x6a0 [ 2930.605179][T24053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.605202][T24053] RIP: 0033:0x45c27a [ 2930.628732][T24053] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2930.648690][T24053] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2930.657150][T24053] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2930.665210][T24053] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2930.673175][T24053] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2930.681149][T24053] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2930.689133][T24053] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:23 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000008dffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:23 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003b01) 15:05:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:23 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x23, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x80010, r1, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000100)=0x1) 15:05:23 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:23 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003c00) [ 2931.116629][T24083] FAULT_INJECTION: forcing a failure. [ 2931.116629][T24083] name failslab, interval 1, probability 0, space 0, times 0 [ 2931.156642][T24083] CPU: 1 PID: 24083 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2931.164847][T24083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2931.175193][T24083] Call Trace: [ 2931.178514][T24083] dump_stack+0x172/0x1f0 [ 2931.182898][T24083] should_fail.cold+0xa/0x15 [ 2931.187510][T24083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2931.193786][T24083] ? fault_create_debugfs_attr+0x180/0x180 [ 2931.199619][T24083] ? fault_create_debugfs_attr+0x180/0x180 [ 2931.205535][T24083] ? ___might_sleep+0x163/0x280 [ 2931.210399][T24083] __should_failslab+0x121/0x190 15:05:23 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000091ffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2931.215349][T24083] should_failslab+0x9/0x14 [ 2931.219862][T24083] __kmalloc+0x2e0/0x770 [ 2931.224131][T24083] ? kasan_kmalloc+0x9/0x10 [ 2931.228653][T24083] ? __kmalloc+0x351/0x770 [ 2931.233085][T24083] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2931.238836][T24083] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2931.244408][T24083] tomoyo_mount_acl+0x149/0x840 [ 2931.249289][T24083] ? __kasan_check_read+0x11/0x20 [ 2931.254336][T24083] ? __kasan_check_write+0x14/0x20 [ 2931.259464][T24083] ? lock_downgrade+0x920/0x920 15:05:23 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003c01) [ 2931.264333][T24083] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2931.269902][T24083] ? debug_check_no_obj_freed+0xc0/0x43f [ 2931.275576][T24083] ? trace_hardirqs_off+0x62/0x240 [ 2931.280722][T24083] ? lock_acquire+0x190/0x410 [ 2931.285438][T24083] ? tomoyo_mount_permission+0x10a/0x410 [ 2931.291208][T24083] tomoyo_mount_permission+0x16a/0x410 [ 2931.303483][T24083] ? tomoyo_mount_permission+0x10a/0x410 [ 2931.309163][T24083] ? tomoyo_mount_acl+0x840/0x840 [ 2931.314225][T24083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2931.320495][T24083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2931.326842][T24083] ? strncpy_from_user+0x2b4/0x400 [ 2931.331969][T24083] tomoyo_sb_mount+0x35/0x40 [ 2931.336586][T24083] security_sb_mount+0x87/0xd0 [ 2931.341374][T24083] do_mount+0x1d4/0x1c30 [ 2931.345632][T24083] ? kasan_kmalloc+0x9/0x10 [ 2931.350151][T24083] ? copy_mount_string+0x40/0x40 [ 2931.355118][T24083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2931.361398][T24083] ? copy_mount_options+0x2e8/0x3f0 15:05:23 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003d00) 15:05:23 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000f5ffffff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2931.366633][T24083] ksys_mount+0xdb/0x150 [ 2931.370978][T24083] __x64_sys_mount+0xbe/0x150 [ 2931.375696][T24083] do_syscall_64+0xfd/0x6a0 [ 2931.380212][T24083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2931.386121][T24083] RIP: 0033:0x45c27a [ 2931.390057][T24083] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2931.410565][T24083] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2931.418992][T24083] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2931.426972][T24083] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2931.435043][T24083] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2931.443050][T24083] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2931.451034][T24083] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x280) ioctl$KDMKTONE(r1, 0x4b30, 0x8001) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2931.478310][T24083] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:24 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003d01) 15:05:24 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:24 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000f0ffffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:24 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003e00) [ 2931.863427][T24142] FAULT_INJECTION: forcing a failure. [ 2931.863427][T24142] name failslab, interval 1, probability 0, space 0, times 0 [ 2931.897336][T24142] CPU: 0 PID: 24142 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2931.905362][T24142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2931.915431][T24142] Call Trace: [ 2931.918837][T24142] dump_stack+0x172/0x1f0 [ 2931.923227][T24142] should_fail.cold+0xa/0x15 [ 2931.927843][T24142] ? fault_create_debugfs_attr+0x180/0x180 [ 2931.933673][T24142] ? ___might_sleep+0x163/0x280 [ 2931.938545][T24142] __should_failslab+0x121/0x190 [ 2931.943546][T24142] should_failslab+0x9/0x14 [ 2931.948042][T24142] __kmalloc+0x2e0/0x770 [ 2931.952340][T24142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2931.958576][T24142] ? d_absolute_path+0x11b/0x170 [ 2931.963510][T24142] ? __d_path+0x140/0x140 [ 2931.967848][T24142] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2931.973222][T24142] tomoyo_encode2.part.0+0xf5/0x400 [ 2931.978521][T24142] tomoyo_encode+0x2b/0x50 [ 2931.982946][T24142] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2931.988791][T24142] tomoyo_mount_acl+0x2cc/0x840 [ 2931.993741][T24142] ? __kasan_check_read+0x11/0x20 [ 2931.998802][T24142] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2932.004348][T24142] ? debug_check_no_obj_freed+0xc0/0x43f [ 2932.009970][T24142] ? trace_hardirqs_off+0x62/0x240 [ 2932.015093][T24142] ? lock_acquire+0x190/0x410 [ 2932.019779][T24142] ? tomoyo_mount_permission+0x10a/0x410 [ 2932.025410][T24142] tomoyo_mount_permission+0x16a/0x410 [ 2932.030864][T24142] ? tomoyo_mount_permission+0x10a/0x410 [ 2932.036489][T24142] ? tomoyo_mount_acl+0x840/0x840 [ 2932.041501][T24142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2932.047742][T24142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2932.054333][T24142] ? strncpy_from_user+0x2b4/0x400 [ 2932.059443][T24142] tomoyo_sb_mount+0x35/0x40 [ 2932.064031][T24142] security_sb_mount+0x87/0xd0 [ 2932.068784][T24142] do_mount+0x1d4/0x1c30 [ 2932.073026][T24142] ? kasan_kmalloc+0x9/0x10 [ 2932.077525][T24142] ? copy_mount_string+0x40/0x40 [ 2932.082462][T24142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2932.088696][T24142] ? _copy_from_user+0x12c/0x1a0 [ 2932.093657][T24142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2932.099895][T24142] ? copy_mount_options+0x2e8/0x3f0 [ 2932.105078][T24142] ksys_mount+0xdb/0x150 [ 2932.109321][T24142] __x64_sys_mount+0xbe/0x150 [ 2932.113996][T24142] do_syscall_64+0xfd/0x6a0 [ 2932.118494][T24142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2932.124456][T24142] RIP: 0033:0x45c27a [ 2932.128359][T24142] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2932.148141][T24142] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:05:24 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:24 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003e01) 15:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40002, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:24 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003f00) [ 2932.156563][T24142] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2932.165053][T24142] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2932.173020][T24142] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2932.181017][T24142] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2932.189353][T24142] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2932.199868][T24142] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:24 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:24 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000003f01) 15:05:24 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2932.560791][T24182] FAULT_INJECTION: forcing a failure. [ 2932.560791][T24182] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.576912][T24182] CPU: 0 PID: 24182 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2932.585012][T24182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2932.595194][T24182] Call Trace: [ 2932.595225][T24182] dump_stack+0x172/0x1f0 [ 2932.595248][T24182] should_fail.cold+0xa/0x15 [ 2932.595264][T24182] ? fault_create_debugfs_attr+0x180/0x180 [ 2932.595286][T24182] ? ___might_sleep+0x163/0x280 [ 2932.595305][T24182] __should_failslab+0x121/0x190 [ 2932.595323][T24182] should_failslab+0x9/0x14 [ 2932.595335][T24182] __kmalloc+0x2e0/0x770 [ 2932.595351][T24182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2932.595366][T24182] ? d_absolute_path+0x11b/0x170 [ 2932.595378][T24182] ? __d_path+0x140/0x140 [ 2932.595391][T24182] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2932.595407][T24182] tomoyo_encode2.part.0+0xf5/0x400 [ 2932.595422][T24182] tomoyo_encode+0x2b/0x50 [ 2932.595435][T24182] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2932.595459][T24182] tomoyo_mount_acl+0x149/0x840 [ 2932.618321][T24182] ? __kasan_check_read+0x11/0x20 [ 2932.618344][T24182] ? __kasan_check_write+0x14/0x20 [ 2932.683046][T24182] ? lock_downgrade+0x920/0x920 [ 2932.687941][T24182] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2932.693512][T24182] ? debug_check_no_obj_freed+0xc0/0x43f [ 2932.699164][T24182] ? trace_hardirqs_off+0x62/0x240 [ 2932.704665][T24182] ? lock_acquire+0x190/0x410 [ 2932.709364][T24182] ? tomoyo_mount_permission+0x10a/0x410 [ 2932.715018][T24182] tomoyo_mount_permission+0x16a/0x410 [ 2932.720507][T24182] ? tomoyo_mount_permission+0x10a/0x410 [ 2932.726142][T24182] ? tomoyo_mount_acl+0x840/0x840 [ 2932.731175][T24182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2932.737452][T24182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2932.743692][T24182] ? strncpy_from_user+0x2b4/0x400 [ 2932.748792][T24182] tomoyo_sb_mount+0x35/0x40 [ 2932.753370][T24182] security_sb_mount+0x87/0xd0 [ 2932.758141][T24182] do_mount+0x1d4/0x1c30 [ 2932.762383][T24182] ? kasan_kmalloc+0x9/0x10 [ 2932.766893][T24182] ? copy_mount_string+0x40/0x40 [ 2932.771820][T24182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2932.778163][T24182] ? copy_mount_options+0x2e8/0x3f0 [ 2932.783559][T24182] ksys_mount+0xdb/0x150 [ 2932.787794][T24182] __x64_sys_mount+0xbe/0x150 [ 2932.792472][T24182] do_syscall_64+0xfd/0x6a0 [ 2932.796980][T24182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2932.802958][T24182] RIP: 0033:0x45c27a [ 2932.806864][T24182] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2932.826458][T24182] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2932.834861][T24182] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2932.842854][T24182] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2932.850816][T24182] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 15:05:25 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:25 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004000) 15:05:25 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40400, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000100)={0x100000001}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) ioctl$SIOCNRDECOBS(r1, 0x89e2) [ 2932.858780][T24182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2932.866746][T24182] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2932.876227][T24182] ERROR: Out of memory at tomoyo_realpath_from_path. 15:05:25 executing program 2: dup(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:25 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004001) 15:05:25 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x4d, 0x4}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:25 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004100) [ 2933.164940][T24223] FAULT_INJECTION: forcing a failure. [ 2933.164940][T24223] name failslab, interval 1, probability 0, space 0, times 0 15:05:25 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004101) [ 2933.206145][T24223] CPU: 1 PID: 24223 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2933.214187][T24223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.224365][T24223] Call Trace: [ 2933.227678][T24223] dump_stack+0x172/0x1f0 [ 2933.232206][T24223] should_fail.cold+0xa/0x15 [ 2933.236834][T24223] ? debug_check_no_obj_freed+0xc0/0x43f [ 2933.242483][T24223] ? fault_create_debugfs_attr+0x180/0x180 [ 2933.248306][T24223] ? page_to_nid.part.0+0x20/0x20 [ 2933.253338][T24223] ? ___might_sleep+0x163/0x280 [ 2933.258303][T24223] __should_failslab+0x121/0x190 [ 2933.263255][T24223] should_failslab+0x9/0x14 [ 2933.267773][T24223] kmem_cache_alloc+0x2aa/0x710 [ 2933.272641][T24223] ? __kasan_check_write+0x14/0x20 [ 2933.277764][T24223] getname_kernel+0x53/0x370 [ 2933.282362][T24223] kern_path+0x20/0x40 [ 2933.286448][T24223] tomoyo_mount_acl+0x28c/0x840 [ 2933.299425][T24223] ? __kasan_check_read+0x11/0x20 [ 2933.305433][T24223] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2933.310985][T24223] ? debug_check_no_obj_freed+0xc0/0x43f [ 2933.316615][T24223] ? trace_hardirqs_off+0x62/0x240 [ 2933.321738][T24223] ? lock_acquire+0x190/0x410 [ 2933.326420][T24223] ? tomoyo_mount_permission+0x10a/0x410 [ 2933.332097][T24223] tomoyo_mount_permission+0x16a/0x410 [ 2933.337662][T24223] ? tomoyo_mount_permission+0x10a/0x410 [ 2933.343312][T24223] ? tomoyo_mount_acl+0x840/0x840 [ 2933.348370][T24223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2933.354640][T24223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2933.361002][T24223] ? strncpy_from_user+0x2b4/0x400 [ 2933.366156][T24223] tomoyo_sb_mount+0x35/0x40 [ 2933.370845][T24223] security_sb_mount+0x87/0xd0 [ 2933.375623][T24223] do_mount+0x1d4/0x1c30 [ 2933.379899][T24223] ? kasan_kmalloc+0x9/0x10 [ 2933.384568][T24223] ? copy_mount_string+0x40/0x40 [ 2933.389593][T24223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2933.395833][T24223] ? copy_mount_options+0x2e8/0x3f0 [ 2933.401039][T24223] ksys_mount+0xdb/0x150 [ 2933.405897][T24223] __x64_sys_mount+0xbe/0x150 [ 2933.410567][T24223] do_syscall_64+0xfd/0x6a0 [ 2933.415079][T24223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2933.421014][T24223] RIP: 0033:0x45c27a [ 2933.424920][T24223] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2933.444618][T24223] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2933.453054][T24223] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2933.461030][T24223] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2933.468994][T24223] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2933.476950][T24223] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2933.484914][T24223] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:26 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000007fffff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:26 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004200) 15:05:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80400, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f00000001c0)={0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}]}) 15:05:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:26 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2933.853920][T24249] FAULT_INJECTION: forcing a failure. [ 2933.853920][T24249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2933.867267][T24249] CPU: 0 PID: 24249 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2933.875458][T24249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.885530][T24249] Call Trace: [ 2933.888942][T24249] dump_stack+0x172/0x1f0 [ 2933.893316][T24249] should_fail.cold+0xa/0x15 [ 2933.897941][T24249] ? fault_create_debugfs_attr+0x180/0x180 [ 2933.903772][T24249] ? tomoyo_mount_acl+0x149/0x840 [ 2933.908827][T24249] ? tomoyo_mount_permission+0x16a/0x410 [ 2933.914484][T24249] ? tomoyo_sb_mount+0x35/0x40 [ 2933.919272][T24249] ? security_sb_mount+0x87/0xd0 [ 2933.924406][T24249] ? do_mount+0x1d4/0x1c30 [ 2933.928850][T24249] ? ksys_mount+0xdb/0x150 [ 2933.933297][T24249] ? __x64_sys_mount+0xbe/0x150 [ 2933.938166][T24249] ? do_syscall_64+0xfd/0x6a0 [ 2933.943070][T24249] should_fail_alloc_page+0x50/0x60 [ 2933.948294][T24249] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2933.953728][T24249] ? __kasan_check_read+0x11/0x20 [ 2933.958762][T24249] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2933.964516][T24249] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2933.970323][T24249] ? __kasan_check_read+0x11/0x20 [ 2933.975378][T24249] ? fault_create_debugfs_attr+0x180/0x180 [ 2933.981188][T24249] cache_grow_begin+0x90/0xd20 [ 2933.985962][T24249] ? getname_kernel+0x53/0x370 [ 2933.990819][T24249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2933.997060][T24249] kmem_cache_alloc+0x64e/0x710 [ 2934.001968][T24249] getname_kernel+0x53/0x370 [ 2934.006739][T24249] kern_path+0x20/0x40 [ 2934.010810][T24249] tomoyo_mount_acl+0x28c/0x840 [ 2934.015666][T24249] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2934.020870][T24249] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2934.026412][T24249] ? __schedule+0x75d/0x1580 [ 2934.031022][T24249] ? retint_kernel+0x2b/0x2b [ 2934.035629][T24249] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2934.041270][T24249] ? lock_acquire+0x190/0x410 [ 2934.045948][T24249] ? tomoyo_mount_permission+0x10a/0x410 [ 2934.051803][T24249] tomoyo_mount_permission+0x16a/0x410 [ 2934.057292][T24249] ? tomoyo_mount_permission+0x10a/0x410 [ 2934.062926][T24249] ? tomoyo_mount_acl+0x840/0x840 [ 2934.067957][T24249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2934.074221][T24249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2934.080489][T24249] ? strncpy_from_user+0x2b4/0x400 [ 2934.085699][T24249] tomoyo_sb_mount+0x35/0x40 [ 2934.090520][T24249] security_sb_mount+0x87/0xd0 [ 2934.095311][T24249] do_mount+0x1d4/0x1c30 [ 2934.099567][T24249] ? kasan_kmalloc+0x9/0x10 [ 2934.104340][T24249] ? copy_mount_string+0x40/0x40 [ 2934.109285][T24249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2934.115653][T24249] ? copy_mount_options+0x2e8/0x3f0 [ 2934.121045][T24249] ksys_mount+0xdb/0x150 [ 2934.125489][T24249] __x64_sys_mount+0xbe/0x150 [ 2934.130483][T24249] do_syscall_64+0xfd/0x6a0 [ 2934.135350][T24249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2934.141257][T24249] RIP: 0033:0x45c27a [ 2934.145366][T24249] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2934.165333][T24249] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2934.173747][T24249] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2934.181800][T24249] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2934.189978][T24249] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 15:05:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:26 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004201) [ 2934.198494][T24249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2934.206647][T24249] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="021020008af900000012e8e93902000008dd6d54b19d854610ff20360500e200000000000000006f85b892c25554cdfe8c71a556ebc641be730dfb3bc360"], 0x10}}, 0x0) getgid() r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x9, 0x6}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 15:05:26 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004300) 15:05:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:26 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2934.521898][T24287] FAULT_INJECTION: forcing a failure. [ 2934.521898][T24287] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2934.535226][T24287] CPU: 0 PID: 24287 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2934.543212][T24287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2934.553281][T24287] Call Trace: [ 2934.556633][T24287] dump_stack+0x172/0x1f0 [ 2934.560990][T24287] should_fail.cold+0xa/0x15 [ 2934.565615][T24287] ? fault_create_debugfs_attr+0x180/0x180 [ 2934.571446][T24287] ? tomoyo_mount_acl+0x149/0x840 [ 2934.576490][T24287] ? tomoyo_mount_permission+0x16a/0x410 [ 2934.582229][T24287] ? tomoyo_sb_mount+0x35/0x40 [ 2934.587012][T24287] ? security_sb_mount+0x87/0xd0 [ 2934.592169][T24287] ? do_mount+0x1d4/0x1c30 [ 2934.596592][T24287] ? ksys_mount+0xdb/0x150 [ 2934.596614][T24287] ? __x64_sys_mount+0xbe/0x150 [ 2934.596638][T24287] ? do_syscall_64+0xfd/0x6a0 [ 2934.605893][T24287] should_fail_alloc_page+0x50/0x60 [ 2934.605909][T24287] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2934.605921][T24287] ? __kasan_check_read+0x11/0x20 [ 2934.605936][T24287] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2934.605949][T24287] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2934.605961][T24287] ? __kasan_check_read+0x11/0x20 [ 2934.605981][T24287] ? fault_create_debugfs_attr+0x180/0x180 [ 2934.605996][T24287] cache_grow_begin+0x90/0xd20 [ 2934.606020][T24287] ? getname_kernel+0x53/0x370 [ 2934.658131][T24287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2934.664387][T24287] kmem_cache_alloc+0x64e/0x710 [ 2934.669266][T24287] getname_kernel+0x53/0x370 [ 2934.673874][T24287] kern_path+0x20/0x40 [ 2934.677962][T24287] tomoyo_mount_acl+0x28c/0x840 [ 2934.682828][T24287] ? __kasan_check_read+0x11/0x20 [ 2934.688055][T24287] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2934.693633][T24287] ? debug_check_no_obj_freed+0xc0/0x43f [ 2934.699310][T24287] ? trace_hardirqs_off+0x62/0x240 [ 2934.704459][T24287] ? lock_acquire+0x190/0x410 [ 2934.709161][T24287] ? tomoyo_mount_permission+0x10a/0x410 [ 2934.714817][T24287] tomoyo_mount_permission+0x16a/0x410 [ 2934.720299][T24287] ? tomoyo_mount_permission+0x10a/0x410 [ 2934.725953][T24287] ? tomoyo_mount_acl+0x840/0x840 [ 2934.730999][T24287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2934.737283][T24287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2934.743545][T24287] ? strncpy_from_user+0x2b4/0x400 [ 2934.748702][T24287] tomoyo_sb_mount+0x35/0x40 [ 2934.753685][T24287] security_sb_mount+0x87/0xd0 [ 2934.758476][T24287] do_mount+0x1d4/0x1c30 [ 2934.762743][T24287] ? kasan_kmalloc+0x9/0x10 [ 2934.767272][T24287] ? copy_mount_string+0x40/0x40 15:05:27 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:27 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004301) 15:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000100)={0x21, 0x3, 0x0, {0x1}}, 0x21) 15:05:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2934.772241][T24287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2934.778523][T24287] ? copy_mount_options+0x2e8/0x3f0 [ 2934.783746][T24287] ksys_mount+0xdb/0x150 [ 2934.788012][T24287] __x64_sys_mount+0xbe/0x150 [ 2934.792720][T24287] do_syscall_64+0xfd/0x6a0 [ 2934.797251][T24287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2934.803153][T24287] RIP: 0033:0x45c27a [ 2934.803168][T24287] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2934.803175][T24287] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2934.803188][T24287] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2934.803196][T24287] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2934.803203][T24287] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2934.803210][T24287] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 15:05:27 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004400) [ 2934.803217][T24287] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:27 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004401) 15:05:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000100)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:27 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2935.201560][T24322] FAULT_INJECTION: forcing a failure. [ 2935.201560][T24322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2935.214817][T24322] CPU: 1 PID: 24322 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2935.222815][T24322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.232886][T24322] Call Trace: [ 2935.236197][T24322] dump_stack+0x172/0x1f0 [ 2935.240552][T24322] should_fail.cold+0xa/0x15 [ 2935.245155][T24322] ? fault_create_debugfs_attr+0x180/0x180 [ 2935.250999][T24322] ? quarantine_put+0x11c/0x1c0 [ 2935.255866][T24322] should_fail_alloc_page+0x50/0x60 [ 2935.261064][T24322] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2935.266451][T24322] ? putname+0xef/0x130 [ 2935.270613][T24322] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2935.276340][T24322] ? filename_lookup+0x294/0x410 [ 2935.276358][T24322] ? fault_create_debugfs_attr+0x180/0x180 [ 2935.276372][T24322] ? nd_jump_link+0x1d0/0x1d0 [ 2935.276392][T24322] cache_grow_begin+0x90/0xd20 15:05:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) [ 2935.287133][T24322] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2935.287152][T24322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2935.287172][T24322] __kmalloc+0x6b2/0x770 [ 2935.317635][T24322] ? kmem_cache_alloc+0x314/0x710 [ 2935.322675][T24322] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2935.328413][T24322] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2935.333989][T24322] tomoyo_mount_acl+0x2cc/0x840 [ 2935.339041][T24322] ? __kasan_check_read+0x11/0x20 [ 2935.344092][T24322] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2935.349672][T24322] ? debug_check_no_obj_freed+0xc0/0x43f [ 2935.355323][T24322] ? trace_hardirqs_off+0x62/0x240 [ 2935.360463][T24322] ? lock_acquire+0x190/0x410 [ 2935.365152][T24322] ? tomoyo_mount_permission+0x10a/0x410 [ 2935.370801][T24322] tomoyo_mount_permission+0x16a/0x410 [ 2935.376281][T24322] ? tomoyo_mount_permission+0x10a/0x410 [ 2935.382019][T24322] ? tomoyo_mount_acl+0x840/0x840 [ 2935.387082][T24322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2935.393346][T24322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2935.399596][T24322] ? strncpy_from_user+0x2b4/0x400 [ 2935.406211][T24322] tomoyo_sb_mount+0x35/0x40 [ 2935.410916][T24322] security_sb_mount+0x87/0xd0 [ 2935.415701][T24322] do_mount+0x1d4/0x1c30 [ 2935.419963][T24322] ? kasan_kmalloc+0x9/0x10 [ 2935.424473][T24322] ? copy_mount_string+0x40/0x40 [ 2935.429509][T24322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2935.435932][T24322] ? copy_mount_options+0x2e8/0x3f0 [ 2935.441147][T24322] ksys_mount+0xdb/0x150 [ 2935.445584][T24322] __x64_sys_mount+0xbe/0x150 [ 2935.450276][T24322] do_syscall_64+0xfd/0x6a0 [ 2935.454796][T24322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2935.460697][T24322] RIP: 0033:0x45c27a [ 2935.464590][T24322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2935.484188][T24322] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2935.492639][T24322] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2935.500608][T24322] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2935.508571][T24322] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2935.516624][T24322] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2935.533073][T24322] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:28 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:28 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004500) 15:05:28 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="0607fc000200"/16], 0x10}}, 0x0) 15:05:28 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004501) 15:05:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) bind$llc(r1, &(0x7f0000000100)={0x1a, 0x1, 0x6, 0x4, 0x6, 0xff}, 0x10) [ 2935.824090][T24363] FAULT_INJECTION: forcing a failure. [ 2935.824090][T24363] name failslab, interval 1, probability 0, space 0, times 0 15:05:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2935.893825][T24363] CPU: 1 PID: 24363 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2935.901851][T24363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.911915][T24363] Call Trace: [ 2935.915315][T24363] dump_stack+0x172/0x1f0 [ 2935.919667][T24363] should_fail.cold+0xa/0x15 [ 2935.924258][T24363] ? __kasan_check_read+0x11/0x20 [ 2935.929295][T24363] ? fault_create_debugfs_attr+0x180/0x180 [ 2935.935123][T24363] ? page_to_nid.part.0+0x20/0x20 [ 2935.940166][T24363] ? ___might_sleep+0x163/0x280 [ 2935.945024][T24363] __should_failslab+0x121/0x190 [ 2935.950067][T24363] should_failslab+0x9/0x14 [ 2935.954582][T24363] kmem_cache_alloc_trace+0x2d3/0x790 [ 2935.960073][T24363] ? lockdep_init_map+0x1be/0x6d0 [ 2935.965127][T24363] legacy_init_fs_context+0x48/0xe0 [ 2935.970337][T24363] ? generic_parse_monolithic+0x200/0x200 [ 2935.976071][T24363] alloc_fs_context+0x3d1/0x6c0 [ 2935.980936][T24363] fs_context_for_mount+0x25/0x30 [ 2935.985981][T24363] do_mount+0x132d/0x1c30 [ 2935.990317][T24363] ? copy_mount_string+0x40/0x40 [ 2935.995278][T24363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2936.001526][T24363] ? copy_mount_options+0x2e8/0x3f0 [ 2936.007714][T24363] ksys_mount+0xdb/0x150 [ 2936.012768][T24363] __x64_sys_mount+0xbe/0x150 [ 2936.017470][T24363] do_syscall_64+0xfd/0x6a0 [ 2936.021990][T24363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2936.027906][T24363] RIP: 0033:0x45c27a [ 2936.031984][T24363] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2936.051966][T24363] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2936.060390][T24363] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2936.068364][T24363] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2936.076420][T24363] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2936.084400][T24363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2936.092373][T24363] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:28 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004600) 15:05:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:29 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:29 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:29 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004601) 15:05:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "482c9122e06c5e72f5838ae28f5b6ed177511d19"}, 0x15, 0x1) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2936.676664][T24406] FAULT_INJECTION: forcing a failure. [ 2936.676664][T24406] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.699787][T24406] CPU: 1 PID: 24406 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2936.707806][T24406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2936.717960][T24406] Call Trace: [ 2936.721357][T24406] dump_stack+0x172/0x1f0 [ 2936.726062][T24406] should_fail.cold+0xa/0x15 [ 2936.730791][T24406] ? __kasan_check_read+0x11/0x20 [ 2936.735838][T24406] ? fault_create_debugfs_attr+0x180/0x180 [ 2936.741661][T24406] ? page_to_nid.part.0+0x20/0x20 [ 2936.746701][T24406] ? ___might_sleep+0x163/0x280 [ 2936.751562][T24406] __should_failslab+0x121/0x190 [ 2936.756605][T24406] should_failslab+0x9/0x14 [ 2936.761120][T24406] kmem_cache_alloc_trace+0x2d3/0x790 [ 2936.766496][T24406] ? lockdep_init_map+0x1be/0x6d0 [ 2936.766517][T24406] legacy_init_fs_context+0x48/0xe0 15:05:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2936.766532][T24406] ? generic_parse_monolithic+0x200/0x200 [ 2936.766553][T24406] alloc_fs_context+0x3d1/0x6c0 [ 2936.787331][T24406] fs_context_for_mount+0x25/0x30 [ 2936.792367][T24406] do_mount+0x132d/0x1c30 [ 2936.796719][T24406] ? copy_mount_string+0x40/0x40 [ 2936.801682][T24406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2936.807941][T24406] ? copy_mount_options+0x2e8/0x3f0 [ 2936.813155][T24406] ksys_mount+0xdb/0x150 [ 2936.817506][T24406] __x64_sys_mount+0xbe/0x150 [ 2936.822210][T24406] do_syscall_64+0xfd/0x6a0 [ 2936.826726][T24406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2936.832725][T24406] RIP: 0033:0x45c27a [ 2936.836639][T24406] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2936.858622][T24406] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2936.867040][T24406] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a 15:05:29 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004700) 15:05:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) [ 2936.875099][T24406] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2936.883087][T24406] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2936.891175][T24406] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2936.899147][T24406] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:29 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004701) 15:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x401, 0x5, 0x8000}, 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:29 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) 15:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000100)={0x6, 0x6, 0x7, 0x8, 0x1, 0x9}) 15:05:29 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004800) 15:05:29 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2937.568991][T24458] FAULT_INJECTION: forcing a failure. [ 2937.568991][T24458] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.589810][T24458] CPU: 0 PID: 24458 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2937.597997][T24458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2937.608380][T24458] Call Trace: [ 2937.611694][T24458] dump_stack+0x172/0x1f0 [ 2937.616079][T24458] should_fail.cold+0xa/0x15 [ 2937.620694][T24458] ? __kasan_check_read+0x11/0x20 [ 2937.625779][T24458] ? fault_create_debugfs_attr+0x180/0x180 [ 2937.631627][T24458] ? page_to_nid.part.0+0x20/0x20 [ 2937.636678][T24458] ? ___might_sleep+0x163/0x280 [ 2937.641551][T24458] __should_failslab+0x121/0x190 [ 2937.646774][T24458] should_failslab+0x9/0x14 [ 2937.651286][T24458] kmem_cache_alloc_trace+0x2d3/0x790 [ 2937.656682][T24458] ? lockdep_init_map+0x1be/0x6d0 [ 2937.661850][T24458] legacy_init_fs_context+0x48/0xe0 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004801) 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004900) 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004901) [ 2937.661873][T24458] ? generic_parse_monolithic+0x200/0x200 [ 2937.672784][T24458] alloc_fs_context+0x3d1/0x6c0 [ 2937.677683][T24458] fs_context_for_mount+0x25/0x30 [ 2937.682727][T24458] vfs_kern_mount.part.0+0x28/0xf0 [ 2937.687870][T24458] vfs_kern_mount+0x40/0x60 [ 2937.692666][T24458] btrfs_mount+0x2b4/0x15e2 [ 2937.697187][T24458] ? __kasan_check_read+0x11/0x20 [ 2937.702245][T24458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2937.708506][T24458] ? should_fail+0x1de/0x852 [ 2937.713131][T24458] ? fault_create_debugfs_attr+0x180/0x180 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004a00) [ 2937.718964][T24458] ? btrfs_remount+0x10f0/0x10f0 [ 2937.723927][T24458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2937.730186][T24458] ? refcount_sub_and_test_checked+0x154/0x200 [ 2937.736369][T24458] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2937.741774][T24458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2937.748123][T24458] ? legacy_parse_param+0x116/0x880 [ 2937.753342][T24458] ? __lookup_constant+0xd6/0x100 [ 2937.758417][T24458] ? refcount_dec_and_test_checked+0x1b/0x20 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004a01) [ 2937.764447][T24458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2937.770717][T24458] ? apparmor_capable+0x2ed/0x630 [ 2937.775761][T24458] ? cap_capable+0x205/0x270 [ 2937.780548][T24458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2937.786904][T24458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2937.793178][T24458] ? btrfs_remount+0x10f0/0x10f0 [ 2937.798228][T24458] legacy_get_tree+0x108/0x220 [ 2937.803020][T24458] ? legacy_get_tree+0x108/0x220 [ 2937.808082][T24458] vfs_get_tree+0x8e/0x390 [ 2937.812617][T24458] do_mount+0x13b3/0x1c30 [ 2937.817056][T24458] ? copy_mount_string+0x40/0x40 [ 2937.822007][T24458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2937.828287][T24458] ? copy_mount_options+0x2e8/0x3f0 [ 2937.833497][T24458] ksys_mount+0xdb/0x150 [ 2937.837750][T24458] __x64_sys_mount+0xbe/0x150 [ 2937.842639][T24458] do_syscall_64+0xfd/0x6a0 [ 2937.847163][T24458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2937.853075][T24458] RIP: 0033:0x45c27a 15:05:30 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004b00) [ 2937.857070][T24458] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2937.876882][T24458] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2937.885355][T24458] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2937.893338][T24458] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2937.893345][T24458] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2937.893352][T24458] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2937.893359][T24458] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:30 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, 0x0, 0x0) 15:05:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:30 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0xe040) r1 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x2, 0x6, 0x2, 0x6, '\x00', 0x7}, 0x6, 0x0, 0x5, r1, 0xa, 0x7fffffff, 'syz0\x00', &(0x7f0000000100)=['..]\x00', 'cgroup\x00', 'keyringuserwlan0eth1\x00', '\x00', 'vboxnet1vboxnet0wlan1mime_type^\x00', 'eth0em1(em1md5sumprocnodev$systemGPLposix_acl_accesscpuset+\x00', 'keyring\a\x00', '\x00', '\x00', '/\x00'], 0x8a, [], [0x6, 0x1, 0x81, 0xff]}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2938.101841][T24496] FAULT_INJECTION: forcing a failure. [ 2938.101841][T24496] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.114473][T24496] CPU: 0 PID: 24496 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2938.122475][T24496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.132732][T24496] Call Trace: [ 2938.136041][T24496] dump_stack+0x172/0x1f0 [ 2938.140379][T24496] should_fail.cold+0xa/0x15 [ 2938.144975][T24496] ? fault_create_debugfs_attr+0x180/0x180 [ 2938.150783][T24496] ? mark_held_locks+0xf0/0xf0 [ 2938.155646][T24496] __should_failslab+0x121/0x190 [ 2938.160590][T24496] should_failslab+0x9/0x14 [ 2938.165098][T24496] kmem_cache_alloc+0x47/0x710 [ 2938.169867][T24496] ? trace_hardirqs_on+0x67/0x240 [ 2938.174910][T24496] xas_alloc+0x346/0x460 [ 2938.179164][T24496] xas_create+0x2cd/0x1060 [ 2938.183690][T24496] ? mark_held_locks+0xf0/0xf0 [ 2938.188495][T24496] xas_store+0x9a/0x1a00 [ 2938.192770][T24496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2938.199048][T24496] ? xas_start+0x166/0x560 [ 2938.203504][T24496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2938.209997][T24496] ? xas_load+0x67/0x150 [ 2938.214378][T24496] __add_to_page_cache_locked+0x5d8/0xec0 [ 2938.220140][T24496] ? __kasan_check_read+0x11/0x20 [ 2938.225217][T24496] ? __page_cache_alloc+0x480/0x480 [ 2938.230443][T24496] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2938.236026][T24496] ? count_shadow_nodes+0x830/0x830 [ 2938.241269][T24496] add_to_page_cache_lru+0x1d8/0x790 [ 2938.246577][T24496] ? add_to_page_cache_locked+0x40/0x40 [ 2938.252236][T24496] ? __page_cache_alloc+0x116/0x480 [ 2938.257452][T24496] do_read_cache_page+0x499/0xb90 [ 2938.262520][T24496] read_cache_page_gfp+0x28/0x30 [ 2938.267485][T24496] btrfs_scan_one_device+0x19b/0x710 [ 2938.272787][T24496] ? device_list_add+0x14f0/0x14f0 [ 2938.277908][T24496] ? trace_hardirqs_off+0x210/0x240 [ 2938.283302][T24496] ? btrfs_mount_root+0xb2f/0x1290 [ 2938.288437][T24496] btrfs_mount_root+0x711/0x1290 [ 2938.293871][T24496] ? btrfs_decode_error+0x70/0x70 [ 2938.298942][T24496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2938.305293][T24496] ? legacy_parse_param+0x116/0x880 [ 2938.310510][T24496] ? __lookup_constant+0xd6/0x100 [ 2938.315549][T24496] ? security_fs_context_parse_param+0x81/0xb0 [ 2938.321904][T24496] ? logfc+0x700/0x700 [ 2938.325994][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.332254][T24496] ? vfs_parse_fs_param+0xcd/0x540 [ 2938.337376][T24496] ? kfree+0x1fd/0x2c0 [ 2938.341464][T24496] ? vfs_parse_fs_string+0x116/0x170 [ 2938.346766][T24496] ? vfs_parse_fs_param+0x540/0x540 [ 2938.351983][T24496] ? btrfs_decode_error+0x70/0x70 [ 2938.357201][T24496] legacy_get_tree+0x108/0x220 [ 2938.361979][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.368233][T24496] vfs_get_tree+0x8e/0x390 [ 2938.372676][T24496] fc_mount+0x17/0xc0 [ 2938.376679][T24496] vfs_kern_mount.part.0+0xd8/0xf0 [ 2938.381813][T24496] vfs_kern_mount+0x40/0x60 [ 2938.386344][T24496] btrfs_mount+0x2b4/0x15e2 [ 2938.390866][T24496] ? __kasan_check_read+0x11/0x20 [ 2938.395908][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.402255][T24496] ? should_fail+0x1de/0x852 [ 2938.406982][T24496] ? fault_create_debugfs_attr+0x180/0x180 [ 2938.412926][T24496] ? btrfs_remount+0x10f0/0x10f0 [ 2938.417913][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.424175][T24496] ? refcount_sub_and_test_checked+0x154/0x200 [ 2938.430352][T24496] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2938.435758][T24496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2938.442026][T24496] ? legacy_parse_param+0x116/0x880 [ 2938.447334][T24496] ? __lookup_constant+0xd6/0x100 [ 2938.452404][T24496] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2938.458419][T24496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2938.464686][T24496] ? apparmor_capable+0x2ed/0x630 [ 2938.469816][T24496] ? cap_capable+0x205/0x270 [ 2938.474517][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.480786][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.487060][T24496] ? btrfs_remount+0x10f0/0x10f0 [ 2938.492027][T24496] legacy_get_tree+0x108/0x220 [ 2938.496832][T24496] ? legacy_get_tree+0x108/0x220 [ 2938.501812][T24496] vfs_get_tree+0x8e/0x390 [ 2938.506256][T24496] do_mount+0x13b3/0x1c30 [ 2938.510628][T24496] ? copy_mount_string+0x40/0x40 [ 2938.515859][T24496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2938.522218][T24496] ? copy_mount_options+0x2e8/0x3f0 [ 2938.527533][T24496] ksys_mount+0xdb/0x150 [ 2938.531802][T24496] __x64_sys_mount+0xbe/0x150 [ 2938.536514][T24496] do_syscall_64+0xfd/0x6a0 [ 2938.541047][T24496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2938.546952][T24496] RIP: 0033:0x45c27a [ 2938.550857][T24496] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2938.570470][T24496] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2938.578926][T24496] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2938.586919][T24496] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2938.595078][T24496] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2938.603072][T24496] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2938.611058][T24496] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:31 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004b01) 15:05:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="00000000000000000000000000000100"}, 0x1c) 15:05:31 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x204100, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:31 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:31 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004c00) 15:05:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getrandom(&(0x7f00000001c0)=""/247, 0xf7, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02180000020000000000000000000000d225d03fb20c59924d58feee7aa3861adc3e1d4f50a7c057d30647617ce3cfcf8b5e9233efeee379778e02690c7ca9fb7484b553a931d1f81ab8cd5f24cc618cd2faeca2a545ea54f2c9ed833eb618b05f718c3c7bb6c62f64e6b60f877289aff635594510b7e00451c10aed0eb5020c92cd7bb5d86194daa13825a9196de46d4ebd0401db80506839c7cbefb82b28474d93a452f30a2d6805fbb185cb9fcc65524954f1f2f07bf37ccce82116cb84be1922f241246a169ff43f041cc2f7e3f03e3042d2c0295ecd0667aed202883b2ebb2fbd826ff74274670a4233532121"], 0x10}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) 15:05:31 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004c01) [ 2938.925980][T24532] FAULT_INJECTION: forcing a failure. [ 2938.925980][T24532] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.976355][T24532] CPU: 1 PID: 24532 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2938.984378][T24532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.994447][T24532] Call Trace: [ 2938.994484][T24532] dump_stack+0x172/0x1f0 [ 2938.994505][T24532] should_fail.cold+0xa/0x15 [ 2938.994522][T24532] ? fault_create_debugfs_attr+0x180/0x180 [ 2938.994543][T24532] ? page_to_nid.part.0+0x20/0x20 [ 2938.994563][T24532] ? ___might_sleep+0x163/0x280 [ 2938.994588][T24532] __should_failslab+0x121/0x190 [ 2939.027675][T24532] should_failslab+0x9/0x14 [ 2939.032205][T24532] kmem_cache_alloc_node_trace+0x274/0x750 [ 2939.038033][T24532] ? vfs_get_tree+0x8e/0x390 [ 2939.042645][T24532] ? do_mount+0x13b3/0x1c30 [ 2939.047204][T24532] ? ksys_mount+0xdb/0x150 [ 2939.051685][T24532] ? __x64_sys_mount+0xbe/0x150 [ 2939.056565][T24532] ? do_syscall_64+0xfd/0x6a0 [ 2939.061264][T24532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.067354][T24532] ? ksys_mount+0xdb/0x150 [ 2939.071850][T24532] __kmalloc_node+0x3d/0x70 [ 2939.076383][T24532] kvmalloc_node+0xbd/0x100 [ 2939.080918][T24532] btrfs_mount_root+0x12b/0x1290 [ 2939.087114][T24532] ? btrfs_decode_error+0x70/0x70 [ 2939.092193][T24532] ? logfc+0x700/0x700 [ 2939.096276][T24532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.102637][T24532] ? legacy_parse_param+0x116/0x880 [ 2939.108218][T24532] ? __lookup_constant+0xd6/0x100 [ 2939.113296][T24532] ? security_fs_context_parse_param+0x81/0xb0 [ 2939.119554][T24532] ? logfc+0x700/0x700 15:05:31 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004d00) 15:05:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2939.123732][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.123748][T24532] ? vfs_parse_fs_param+0xcd/0x540 [ 2939.123760][T24532] ? kfree+0x1fd/0x2c0 [ 2939.123773][T24532] ? vfs_parse_fs_string+0x116/0x170 [ 2939.123786][T24532] ? vfs_parse_fs_param+0x540/0x540 [ 2939.123803][T24532] ? btrfs_decode_error+0x70/0x70 [ 2939.123814][T24532] legacy_get_tree+0x108/0x220 [ 2939.123827][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.123842][T24532] vfs_get_tree+0x8e/0x390 [ 2939.123856][T24532] fc_mount+0x17/0xc0 15:05:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2939.123870][T24532] vfs_kern_mount.part.0+0xd8/0xf0 [ 2939.123885][T24532] vfs_kern_mount+0x40/0x60 [ 2939.123906][T24532] btrfs_mount+0x2b4/0x15e2 [ 2939.189089][T24532] ? __kasan_check_read+0x11/0x20 [ 2939.194417][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.200808][T24532] ? should_fail+0x1de/0x852 [ 2939.205446][T24532] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.211306][T24532] ? btrfs_remount+0x10f0/0x10f0 [ 2939.216270][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.222995][T24532] ? refcount_sub_and_test_checked+0x154/0x200 [ 2939.229204][T24532] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2939.234603][T24532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.240860][T24532] ? legacy_parse_param+0x116/0x880 [ 2939.246074][T24532] ? __lookup_constant+0xd6/0x100 [ 2939.251207][T24532] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2939.260400][T24532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.266682][T24532] ? apparmor_capable+0x2ed/0x630 [ 2939.266695][T24532] ? cap_capable+0x205/0x270 [ 2939.266711][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.266724][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.266740][T24532] ? btrfs_remount+0x10f0/0x10f0 [ 2939.266757][T24532] legacy_get_tree+0x108/0x220 [ 2939.266770][T24532] ? legacy_get_tree+0x108/0x220 [ 2939.266786][T24532] vfs_get_tree+0x8e/0x390 [ 2939.266801][T24532] do_mount+0x13b3/0x1c30 [ 2939.266823][T24532] ? copy_mount_string+0x40/0x40 [ 2939.318697][T24532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.324957][T24532] ? _copy_from_user+0x12c/0x1a0 [ 2939.329926][T24532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.336193][T24532] ? copy_mount_options+0x2e8/0x3f0 [ 2939.341436][T24532] ksys_mount+0xdb/0x150 [ 2939.345722][T24532] __x64_sys_mount+0xbe/0x150 [ 2939.350682][T24532] do_syscall_64+0xfd/0x6a0 [ 2939.355203][T24532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.361122][T24532] RIP: 0033:0x45c27a [ 2939.365026][T24532] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2939.384995][T24532] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2939.385011][T24532] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2939.385018][T24532] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2939.385025][T24532] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2939.385031][T24532] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2939.385037][T24532] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:31 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004d01) 15:05:32 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\b\x00'/16], 0x10}}, 0x0) 15:05:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000003c0)={0x2, [0x0, 0x0]}, &(0x7f0000000400)=0x8) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x5, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) sendmsg$can_raw(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r3}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x0, 0x6, 0x0, 0x7}, 0x1, 0x1, 0x0, 0x0, "164e3cb5825725be"}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:32 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004e00) 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004e01) [ 2939.745203][T24580] FAULT_INJECTION: forcing a failure. [ 2939.745203][T24580] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.806023][T24580] CPU: 1 PID: 24580 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2939.814753][T24580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.824825][T24580] Call Trace: [ 2939.828152][T24580] dump_stack+0x172/0x1f0 [ 2939.832590][T24580] should_fail.cold+0xa/0x15 [ 2939.837299][T24580] ? __x64_sys_mount+0xbe/0x150 [ 2939.842179][T24580] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.848084][T24580] ? page_to_nid.part.0+0x20/0x20 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004f00) [ 2939.853140][T24580] ? ___might_sleep+0x163/0x280 [ 2939.858012][T24580] __should_failslab+0x121/0x190 [ 2939.862972][T24580] should_failslab+0x9/0x14 [ 2939.867496][T24580] kmem_cache_alloc_trace+0x2d3/0x790 [ 2939.873101][T24580] ? debug_check_no_obj_freed+0xc0/0x43f [ 2939.879037][T24580] alloc_fs_context+0x5a/0x6c0 [ 2939.883821][T24580] fs_context_for_mount+0x25/0x30 [ 2939.888870][T24580] vfs_kern_mount.part.0+0x28/0xf0 [ 2939.894267][T24580] vfs_kern_mount+0x40/0x60 [ 2939.898880][T24580] btrfs_mount+0x2b4/0x15e2 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000004f01) [ 2939.903582][T24580] ? __kasan_check_read+0x11/0x20 [ 2939.908629][T24580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.914893][T24580] ? should_fail+0x1de/0x852 [ 2939.919756][T24580] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.925579][T24580] ? btrfs_remount+0x10f0/0x10f0 [ 2939.930559][T24580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.936912][T24580] ? refcount_sub_and_test_checked+0x154/0x200 [ 2939.943254][T24580] ? refcount_dec_not_one+0x1f0/0x1f0 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005000) [ 2939.950521][T24580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.957657][T24580] ? legacy_parse_param+0x116/0x880 [ 2939.962990][T24580] ? __lookup_constant+0xd6/0x100 [ 2939.968517][T24580] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2939.974518][T24580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.980779][T24580] ? apparmor_capable+0x2ed/0x630 [ 2939.985849][T24580] ? cap_capable+0x205/0x270 [ 2939.990727][T24580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.996992][T24580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.997010][T24580] ? btrfs_remount+0x10f0/0x10f0 [ 2939.997024][T24580] legacy_get_tree+0x108/0x220 [ 2939.997038][T24580] ? legacy_get_tree+0x108/0x220 [ 2939.997054][T24580] vfs_get_tree+0x8e/0x390 [ 2939.997069][T24580] do_mount+0x13b3/0x1c30 [ 2939.997087][T24580] ? copy_mount_string+0x40/0x40 [ 2939.997103][T24580] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 2939.997128][T24580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.044143][T24580] ? copy_mount_options+0x2e8/0x3f0 [ 2940.049538][T24580] ksys_mount+0xdb/0x150 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005001) [ 2940.053968][T24580] __x64_sys_mount+0xbe/0x150 [ 2940.059113][T24580] do_syscall_64+0xfd/0x6a0 [ 2940.063648][T24580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.069733][T24580] RIP: 0033:0x45c27a [ 2940.073652][T24580] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2940.093532][T24580] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:05:32 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005100) [ 2940.101962][T24580] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2940.109948][T24580] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2940.117941][T24580] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2940.125929][T24580] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2940.134006][T24580] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:33 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) accept(r0, 0x0, &(0x7f0000000040)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000280)=""/236) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:33 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005101) 15:05:33 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000600"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:33 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2940.601623][T24621] FAULT_INJECTION: forcing a failure. [ 2940.601623][T24621] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.614599][T24621] CPU: 1 PID: 24621 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2940.622767][T24621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.632853][T24621] Call Trace: [ 2940.636256][T24621] dump_stack+0x172/0x1f0 [ 2940.640603][T24621] should_fail.cold+0xa/0x15 [ 2940.645238][T24621] ? __kasan_check_read+0x11/0x20 [ 2940.650282][T24621] ? fault_create_debugfs_attr+0x180/0x180 [ 2940.656114][T24621] ? page_to_nid.part.0+0x20/0x20 [ 2940.661164][T24621] ? ___might_sleep+0x163/0x280 [ 2940.666035][T24621] __should_failslab+0x121/0x190 [ 2940.670985][T24621] should_failslab+0x9/0x14 [ 2940.675509][T24621] kmem_cache_alloc_trace+0x2d3/0x790 [ 2940.681010][T24621] ? lockdep_init_map+0x1be/0x6d0 [ 2940.686053][T24621] legacy_init_fs_context+0x48/0xe0 [ 2940.691274][T24621] ? generic_parse_monolithic+0x200/0x200 [ 2940.697003][T24621] alloc_fs_context+0x3d1/0x6c0 [ 2940.701878][T24621] fs_context_for_mount+0x25/0x30 [ 2940.707104][T24621] vfs_kern_mount.part.0+0x28/0xf0 [ 2940.712506][T24621] vfs_kern_mount+0x40/0x60 [ 2940.717055][T24621] btrfs_mount+0x2b4/0x15e2 [ 2940.721577][T24621] ? __kasan_check_read+0x11/0x20 [ 2940.726648][T24621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.732888][T24621] ? should_fail+0x1de/0x852 [ 2940.737474][T24621] ? fault_create_debugfs_attr+0x180/0x180 [ 2940.743273][T24621] ? btrfs_remount+0x10f0/0x10f0 [ 2940.748195][T24621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.754421][T24621] ? refcount_sub_and_test_checked+0x154/0x200 [ 2940.760565][T24621] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2940.765969][T24621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2940.772200][T24621] ? legacy_parse_param+0x116/0x880 [ 2940.777399][T24621] ? __lookup_constant+0xd6/0x100 [ 2940.782532][T24621] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2940.788531][T24621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2940.794773][T24621] ? apparmor_capable+0x2ed/0x630 [ 2940.799779][T24621] ? cap_capable+0x205/0x270 [ 2940.804356][T24621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.810588][T24621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.816834][T24621] ? btrfs_remount+0x10f0/0x10f0 [ 2940.821796][T24621] legacy_get_tree+0x108/0x220 [ 2940.826542][T24621] ? legacy_get_tree+0x108/0x220 [ 2940.831481][T24621] vfs_get_tree+0x8e/0x390 [ 2940.835902][T24621] do_mount+0x13b3/0x1c30 [ 2940.840236][T24621] ? copy_mount_string+0x40/0x40 [ 2940.845161][T24621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.851405][T24621] ? copy_mount_options+0x2e8/0x3f0 [ 2940.856591][T24621] ksys_mount+0xdb/0x150 [ 2940.860821][T24621] __x64_sys_mount+0xbe/0x150 [ 2940.865588][T24621] do_syscall_64+0xfd/0x6a0 [ 2940.870098][T24621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.876002][T24621] RIP: 0033:0x45c27a [ 2940.879882][T24621] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 15:05:33 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005200) 15:05:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2940.899494][T24621] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2940.907899][T24621] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2940.915867][T24621] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2940.923836][T24621] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2940.931807][T24621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2940.939779][T24621] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="02180000020000000000000000000000e208ecb09edca0d01273cb96ef78c784bf790a3c50ff83b4b09907a910fd324e6ee3de10a657d523d640a4527ea104424e8c2108d6f9464895b9730434dc9acc7eb0b4dab2ebaf39101a672f7910adee3638de402d53c2f64d6510b691e59a027c241f500c17bb059108b4e079cdaf44553f41b955b4192391ae94484d1df2c34b7a9bf0a244c6508cfb79f790bebe79a03750729913aac13da20df7c5664af5e310b45c0bb1ce1c30d18a8ec94e463eb89ad3a1bfcd1d06161656fd04da99946ec4c4641c36f73827eeb87692"], 0x10}}, 0x0) 15:05:33 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:33 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005201) 15:05:33 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005300) [ 2941.165679][T24653] FAULT_INJECTION: forcing a failure. [ 2941.165679][T24653] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.208493][T24653] CPU: 1 PID: 24653 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2941.216505][T24653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.226662][T24653] Call Trace: [ 2941.229976][T24653] dump_stack+0x172/0x1f0 [ 2941.234330][T24653] should_fail.cold+0xa/0x15 [ 2941.238937][T24653] ? stack_trace_save+0xac/0xe0 [ 2941.243804][T24653] ? fault_create_debugfs_attr+0x180/0x180 [ 2941.249629][T24653] ? page_to_nid.part.0+0x20/0x20 [ 2941.254673][T24653] ? ___might_sleep+0x163/0x280 [ 2941.259675][T24653] __should_failslab+0x121/0x190 [ 2941.273405][T24653] should_failslab+0x9/0x14 [ 2941.277922][T24653] kmem_cache_alloc+0x2aa/0x710 [ 2941.282792][T24653] ? fc_mount+0x17/0xc0 [ 2941.282805][T24653] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2941.282815][T24653] ? vfs_kern_mount+0x40/0x60 [ 2941.282829][T24653] ? btrfs_mount+0x2b4/0x15e2 [ 2941.282844][T24653] ? legacy_get_tree+0x108/0x220 [ 2941.282859][T24653] ? vfs_get_tree+0x8e/0x390 [ 2941.282881][T24653] ? do_mount+0x13b3/0x1c30 [ 2941.317321][T24653] ? ksys_mount+0xdb/0x150 [ 2941.321738][T24653] getname_kernel+0x53/0x370 [ 2941.326340][T24653] kern_path+0x20/0x40 [ 2941.330404][T24653] lookup_bdev.part.0+0x7b/0x1b0 [ 2941.335333][T24653] ? blkdev_open+0x290/0x290 [ 2941.340114][T24653] ? debug_check_no_obj_freed+0xc0/0x43f [ 2941.345814][T24653] blkdev_get_by_path+0x81/0x130 [ 2941.350763][T24653] btrfs_scan_one_device+0xd3/0x710 [ 2941.355957][T24653] ? device_list_add+0x14f0/0x14f0 [ 2941.361060][T24653] ? trace_hardirqs_off+0x210/0x240 [ 2941.366253][T24653] ? btrfs_mount_root+0xb2f/0x1290 [ 2941.371363][T24653] btrfs_mount_root+0x711/0x1290 [ 2941.376770][T24653] ? btrfs_decode_error+0x70/0x70 [ 2941.381828][T24653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2941.388082][T24653] ? legacy_parse_param+0x116/0x880 [ 2941.393310][T24653] ? __lookup_constant+0xd6/0x100 [ 2941.398352][T24653] ? security_fs_context_parse_param+0x81/0xb0 [ 2941.406052][T24653] ? logfc+0x700/0x700 [ 2941.410145][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.416420][T24653] ? vfs_parse_fs_param+0xcd/0x540 [ 2941.421579][T24653] ? kfree+0x1fd/0x2c0 [ 2941.425672][T24653] ? vfs_parse_fs_string+0x116/0x170 [ 2941.430980][T24653] ? vfs_parse_fs_param+0x540/0x540 [ 2941.436209][T24653] ? btrfs_decode_error+0x70/0x70 [ 2941.441249][T24653] legacy_get_tree+0x108/0x220 [ 2941.446114][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.452351][T24653] vfs_get_tree+0x8e/0x390 [ 2941.456766][T24653] fc_mount+0x17/0xc0 [ 2941.460754][T24653] vfs_kern_mount.part.0+0xd8/0xf0 [ 2941.465871][T24653] vfs_kern_mount+0x40/0x60 [ 2941.470372][T24653] btrfs_mount+0x2b4/0x15e2 [ 2941.474878][T24653] ? __kasan_check_read+0x11/0x20 [ 2941.479943][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.486204][T24653] ? should_fail+0x1de/0x852 [ 2941.490820][T24653] ? fault_create_debugfs_attr+0x180/0x180 [ 2941.496652][T24653] ? btrfs_remount+0x10f0/0x10f0 [ 2941.501603][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.508216][T24653] ? refcount_sub_and_test_checked+0x154/0x200 [ 2941.514372][T24653] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2941.519752][T24653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2941.526011][T24653] ? legacy_parse_param+0x116/0x880 [ 2941.531208][T24653] ? __lookup_constant+0xd6/0x100 [ 2941.536246][T24653] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2941.542263][T24653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2941.548847][T24653] ? apparmor_capable+0x2ed/0x630 [ 2941.553976][T24653] ? cap_capable+0x205/0x270 [ 2941.558713][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.564994][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.571600][T24653] ? btrfs_remount+0x10f0/0x10f0 [ 2941.576556][T24653] legacy_get_tree+0x108/0x220 [ 2941.581336][T24653] ? legacy_get_tree+0x108/0x220 [ 2941.586288][T24653] vfs_get_tree+0x8e/0x390 [ 2941.590702][T24653] do_mount+0x13b3/0x1c30 [ 2941.595026][T24653] ? copy_mount_string+0x40/0x40 [ 2941.600026][T24653] ? copy_mount_options+0x270/0x3f0 [ 2941.605226][T24653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.612974][T24653] ? copy_mount_options+0x2e8/0x3f0 [ 2941.618411][T24653] ksys_mount+0xdb/0x150 [ 2941.622669][T24653] __x64_sys_mount+0xbe/0x150 [ 2941.627437][T24653] do_syscall_64+0xfd/0x6a0 [ 2941.631947][T24653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2941.637882][T24653] RIP: 0033:0x45c27a 15:05:34 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:34 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005301) 15:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="02180000020000000000000000000000b08ccf116a32a2c9dc285069080d884e27ba5b9f3be3b22d01f6685d7ca7f1823b8d7a56032d033a4fafffb43210c5753bdc9f8155185f15dcd81298743b0875cdb36e22f89e6c7df82b7b718904495a8683559921c3a715f7bc03de12917fc942e8373bdffd581c2cfcb32a12f3128e6794df04acb9271fd06a3b0bdd60d7a8eeb4b1469ef308b68b28a40fe24cb7260ee9441367318d63a9bd1e3dbcd38dd6f947f8f8864590ef7c9ae1603e6690957a09bdca1326d9b09e267ee640f9573ac013a4cfd9998b86bb470c75287bf9afe2d460e464b6dd00"/247], 0x10}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 15:05:34 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000fff00"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) [ 2941.641786][T24653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2941.661762][T24653] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2941.670164][T24653] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2941.678135][T24653] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2941.686116][T24653] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2941.694096][T24653] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2941.702076][T24653] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:34 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005400) 15:05:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x110) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000100)) 15:05:34 executing program 2: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:34 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:34 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005401) 15:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getuid() sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2942.101852][T24699] FAULT_INJECTION: forcing a failure. [ 2942.101852][T24699] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.149918][T24699] CPU: 0 PID: 24699 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2942.157944][T24699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.168014][T24699] Call Trace: [ 2942.171371][T24699] dump_stack+0x172/0x1f0 [ 2942.175744][T24699] should_fail.cold+0xa/0x15 [ 2942.181576][T24699] ? fault_create_debugfs_attr+0x180/0x180 [ 2942.187661][T24699] ? page_to_nid.part.0+0x20/0x20 [ 2942.192712][T24699] ? ___might_sleep+0x163/0x280 [ 2942.197674][T24699] __should_failslab+0x121/0x190 [ 2942.202648][T24699] should_failslab+0x9/0x14 [ 2942.207294][T24699] kmem_cache_alloc_node_trace+0x274/0x750 [ 2942.213497][T24699] ? vfs_get_tree+0x8e/0x390 [ 2942.218130][T24699] ? do_mount+0x13b3/0x1c30 [ 2942.222822][T24699] ? ksys_mount+0xdb/0x150 [ 2942.227248][T24699] ? __x64_sys_mount+0xbe/0x150 [ 2942.232122][T24699] ? do_syscall_64+0xfd/0x6a0 [ 2942.236829][T24699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.242950][T24699] ? ksys_mount+0xdb/0x150 [ 2942.247406][T24699] __kmalloc_node+0x3d/0x70 [ 2942.251937][T24699] kvmalloc_node+0xbd/0x100 [ 2942.256571][T24699] btrfs_mount_root+0x12b/0x1290 [ 2942.261530][T24699] ? btrfs_decode_error+0x70/0x70 [ 2942.266569][T24699] ? logfc+0x700/0x700 [ 2942.270752][T24699] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2942.277033][T24699] ? legacy_parse_param+0x116/0x880 [ 2942.277046][T24699] ? __lookup_constant+0xd6/0x100 [ 2942.277062][T24699] ? security_fs_context_parse_param+0x81/0xb0 [ 2942.277074][T24699] ? logfc+0x700/0x700 [ 2942.277090][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.277103][T24699] ? vfs_parse_fs_param+0xcd/0x540 [ 2942.277133][T24699] ? kfree+0x1fd/0x2c0 [ 2942.313002][T24699] ? vfs_parse_fs_string+0x116/0x170 [ 2942.318301][T24699] ? vfs_parse_fs_param+0x540/0x540 [ 2942.323777][T24699] ? btrfs_decode_error+0x70/0x70 [ 2942.328886][T24699] legacy_get_tree+0x108/0x220 [ 2942.333654][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.339893][T24699] vfs_get_tree+0x8e/0x390 [ 2942.344411][T24699] fc_mount+0x17/0xc0 [ 2942.348501][T24699] vfs_kern_mount.part.0+0xd8/0xf0 [ 2942.353604][T24699] vfs_kern_mount+0x40/0x60 [ 2942.358126][T24699] btrfs_mount+0x2b4/0x15e2 [ 2942.362626][T24699] ? __kasan_check_read+0x11/0x20 [ 2942.367662][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.374316][T24699] ? should_fail+0x1de/0x852 [ 2942.378925][T24699] ? fault_create_debugfs_attr+0x180/0x180 [ 2942.384764][T24699] ? btrfs_remount+0x10f0/0x10f0 [ 2942.389725][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.395988][T24699] ? refcount_sub_and_test_checked+0x154/0x200 [ 2942.402146][T24699] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2942.407521][T24699] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2942.413848][T24699] ? legacy_parse_param+0x116/0x880 [ 2942.419147][T24699] ? __lookup_constant+0xd6/0x100 [ 2942.424185][T24699] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2942.430264][T24699] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2942.436505][T24699] ? apparmor_capable+0x2ed/0x630 [ 2942.441525][T24699] ? cap_capable+0x205/0x270 [ 2942.446139][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.453544][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.459941][T24699] ? btrfs_remount+0x10f0/0x10f0 [ 2942.465000][T24699] legacy_get_tree+0x108/0x220 [ 2942.469823][T24699] ? legacy_get_tree+0x108/0x220 [ 2942.474774][T24699] vfs_get_tree+0x8e/0x390 [ 2942.479277][T24699] do_mount+0x13b3/0x1c30 [ 2942.484131][T24699] ? copy_mount_string+0x40/0x40 [ 2942.489078][T24699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.495326][T24699] ? copy_mount_options+0x2e8/0x3f0 [ 2942.500535][T24699] ksys_mount+0xdb/0x150 [ 2942.504778][T24699] __x64_sys_mount+0xbe/0x150 [ 2942.509447][T24699] do_syscall_64+0xfd/0x6a0 [ 2942.513939][T24699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.519842][T24699] RIP: 0033:0x45c27a [ 2942.523736][T24699] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2942.543333][T24699] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2942.551760][T24699] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2942.559749][T24699] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2942.567824][T24699] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2942.576036][T24699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2942.584030][T24699] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:35 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:35 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005500) 15:05:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0xef55, 0x0, 0x2}, 0x10}}, 0xfffffffffffffffc) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x3}}, 0x18) accept$alg(r1, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 15:05:35 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:35 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005501) 15:05:35 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x14, 0x4e, &(0x7f00000001c0)="c36c859c2524caf447c8bc6e85fd7722207f79461a41267f6da7a4f85be71d8b3d7397ecec5b447816766b6a07a05ecb4dcb9e62d61f95be34142db9c8f4577d7e66b31959e822ee2f159c8accf1"}) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="02fbb94a162f981800000200000000e081000000e2003938c79149566a37dbdf87c69733d50acbc857563e98127061ba286b3df0ba79d28c547b"], 0x10}}, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/31) 15:05:35 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8000, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:05:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:35 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005600) [ 2942.880239][T24740] FAULT_INJECTION: forcing a failure. [ 2942.880239][T24740] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.952510][T24740] CPU: 1 PID: 24740 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2942.961603][T24740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.972508][T24740] Call Trace: [ 2942.972544][T24740] dump_stack+0x172/0x1f0 [ 2942.972577][T24740] should_fail.cold+0xa/0x15 [ 2942.972604][T24740] ? fault_create_debugfs_attr+0x180/0x180 [ 2942.990693][T24740] ? page_to_nid.part.0+0x20/0x20 [ 2942.995745][T24740] ? ___might_sleep+0x163/0x280 [ 2943.000633][T24740] __should_failslab+0x121/0x190 [ 2943.005600][T24740] should_failslab+0x9/0x14 [ 2943.010151][T24740] kmem_cache_alloc_trace+0x2d3/0x790 [ 2943.010167][T24740] ? kasan_kmalloc+0x9/0x10 [ 2943.010179][T24740] ? __kmalloc_node+0x4e/0x70 [ 2943.010204][T24740] btrfs_mount_root+0x174/0x1290 [ 2943.030129][T24740] ? btrfs_decode_error+0x70/0x70 [ 2943.035261][T24740] ? logfc+0x700/0x700 [ 2943.039545][T24740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.045805][T24740] ? legacy_parse_param+0x116/0x880 [ 2943.051129][T24740] ? __lookup_constant+0xd6/0x100 [ 2943.056182][T24740] ? security_fs_context_parse_param+0x81/0xb0 [ 2943.062705][T24740] ? logfc+0x700/0x700 [ 2943.066982][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.073261][T24740] ? vfs_parse_fs_param+0xcd/0x540 [ 2943.078400][T24740] ? kfree+0x1fd/0x2c0 [ 2943.082580][T24740] ? vfs_parse_fs_string+0x116/0x170 [ 2943.088069][T24740] ? vfs_parse_fs_param+0x540/0x540 [ 2943.093287][T24740] ? btrfs_decode_error+0x70/0x70 [ 2943.098324][T24740] legacy_get_tree+0x108/0x220 [ 2943.103103][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.109366][T24740] vfs_get_tree+0x8e/0x390 [ 2943.113788][T24740] fc_mount+0x17/0xc0 [ 2943.113803][T24740] vfs_kern_mount.part.0+0xd8/0xf0 [ 2943.113824][T24740] vfs_kern_mount+0x40/0x60 [ 2943.122915][T24740] btrfs_mount+0x2b4/0x15e2 [ 2943.122931][T24740] ? __kasan_check_read+0x11/0x20 [ 2943.122948][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.122964][T24740] ? should_fail+0x1de/0x852 [ 2943.122986][T24740] ? fault_create_debugfs_attr+0x180/0x180 15:05:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:35 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005601) [ 2943.153603][T24740] ? btrfs_remount+0x10f0/0x10f0 [ 2943.158576][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.164935][T24740] ? refcount_sub_and_test_checked+0x154/0x200 [ 2943.171105][T24740] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2943.176507][T24740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.183044][T24740] ? legacy_parse_param+0x116/0x880 [ 2943.188282][T24740] ? __lookup_constant+0xd6/0x100 [ 2943.193322][T24740] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2943.199336][T24740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.205752][T24740] ? apparmor_capable+0x2ed/0x630 [ 2943.210963][T24740] ? cap_capable+0x205/0x270 [ 2943.215577][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.221966][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.228233][T24740] ? btrfs_remount+0x10f0/0x10f0 [ 2943.233194][T24740] legacy_get_tree+0x108/0x220 [ 2943.238006][T24740] ? legacy_get_tree+0x108/0x220 [ 2943.242986][T24740] vfs_get_tree+0x8e/0x390 [ 2943.247439][T24740] do_mount+0x13b3/0x1c30 [ 2943.251808][T24740] ? copy_mount_string+0x40/0x40 [ 2943.256752][T24740] ? copy_mount_options+0x270/0x3f0 [ 2943.262169][T24740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.268424][T24740] ? copy_mount_options+0x2e8/0x3f0 [ 2943.273731][T24740] ksys_mount+0xdb/0x150 [ 2943.278002][T24740] __x64_sys_mount+0xbe/0x150 [ 2943.282713][T24740] do_syscall_64+0xfd/0x6a0 [ 2943.287313][T24740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.294851][T24740] RIP: 0033:0x45c27a [ 2943.298764][T24740] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2943.318375][T24740] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2943.326893][T24740] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2943.334872][T24740] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2943.342852][T24740] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2943.350832][T24740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2943.358809][T24740] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:36 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:36 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 15:05:36 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005700) 15:05:36 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x180) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) [ 2943.656855][T24785] FAULT_INJECTION: forcing a failure. [ 2943.656855][T24785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2943.670278][T24785] CPU: 0 PID: 24785 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2943.678452][T24785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.688700][T24785] Call Trace: [ 2943.692021][T24785] dump_stack+0x172/0x1f0 [ 2943.696378][T24785] should_fail.cold+0xa/0x15 [ 2943.700998][T24785] ? kasan_kmalloc+0x9/0x10 [ 2943.705536][T24785] ? fault_create_debugfs_attr+0x180/0x180 [ 2943.711370][T24785] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2943.716707][T24785] ? vfs_kern_mount+0x40/0x60 [ 2943.721397][T24785] ? btrfs_mount+0x2b4/0x15e2 [ 2943.726112][T24785] ? legacy_get_tree+0x108/0x220 [ 2943.731077][T24785] ? vfs_get_tree+0x8e/0x390 [ 2943.735691][T24785] ? do_mount+0x13b3/0x1c30 [ 2943.740219][T24785] ? ksys_mount+0xdb/0x150 [ 2943.744663][T24785] ? __x64_sys_mount+0xbe/0x150 [ 2943.750589][T24785] should_fail_alloc_page+0x50/0x60 [ 2943.756009][T24785] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2943.763514][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.770471][T24785] ? should_fail+0x1de/0x852 [ 2943.775383][T24785] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2943.775400][T24785] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2943.775413][T24785] ? __kasan_check_read+0x11/0x20 [ 2943.775433][T24785] ? fault_create_debugfs_attr+0x180/0x180 [ 2943.775446][T24785] cache_grow_begin+0x90/0xd20 [ 2943.775469][T24785] ? btrfs_mount_root+0x174/0x1290 [ 2943.775486][T24785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2943.775509][T24785] kmem_cache_alloc_trace+0x6b3/0x790 [ 2943.822207][T24785] ? kasan_kmalloc+0x9/0x10 [ 2943.826736][T24785] btrfs_mount_root+0x174/0x1290 [ 2943.831705][T24785] ? btrfs_decode_error+0x70/0x70 [ 2943.836759][T24785] ? logfc+0x700/0x700 [ 2943.840855][T24785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.847471][T24785] ? legacy_parse_param+0x116/0x880 [ 2943.852713][T24785] ? __lookup_constant+0xd6/0x100 15:05:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:36 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005701) [ 2943.852730][T24785] ? security_fs_context_parse_param+0x81/0xb0 [ 2943.852741][T24785] ? logfc+0x700/0x700 [ 2943.852757][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.852769][T24785] ? vfs_parse_fs_param+0xcd/0x540 [ 2943.852781][T24785] ? kfree+0x1fd/0x2c0 [ 2943.852796][T24785] ? vfs_parse_fs_string+0x116/0x170 [ 2943.852819][T24785] ? vfs_parse_fs_param+0x540/0x540 [ 2943.894841][T24785] ? btrfs_decode_error+0x70/0x70 [ 2943.899999][T24785] legacy_get_tree+0x108/0x220 [ 2943.904783][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.911051][T24785] vfs_get_tree+0x8e/0x390 [ 2943.915483][T24785] fc_mount+0x17/0xc0 [ 2943.919491][T24785] vfs_kern_mount.part.0+0xd8/0xf0 [ 2943.924645][T24785] vfs_kern_mount+0x40/0x60 [ 2943.931175][T24785] btrfs_mount+0x2b4/0x15e2 [ 2943.936264][T24785] ? __kasan_check_read+0x11/0x20 [ 2943.941322][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.948454][T24785] ? should_fail+0x1de/0x852 15:05:36 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005800) [ 2943.953076][T24785] ? fault_create_debugfs_attr+0x180/0x180 [ 2943.958902][T24785] ? btrfs_remount+0x10f0/0x10f0 [ 2943.963874][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.970159][T24785] ? refcount_sub_and_test_checked+0x154/0x200 [ 2943.976348][T24785] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2943.981744][T24785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.988022][T24785] ? legacy_parse_param+0x116/0x880 [ 2943.993249][T24785] ? __lookup_constant+0xd6/0x100 [ 2943.998305][T24785] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2944.004812][T24785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2944.011434][T24785] ? apparmor_capable+0x2ed/0x630 [ 2944.016573][T24785] ? cap_capable+0x205/0x270 [ 2944.021191][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.027455][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.033742][T24785] ? btrfs_remount+0x10f0/0x10f0 [ 2944.038828][T24785] legacy_get_tree+0x108/0x220 [ 2944.043843][T24785] ? legacy_get_tree+0x108/0x220 [ 2944.048834][T24785] vfs_get_tree+0x8e/0x390 [ 2944.053277][T24785] do_mount+0x13b3/0x1c30 15:05:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2944.057648][T24785] ? copy_mount_string+0x40/0x40 [ 2944.062630][T24785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.068900][T24785] ? copy_mount_options+0x2e8/0x3f0 [ 2944.074127][T24785] ksys_mount+0xdb/0x150 [ 2944.078426][T24785] __x64_sys_mount+0xbe/0x150 [ 2944.083128][T24785] do_syscall_64+0xfd/0x6a0 [ 2944.087658][T24785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.093556][T24785] RIP: 0033:0x45c27a [ 2944.093571][T24785] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2944.093577][T24785] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2944.093591][T24785] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2944.093598][T24785] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2944.093606][T24785] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2944.093622][T24785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 15:05:36 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005801) [ 2944.117134][T24785] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:36 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005900) 15:05:37 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x6, 0x3, 0x0, 0x6, 0x80, 0xfffffffffffffffe, 0xd6bc, 0x4, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r2, 0x1}, 0x8) fcntl$getflags(r1, 0x3) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000000)={0x3, r1}) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="0218000902000080b2d700000000000017e26338633085557674b2ed9a03eeb8b8a1aef06d5daafd400cb15e23d65e3eebbede3a83952f9b43a176c860513ef1b4aeda1aaf1fe9438e731d22a34c6e5219d693c2e4b2ef9f80751cb0ea59876b59f68586ffa403f756e7b4cd1efa480f45a5df4bab044bdbd395ae8bd25263e9c765932892a3d253f8063f3a142b8ecdbbc4c52661b26e9f8e33ede69b476a83b5a89558aa6a947d3d0c564c454f4ac7ad669b9d3eabb1c15449ccd2590c45841e48e1a5643160f566566103bff49bdd019c6d475ed26af480227f059692118f18388615a43da184e9eed086929d1668eb88c10e6752f4c0e9146f584bcc321a6ae463c8a200a753afc5a955e49297"], 0x10}}, 0x0) 15:05:37 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000080)=""/40) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(0x0, 0x5, 0x1c140) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1005) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, 0x0) 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005901) 15:05:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:37 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005a00) [ 2944.655928][T24940] FAULT_INJECTION: forcing a failure. [ 2944.655928][T24940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005a01) [ 2944.725979][T24940] CPU: 0 PID: 24940 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2944.734032][T24940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.744097][T24940] Call Trace: [ 2944.747423][T24940] dump_stack+0x172/0x1f0 [ 2944.751780][T24940] should_fail.cold+0xa/0x15 [ 2944.756397][T24940] ? fault_create_debugfs_attr+0x180/0x180 [ 2944.762225][T24940] ? ___might_sleep+0x163/0x280 [ 2944.767103][T24940] should_fail_alloc_page+0x50/0x60 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005b00) [ 2944.772320][T24940] __alloc_pages_nodemask+0x1a1/0x8f0 [ 2944.777711][T24940] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2944.783453][T24940] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2944.789715][T24940] alloc_pages_current+0x107/0x210 [ 2944.794850][T24940] __page_cache_alloc+0x2a2/0x480 [ 2944.799895][T24940] do_read_cache_page+0x476/0xb90 [ 2944.804973][T24940] read_cache_page_gfp+0x28/0x30 [ 2944.810101][T24940] btrfs_scan_one_device+0x19b/0x710 [ 2944.815400][T24940] ? device_list_add+0x14f0/0x14f0 [ 2944.820807][T24940] ? trace_hardirqs_off+0x210/0x240 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005b01) [ 2944.826056][T24940] ? btrfs_mount_root+0xb2f/0x1290 [ 2944.831181][T24940] btrfs_mount_root+0x711/0x1290 [ 2944.836138][T24940] ? btrfs_decode_error+0x70/0x70 [ 2944.841177][T24940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2944.847427][T24940] ? legacy_parse_param+0x116/0x880 [ 2944.852642][T24940] ? __lookup_constant+0xd6/0x100 [ 2944.857685][T24940] ? security_fs_context_parse_param+0x81/0xb0 [ 2944.863945][T24940] ? logfc+0x700/0x700 [ 2944.868037][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005c00) [ 2944.874381][T24940] ? vfs_parse_fs_param+0xcd/0x540 [ 2944.879509][T24940] ? kfree+0x1fd/0x2c0 [ 2944.883626][T24940] ? vfs_parse_fs_string+0x116/0x170 [ 2944.888918][T24940] ? vfs_parse_fs_param+0x540/0x540 [ 2944.894127][T24940] ? btrfs_decode_error+0x70/0x70 [ 2944.899169][T24940] legacy_get_tree+0x108/0x220 [ 2944.903959][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.910215][T24940] vfs_get_tree+0x8e/0x390 [ 2944.914652][T24940] fc_mount+0x17/0xc0 [ 2944.918666][T24940] vfs_kern_mount.part.0+0xd8/0xf0 15:05:37 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005c01) [ 2944.923791][T24940] vfs_kern_mount+0x40/0x60 [ 2944.928439][T24940] btrfs_mount+0x2b4/0x15e2 [ 2944.932954][T24940] ? __kasan_check_read+0x11/0x20 [ 2944.938003][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.944262][T24940] ? should_fail+0x1de/0x852 [ 2944.948899][T24940] ? fault_create_debugfs_attr+0x180/0x180 [ 2944.954748][T24940] ? btrfs_remount+0x10f0/0x10f0 [ 2944.959710][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.965965][T24940] ? refcount_sub_and_test_checked+0x154/0x200 [ 2944.972142][T24940] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2944.978141][T24940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2944.984507][T24940] ? legacy_parse_param+0x116/0x880 [ 2944.989701][T24940] ? __lookup_constant+0xd6/0x100 [ 2944.994724][T24940] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2945.000724][T24940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2945.006963][T24940] ? apparmor_capable+0x2ed/0x630 [ 2945.012008][T24940] ? cap_capable+0x205/0x270 [ 2945.016598][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.022844][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.029220][T24940] ? btrfs_remount+0x10f0/0x10f0 [ 2945.034156][T24940] legacy_get_tree+0x108/0x220 [ 2945.038948][T24940] ? legacy_get_tree+0x108/0x220 [ 2945.043917][T24940] vfs_get_tree+0x8e/0x390 [ 2945.048332][T24940] do_mount+0x13b3/0x1c30 [ 2945.052681][T24940] ? copy_mount_string+0x40/0x40 [ 2945.057788][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.064016][T24940] ? copy_mount_options+0x2e8/0x3f0 [ 2945.069205][T24940] ksys_mount+0xdb/0x150 [ 2945.073457][T24940] __x64_sys_mount+0xbe/0x150 [ 2945.078134][T24940] do_syscall_64+0xfd/0x6a0 [ 2945.082636][T24940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.088523][T24940] RIP: 0033:0x45c27a [ 2945.092409][T24940] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2945.112120][T24940] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2945.120524][T24940] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2945.128497][T24940] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2945.136456][T24940] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2945.144425][T24940] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2945.152427][T24940] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:38 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:38 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005d00) 15:05:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x100, 0x1, {0x2, 0x4, 0x8, 0xfffffffffffffff7}}) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:38 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:38 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 15:05:38 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005d01) [ 2945.613699][T24988] FAULT_INJECTION: forcing a failure. [ 2945.613699][T24988] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.626331][T24988] CPU: 0 PID: 24988 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2945.634439][T24988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.634445][T24988] Call Trace: [ 2945.634475][T24988] dump_stack+0x172/0x1f0 [ 2945.634497][T24988] should_fail.cold+0xa/0x15 [ 2945.634516][T24988] ? fault_create_debugfs_attr+0x180/0x180 [ 2945.634534][T24988] ? percpu_ref_tryget_live+0x290/0x290 [ 2945.634557][T24988] __should_failslab+0x121/0x190 [ 2945.634582][T24988] should_failslab+0x9/0x14 [ 2945.677704][T24988] kmem_cache_alloc+0x47/0x710 [ 2945.682489][T24988] ? refill_stock+0x19c/0x230 [ 2945.687206][T24988] xas_alloc+0x346/0x460 [ 2945.691460][T24988] xas_create+0x2cd/0x1060 [ 2945.695889][T24988] ? mark_held_locks+0xf0/0xf0 [ 2945.700667][T24988] xas_store+0x9a/0x1a00 [ 2945.704917][T24988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2945.711162][T24988] ? xas_start+0x166/0x560 [ 2945.715615][T24988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2945.721871][T24988] ? xas_load+0x67/0x150 [ 2945.726133][T24988] __add_to_page_cache_locked+0x5d8/0xec0 [ 2945.731879][T24988] ? __kasan_check_read+0x11/0x20 [ 2945.736931][T24988] ? __page_cache_alloc+0x480/0x480 [ 2945.742148][T24988] ? __alloc_pages_nodemask+0x576/0x8f0 [ 2945.747804][T24988] ? count_shadow_nodes+0x830/0x830 [ 2945.753052][T24988] add_to_page_cache_lru+0x1d8/0x790 [ 2945.758364][T24988] ? add_to_page_cache_locked+0x40/0x40 [ 2945.763942][T24988] ? __page_cache_alloc+0x116/0x480 [ 2945.769174][T24988] do_read_cache_page+0x499/0xb90 [ 2945.774221][T24988] read_cache_page_gfp+0x28/0x30 [ 2945.779190][T24988] btrfs_scan_one_device+0x19b/0x710 [ 2945.784492][T24988] ? device_list_add+0x14f0/0x14f0 [ 2945.789621][T24988] ? trace_hardirqs_off+0x210/0x240 [ 2945.794917][T24988] ? btrfs_mount_root+0xb2f/0x1290 [ 2945.800047][T24988] btrfs_mount_root+0x711/0x1290 [ 2945.805005][T24988] ? btrfs_decode_error+0x70/0x70 [ 2945.810054][T24988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2945.816319][T24988] ? legacy_parse_param+0x116/0x880 [ 2945.821540][T24988] ? __lookup_constant+0xd6/0x100 [ 2945.826590][T24988] ? security_fs_context_parse_param+0x81/0xb0 [ 2945.832773][T24988] ? logfc+0x700/0x700 [ 2945.836860][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.843121][T24988] ? vfs_parse_fs_param+0xcd/0x540 [ 2945.848436][T24988] ? kfree+0x1fd/0x2c0 [ 2945.852530][T24988] ? vfs_parse_fs_string+0x116/0x170 [ 2945.857919][T24988] ? vfs_parse_fs_param+0x540/0x540 [ 2945.863142][T24988] ? btrfs_decode_error+0x70/0x70 [ 2945.868207][T24988] legacy_get_tree+0x108/0x220 [ 2945.872993][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.879254][T24988] vfs_get_tree+0x8e/0x390 [ 2945.883690][T24988] fc_mount+0x17/0xc0 [ 2945.887720][T24988] vfs_kern_mount.part.0+0xd8/0xf0 [ 2945.892860][T24988] vfs_kern_mount+0x40/0x60 [ 2945.897868][T24988] btrfs_mount+0x2b4/0x15e2 [ 2945.902508][T24988] ? __kasan_check_read+0x11/0x20 [ 2945.907575][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.913961][T24988] ? should_fail+0x1de/0x852 [ 2945.918595][T24988] ? fault_create_debugfs_attr+0x180/0x180 [ 2945.924446][T24988] ? btrfs_remount+0x10f0/0x10f0 [ 2945.929681][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.936137][T24988] ? refcount_sub_and_test_checked+0x154/0x200 [ 2945.942492][T24988] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2945.947900][T24988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2945.954165][T24988] ? legacy_parse_param+0x116/0x880 [ 2945.959474][T24988] ? __lookup_constant+0xd6/0x100 [ 2945.964526][T24988] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2945.970550][T24988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2945.976813][T24988] ? apparmor_capable+0x2ed/0x630 [ 2945.981858][T24988] ? cap_capable+0x205/0x270 [ 2945.986572][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.993285][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.999760][T24988] ? btrfs_remount+0x10f0/0x10f0 [ 2946.004904][T24988] legacy_get_tree+0x108/0x220 [ 2946.009685][T24988] ? legacy_get_tree+0x108/0x220 [ 2946.014735][T24988] vfs_get_tree+0x8e/0x390 [ 2946.019340][T24988] do_mount+0x13b3/0x1c30 [ 2946.023852][T24988] ? copy_mount_string+0x40/0x40 [ 2946.029271][T24988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.035709][T24988] ? copy_mount_options+0x2e8/0x3f0 [ 2946.041106][T24988] ksys_mount+0xdb/0x150 [ 2946.045538][T24988] __x64_sys_mount+0xbe/0x150 [ 2946.050222][T24988] do_syscall_64+0xfd/0x6a0 [ 2946.054818][T24988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.060856][T24988] RIP: 0033:0x45c27a [ 2946.064753][T24988] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2946.084725][T24988] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2946.093331][T24988] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2946.102490][T24988] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2946.110496][T24988] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2946.118741][T24988] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2946.126723][T24988] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:38 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005e00) 15:05:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="021800000000000000004000"], 0x10}}, 0x0) 15:05:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:38 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005e01) 15:05:38 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2946.454855][T25048] FAULT_INJECTION: forcing a failure. [ 2946.454855][T25048] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.468422][T25048] CPU: 1 PID: 25048 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2946.476425][T25048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.486931][T25048] Call Trace: [ 2946.490283][T25048] dump_stack+0x172/0x1f0 [ 2946.494641][T25048] should_fail.cold+0xa/0x15 [ 2946.499262][T25048] ? fault_create_debugfs_attr+0x180/0x180 [ 2946.505188][T25048] ? page_to_nid.part.0+0x20/0x20 [ 2946.510426][T25048] ? ___might_sleep+0x163/0x280 [ 2946.515296][T25048] __should_failslab+0x121/0x190 [ 2946.520370][T25048] should_failslab+0x9/0x14 [ 2946.524900][T25048] __kmalloc_track_caller+0x2dc/0x760 [ 2946.530655][T25048] ? kasan_kmalloc+0x9/0x10 [ 2946.535239][T25048] ? kmem_cache_alloc_trace+0x346/0x790 [ 2946.540800][T25048] ? kasan_kmalloc+0x9/0x10 [ 2946.545497][T25048] ? btrfs_mount_root+0x2b8/0x1290 [ 2946.550632][T25048] kstrdup+0x3a/0x70 [ 2946.554528][T25048] btrfs_mount_root+0x2b8/0x1290 [ 2946.559562][T25048] ? btrfs_decode_error+0x70/0x70 [ 2946.564776][T25048] ? logfc+0x700/0x700 [ 2946.568839][T25048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2946.575246][T25048] ? legacy_parse_param+0x116/0x880 [ 2946.580456][T25048] ? __lookup_constant+0xd6/0x100 [ 2946.585476][T25048] ? security_fs_context_parse_param+0x81/0xb0 [ 2946.593290][T25048] ? logfc+0x700/0x700 [ 2946.597351][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.603587][T25048] ? vfs_parse_fs_param+0xcd/0x540 [ 2946.609166][T25048] ? kfree+0x1fd/0x2c0 [ 2946.613506][T25048] ? vfs_parse_fs_string+0x116/0x170 [ 2946.618822][T25048] ? vfs_parse_fs_param+0x540/0x540 [ 2946.624042][T25048] ? btrfs_decode_error+0x70/0x70 [ 2946.629154][T25048] legacy_get_tree+0x108/0x220 [ 2946.634176][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.640450][T25048] vfs_get_tree+0x8e/0x390 [ 2946.645608][T25048] fc_mount+0x17/0xc0 [ 2946.649600][T25048] vfs_kern_mount.part.0+0xd8/0xf0 [ 2946.654834][T25048] vfs_kern_mount+0x40/0x60 [ 2946.660155][T25048] btrfs_mount+0x2b4/0x15e2 [ 2946.665267][T25048] ? __kasan_check_read+0x11/0x20 [ 2946.670297][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.678166][T25048] ? should_fail+0x1de/0x852 [ 2946.682789][T25048] ? fault_create_debugfs_attr+0x180/0x180 [ 2946.688629][T25048] ? btrfs_remount+0x10f0/0x10f0 [ 2946.693604][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.700605][T25048] ? refcount_sub_and_test_checked+0x154/0x200 [ 2946.706886][T25048] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2946.712258][T25048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2946.719329][T25048] ? legacy_parse_param+0x116/0x880 [ 2946.724526][T25048] ? __lookup_constant+0xd6/0x100 [ 2946.729559][T25048] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2946.735551][T25048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2946.741893][T25048] ? apparmor_capable+0x2ed/0x630 [ 2946.746930][T25048] ? cap_capable+0x205/0x270 [ 2946.751552][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.757809][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.764355][T25048] ? btrfs_remount+0x10f0/0x10f0 [ 2946.769280][T25048] legacy_get_tree+0x108/0x220 [ 2946.774130][T25048] ? legacy_get_tree+0x108/0x220 [ 2946.779080][T25048] vfs_get_tree+0x8e/0x390 [ 2946.783639][T25048] do_mount+0x13b3/0x1c30 [ 2946.788071][T25048] ? copy_mount_string+0x40/0x40 [ 2946.793008][T25048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.799247][T25048] ? copy_mount_options+0x2e8/0x3f0 [ 2946.804620][T25048] ksys_mount+0xdb/0x150 [ 2946.808871][T25048] __x64_sys_mount+0xbe/0x150 [ 2946.813714][T25048] do_syscall_64+0xfd/0x6a0 [ 2946.818214][T25048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.824176][T25048] RIP: 0033:0x45c27a [ 2946.828061][T25048] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2946.847936][T25048] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2946.856451][T25048] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2946.864636][T25048] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2946.872736][T25048] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2946.880705][T25048] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2946.888665][T25048] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:39 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x7, 0x2fe5, 0x0, 0x1, 0x1, 0xe2f0, 0x0, 0x1, 0x5, 0x1, 0x1, 0x8001, 0x7, 0x5af1, 0x5}}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005f00) 15:05:39 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:39 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000005f01) [ 2947.075146][T25144] FAULT_INJECTION: forcing a failure. [ 2947.075146][T25144] name failslab, interval 1, probability 0, space 0, times 0 15:05:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101000, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000001c0)={0xb, @pix_mp={0x8, 0xffffffffffff8001, 0x7f755f4f, 0x7, 0x2, [{0x5, 0x6}, {0x1, 0x4521}, {0x7f, 0x2}, {0x0, 0x1ff}, {0x2, 0x1bb}, {0x8, 0x10000}, {0x81, 0x7}, {0x2, 0x42445be1}], 0x3, 0x8000, 0x7, 0x0, 0x3}}) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7fffffff, 0x80) getsockopt$packet_int(r2, 0x107, 0x1b, &(0x7f0000000100), &(0x7f0000000140)=0x4) 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006000) [ 2947.180847][T25144] CPU: 0 PID: 25144 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2947.188866][T25144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.199030][T25144] Call Trace: [ 2947.205239][T25144] dump_stack+0x172/0x1f0 [ 2947.210830][T25144] should_fail.cold+0xa/0x15 [ 2947.215882][T25144] ? stack_trace_save+0xac/0xe0 [ 2947.220759][T25144] ? fault_create_debugfs_attr+0x180/0x180 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006001) [ 2947.227124][T25144] ? page_to_nid.part.0+0x20/0x20 [ 2947.232178][T25144] ? ___might_sleep+0x163/0x280 [ 2947.237078][T25144] __should_failslab+0x121/0x190 [ 2947.242683][T25144] should_failslab+0x9/0x14 [ 2947.247779][T25144] kmem_cache_alloc+0x2aa/0x710 [ 2947.253697][T25144] ? fc_mount+0x17/0xc0 [ 2947.257990][T25144] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2947.263502][T25144] ? vfs_kern_mount+0x40/0x60 [ 2947.268204][T25144] ? btrfs_mount+0x2b4/0x15e2 [ 2947.272993][T25144] ? legacy_get_tree+0x108/0x220 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006100) [ 2947.278217][T25144] ? vfs_get_tree+0x8e/0x390 [ 2947.282857][T25144] ? do_mount+0x13b3/0x1c30 [ 2947.287659][T25144] ? ksys_mount+0xdb/0x150 [ 2947.292235][T25144] getname_kernel+0x53/0x370 [ 2947.298385][T25144] kern_path+0x20/0x40 [ 2947.302597][T25144] lookup_bdev.part.0+0x7b/0x1b0 [ 2947.302616][T25144] ? blkdev_open+0x290/0x290 [ 2947.302635][T25144] ? debug_check_no_obj_freed+0xc0/0x43f [ 2947.302650][T25144] blkdev_get_by_path+0x81/0x130 [ 2947.302668][T25144] btrfs_scan_one_device+0xd3/0x710 [ 2947.302690][T25144] ? device_list_add+0x14f0/0x14f0 [ 2947.333433][T25144] ? trace_hardirqs_off+0x210/0x240 [ 2947.333459][T25144] ? btrfs_mount_root+0xb2f/0x1290 [ 2947.343880][T25144] btrfs_mount_root+0x711/0x1290 [ 2947.348836][T25144] ? btrfs_decode_error+0x70/0x70 [ 2947.348858][T25144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2947.348876][T25144] ? legacy_parse_param+0x116/0x880 [ 2947.348898][T25144] ? __lookup_constant+0xd6/0x100 [ 2947.371012][T25144] ? security_fs_context_parse_param+0x81/0xb0 [ 2947.377196][T25144] ? logfc+0x700/0x700 [ 2947.381289][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.387733][T25144] ? vfs_parse_fs_param+0xcd/0x540 [ 2947.392868][T25144] ? kfree+0x1fd/0x2c0 [ 2947.397176][T25144] ? vfs_parse_fs_string+0x116/0x170 [ 2947.403503][T25144] ? vfs_parse_fs_param+0x540/0x540 [ 2947.408733][T25144] ? btrfs_decode_error+0x70/0x70 [ 2947.413899][T25144] legacy_get_tree+0x108/0x220 [ 2947.418723][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.425524][T25144] vfs_get_tree+0x8e/0x390 15:05:39 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006101) [ 2947.429969][T25144] fc_mount+0x17/0xc0 [ 2947.434014][T25144] vfs_kern_mount.part.0+0xd8/0xf0 [ 2947.439236][T25144] vfs_kern_mount+0x40/0x60 [ 2947.443797][T25144] btrfs_mount+0x2b4/0x15e2 [ 2947.448361][T25144] ? __kasan_check_read+0x11/0x20 [ 2947.453411][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.459681][T25144] ? should_fail+0x1de/0x852 [ 2947.464304][T25144] ? fault_create_debugfs_attr+0x180/0x180 [ 2947.470326][T25144] ? btrfs_remount+0x10f0/0x10f0 [ 2947.475398][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.481678][T25144] ? refcount_sub_and_test_checked+0x154/0x200 [ 2947.487861][T25144] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2947.493270][T25144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2947.499566][T25144] ? legacy_parse_param+0x116/0x880 [ 2947.504967][T25144] ? __lookup_constant+0xd6/0x100 [ 2947.510028][T25144] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2947.516132][T25144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2947.522491][T25144] ? apparmor_capable+0x2ed/0x630 [ 2947.528416][T25144] ? cap_capable+0x205/0x270 [ 2947.533176][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.539439][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.545700][T25144] ? btrfs_remount+0x10f0/0x10f0 [ 2947.550670][T25144] legacy_get_tree+0x108/0x220 [ 2947.555456][T25144] ? legacy_get_tree+0x108/0x220 [ 2947.560425][T25144] vfs_get_tree+0x8e/0x390 [ 2947.564863][T25144] do_mount+0x13b3/0x1c30 [ 2947.569304][T25144] ? copy_mount_string+0x40/0x40 [ 2947.574291][T25144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.580552][T25144] ? copy_mount_options+0x2e8/0x3f0 [ 2947.585785][T25144] ksys_mount+0xdb/0x150 [ 2947.590094][T25144] __x64_sys_mount+0xbe/0x150 [ 2947.594781][T25144] do_syscall_64+0xfd/0x6a0 [ 2947.599294][T25144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2947.605200][T25144] RIP: 0033:0x45c27a [ 2947.609196][T25144] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2947.629162][T25144] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2947.629177][T25144] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2947.629184][T25144] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2947.629191][T25144] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2947.629197][T25144] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2947.629203][T25144] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:40 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:40 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006200) 15:05:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:40 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$getsig(0x4202, r1, 0x3, &(0x7f0000000100)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:40 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000200000002, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000640)="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") ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000840)="47257493caa5ed62a581f18f00203ad61b09c6e28b3d70eca18c06301fcaa8b30f1d2d2aad15df0e000000000000006c65f91c61ab0d41d2edb1e756bf46a0ed4444ff4adb1ecd65ee4cf59ca2ea053d87a8839e5e0b490d2266a610d1ee8c9c825041f913e2045d01ec53865be273af119fa89115cd21662f69357f893569abb88279416be560a01942326b15778da816e095fbfcd4d47c672ea9fd9ef505722d5451f6a40ef06a64e4fdeddaf0d00d038d5d26b1f08532f4fe6e819f6ba2e75b66ee8ee8bbaf46a25095a05ecd0d") creat(&(0x7f0000000080)='./file0\x00', 0x101) 15:05:40 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006201) [ 2947.945561][T25189] FAULT_INJECTION: forcing a failure. [ 2947.945561][T25189] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.000332][T25189] CPU: 1 PID: 25189 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2948.008452][T25189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.018525][T25189] Call Trace: [ 2948.021876][T25189] dump_stack+0x172/0x1f0 [ 2948.026285][T25189] should_fail.cold+0xa/0x15 [ 2948.030997][T25189] ? alloc_page_buffers+0x16a/0x5c0 [ 2948.036313][T25189] ? fault_create_debugfs_attr+0x180/0x180 [ 2948.042162][T25189] ? btrfs_open_devices+0x140/0x160 [ 2948.047391][T25189] ? find_get_entry+0x50e/0x880 [ 2948.052262][T25189] ? __kasan_check_read+0x11/0x20 [ 2948.057409][T25189] __should_failslab+0x121/0x190 [ 2948.062400][T25189] should_failslab+0x9/0x14 [ 2948.067021][T25189] kmem_cache_alloc+0x47/0x710 [ 2948.071851][T25189] ? ___might_sleep+0x163/0x280 [ 2948.076818][T25189] ? mempool_alloc+0x380/0x380 [ 2948.081698][T25189] mempool_alloc_slab+0x47/0x60 [ 2948.086579][T25189] mempool_alloc+0x169/0x380 [ 2948.086594][T25189] ? workingset_refault+0xba0/0xba0 [ 2948.086606][T25189] ? mempool_destroy+0x40/0x40 [ 2948.086620][T25189] ? __kasan_check_write+0x14/0x20 [ 2948.086635][T25189] ? lock_downgrade+0x920/0x920 [ 2948.086649][T25189] ? rwlock_bug.part.0+0x90/0x90 [ 2948.086662][T25189] ? __find_get_block+0x555/0xdb0 [ 2948.086689][T25189] bio_alloc_bioset+0x3b9/0x680 [ 2948.126529][T25189] ? __find_get_block+0x330/0xdb0 [ 2948.131576][T25189] ? bvec_alloc+0x2f0/0x2f0 [ 2948.136094][T25189] ? __getblk_gfp+0x5c/0xa10 [ 2948.140727][T25189] submit_bh_wbc+0x1c5/0x900 [ 2948.145441][T25189] __bread_gfp+0x164/0x370 [ 2948.149873][T25189] btrfs_read_dev_one_super+0xb6/0x2a0 [ 2948.155361][T25189] btrfs_read_dev_super+0x6c/0xd0 [ 2948.160399][T25189] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 2948.166149][T25189] btrfs_get_bdev_and_sb+0xff/0x300 [ 2948.171364][T25189] open_fs_devices+0x6e7/0xc40 [ 2948.176241][T25189] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 2948.181895][T25189] ? btrfs_scan_one_device+0x5ac/0x710 [ 2948.187553][T25189] btrfs_open_devices+0x140/0x160 [ 2948.192597][T25189] btrfs_mount_root+0x793/0x1290 15:05:40 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006300) 15:05:40 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006301) [ 2948.198374][T25189] ? btrfs_decode_error+0x70/0x70 [ 2948.203455][T25189] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2948.210711][T25189] ? legacy_parse_param+0x116/0x880 [ 2948.216035][T25189] ? __lookup_constant+0xd6/0x100 [ 2948.221083][T25189] ? security_fs_context_parse_param+0x81/0xb0 [ 2948.227261][T25189] ? logfc+0x700/0x700 [ 2948.231348][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.237784][T25189] ? vfs_parse_fs_param+0xcd/0x540 [ 2948.242936][T25189] ? kfree+0x1fd/0x2c0 [ 2948.247032][T25189] ? vfs_parse_fs_string+0x116/0x170 [ 2948.252421][T25189] ? vfs_parse_fs_param+0x540/0x540 [ 2948.257642][T25189] ? btrfs_decode_error+0x70/0x70 [ 2948.263100][T25189] legacy_get_tree+0x108/0x220 [ 2948.267889][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.274596][T25189] vfs_get_tree+0x8e/0x390 [ 2948.279026][T25189] fc_mount+0x17/0xc0 [ 2948.283029][T25189] vfs_kern_mount.part.0+0xd8/0xf0 [ 2948.288163][T25189] vfs_kern_mount+0x40/0x60 [ 2948.292680][T25189] btrfs_mount+0x2b4/0x15e2 15:05:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2948.297198][T25189] ? __kasan_check_read+0x11/0x20 [ 2948.302254][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.308725][T25189] ? should_fail+0x1de/0x852 [ 2948.313337][T25189] ? fault_create_debugfs_attr+0x180/0x180 [ 2948.319183][T25189] ? btrfs_remount+0x10f0/0x10f0 [ 2948.324590][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.330984][T25189] ? refcount_sub_and_test_checked+0x154/0x200 [ 2948.337167][T25189] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2948.342556][T25189] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2948.342573][T25189] ? legacy_parse_param+0x116/0x880 [ 2948.342585][T25189] ? __lookup_constant+0xd6/0x100 [ 2948.342602][T25189] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2948.342615][T25189] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2948.342628][T25189] ? apparmor_capable+0x2ed/0x630 [ 2948.342639][T25189] ? cap_capable+0x205/0x270 [ 2948.342654][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.342676][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.394537][T25189] ? btrfs_remount+0x10f0/0x10f0 15:05:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2948.400819][T25189] legacy_get_tree+0x108/0x220 [ 2948.405721][T25189] ? legacy_get_tree+0x108/0x220 [ 2948.410795][T25189] vfs_get_tree+0x8e/0x390 [ 2948.415242][T25189] do_mount+0x13b3/0x1c30 [ 2948.419595][T25189] ? copy_mount_string+0x40/0x40 [ 2948.424559][T25189] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2948.430820][T25189] ? _copy_from_user+0x12c/0x1a0 [ 2948.435780][T25189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.442043][T25189] ? copy_mount_options+0x2e8/0x3f0 [ 2948.447267][T25189] ksys_mount+0xdb/0x150 [ 2948.451524][T25189] __x64_sys_mount+0xbe/0x150 [ 2948.456221][T25189] do_syscall_64+0xfd/0x6a0 [ 2948.460740][T25189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2948.467396][T25189] RIP: 0033:0x45c27a [ 2948.471400][T25189] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2948.491681][T25189] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 15:05:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2948.500283][T25189] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2948.508272][T25189] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2948.517056][T25189] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2948.525044][T25189] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2948.533169][T25189] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:41 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:41 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000200000002, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000640)="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") ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000840)="47257493caa5ed62a581f18f00203ad61b09c6e28b3d70eca18c06301fcaa8b30f1d2d2aad15df0e000000000000006c65f91c61ab0d41d2edb1e756bf46a0ed4444ff4adb1ecd65ee4cf59ca2ea053d87a8839e5e0b490d2266a610d1ee8c9c825041f913e2045d01ec53865be273af119fa89115cd21662f69357f893569abb88279416be560a01942326b15778da816e095fbfcd4d47c672ea9fd9ef505722d5451f6a40ef06a64e4fdeddaf0d00d038d5d26b1f08532f4fe6e819f6ba2e75b66ee8ee8bbaf46a25095a05ecd0d") creat(&(0x7f0000000080)='./file0\x00', 0x101) 15:05:41 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006400) 15:05:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x101) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000100)={0x1, ']'}, 0x2) 15:05:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:41 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 15:05:41 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006401) [ 2948.869764][T25354] FAULT_INJECTION: forcing a failure. [ 2948.869764][T25354] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.918611][T25354] CPU: 1 PID: 25354 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2948.926747][T25354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.936986][T25354] Call Trace: [ 2948.940294][T25354] dump_stack+0x172/0x1f0 [ 2948.944987][T25354] should_fail.cold+0xa/0x15 [ 2948.949602][T25354] ? alloc_page_buffers+0x16a/0x5c0 [ 2948.955101][T25354] ? fault_create_debugfs_attr+0x180/0x180 [ 2948.960944][T25354] ? btrfs_open_devices+0x140/0x160 15:05:41 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006500) [ 2948.966420][T25354] ? find_get_entry+0x50e/0x880 [ 2948.971286][T25354] ? __kasan_check_read+0x11/0x20 [ 2948.976334][T25354] __should_failslab+0x121/0x190 [ 2948.981382][T25354] should_failslab+0x9/0x14 [ 2948.986079][T25354] kmem_cache_alloc+0x47/0x710 [ 2948.990893][T25354] ? ___might_sleep+0x163/0x280 [ 2948.995879][T25354] ? mempool_alloc+0x380/0x380 [ 2949.000681][T25354] mempool_alloc_slab+0x47/0x60 [ 2949.005585][T25354] mempool_alloc+0x169/0x380 [ 2949.010217][T25354] ? workingset_refault+0xba0/0xba0 15:05:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:41 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006501) [ 2949.015438][T25354] ? mempool_destroy+0x40/0x40 [ 2949.020243][T25354] ? __kasan_check_write+0x14/0x20 [ 2949.025372][T25354] ? lock_downgrade+0x920/0x920 [ 2949.030238][T25354] ? rwlock_bug.part.0+0x90/0x90 [ 2949.035797][T25354] ? __find_get_block+0x555/0xdb0 [ 2949.040843][T25354] bio_alloc_bioset+0x3b9/0x680 [ 2949.045716][T25354] ? __find_get_block+0x330/0xdb0 [ 2949.050764][T25354] ? bvec_alloc+0x2f0/0x2f0 [ 2949.055374][T25354] ? __getblk_gfp+0x5c/0xa10 [ 2949.060185][T25354] submit_bh_wbc+0x1c5/0x900 [ 2949.065523][T25354] __bread_gfp+0x164/0x370 [ 2949.070228][T25354] btrfs_read_dev_one_super+0xb6/0x2a0 [ 2949.075714][T25354] btrfs_read_dev_super+0x6c/0xd0 [ 2949.080864][T25354] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 2949.086636][T25354] btrfs_get_bdev_and_sb+0xff/0x300 [ 2949.091942][T25354] open_fs_devices+0x6e7/0xc40 [ 2949.096734][T25354] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 2949.102386][T25354] ? btrfs_scan_one_device+0x5ac/0x710 [ 2949.108229][T25354] btrfs_open_devices+0x140/0x160 [ 2949.113630][T25354] btrfs_mount_root+0x793/0x1290 15:05:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2949.118699][T25354] ? btrfs_decode_error+0x70/0x70 [ 2949.123828][T25354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2949.130371][T25354] ? legacy_parse_param+0x116/0x880 [ 2949.135769][T25354] ? __lookup_constant+0xd6/0x100 [ 2949.140811][T25354] ? security_fs_context_parse_param+0x81/0xb0 [ 2949.146985][T25354] ? logfc+0x700/0x700 [ 2949.151073][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.157349][T25354] ? vfs_parse_fs_param+0xcd/0x540 [ 2949.162488][T25354] ? kfree+0x1fd/0x2c0 [ 2949.166577][T25354] ? vfs_parse_fs_string+0x116/0x170 [ 2949.171888][T25354] ? vfs_parse_fs_param+0x540/0x540 [ 2949.177109][T25354] ? btrfs_decode_error+0x70/0x70 [ 2949.182281][T25354] legacy_get_tree+0x108/0x220 [ 2949.187107][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.195304][T25354] vfs_get_tree+0x8e/0x390 [ 2949.202712][T25354] fc_mount+0x17/0xc0 [ 2949.207416][T25354] vfs_kern_mount.part.0+0xd8/0xf0 [ 2949.214070][T25354] vfs_kern_mount+0x40/0x60 [ 2949.218975][T25354] btrfs_mount+0x2b4/0x15e2 [ 2949.224334][T25354] ? __kasan_check_read+0x11/0x20 [ 2949.229573][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.235872][T25354] ? should_fail+0x1de/0x852 [ 2949.240523][T25354] ? fault_create_debugfs_attr+0x180/0x180 [ 2949.246910][T25354] ? btrfs_remount+0x10f0/0x10f0 [ 2949.255819][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:05:41 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006600) [ 2949.265150][T25354] ? refcount_sub_and_test_checked+0x154/0x200 [ 2949.271851][T25354] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2949.277775][T25354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2949.277792][T25354] ? legacy_parse_param+0x116/0x880 [ 2949.277803][T25354] ? __lookup_constant+0xd6/0x100 [ 2949.277819][T25354] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2949.277831][T25354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2949.277845][T25354] ? apparmor_capable+0x2ed/0x630 [ 2949.277867][T25354] ? cap_capable+0x205/0x270 [ 2949.319231][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.325503][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.331802][T25354] ? btrfs_remount+0x10f0/0x10f0 [ 2949.336770][T25354] legacy_get_tree+0x108/0x220 [ 2949.341657][T25354] ? legacy_get_tree+0x108/0x220 [ 2949.341678][T25354] vfs_get_tree+0x8e/0x390 [ 2949.341701][T25354] do_mount+0x13b3/0x1c30 [ 2949.355497][T25354] ? copy_mount_string+0x40/0x40 [ 2949.355518][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.355538][T25354] ? copy_mount_options+0x2e8/0x3f0 [ 2949.355555][T25354] ksys_mount+0xdb/0x150 [ 2949.355571][T25354] __x64_sys_mount+0xbe/0x150 [ 2949.355589][T25354] do_syscall_64+0xfd/0x6a0 [ 2949.355606][T25354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2949.355617][T25354] RIP: 0033:0x45c27a [ 2949.355634][T25354] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2949.355650][T25354] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2949.367530][T25354] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2949.367539][T25354] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2949.367548][T25354] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2949.367557][T25354] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2949.367565][T25354] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 15:05:42 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:42 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000200000002, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000640)="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") ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000840)="47257493caa5ed62a581f18f00203ad61b09c6e28b3d70eca18c06301fcaa8b30f1d2d2aad15df0e000000000000006c65f91c61ab0d41d2edb1e756bf46a0ed4444ff4adb1ecd65ee4cf59ca2ea053d87a8839e5e0b490d2266a610d1ee8c9c825041f913e2045d01ec53865be273af119fa89115cd21662f69357f893569abb88279416be560a01942326b15778da816e095fbfcd4d47c672ea9fd9ef505722d5451f6a40ef06a64e4fdeddaf0d00d038d5d26b1f08532f4fe6e819f6ba2e75b66ee8ee8bbaf46a25095a05ecd0d") creat(&(0x7f0000000080)='./file0\x00', 0x101) 15:05:42 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000100)) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:42 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006601) 15:05:42 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000250000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2949.753402][T25504] QAT: Invalid ioctl 15:05:42 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006700) [ 2949.799954][T25504] QAT: Invalid ioctl [ 2949.813189][T25502] FAULT_INJECTION: forcing a failure. [ 2949.813189][T25502] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.853836][T25502] CPU: 1 PID: 25502 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2949.861889][T25502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.872040][T25502] Call Trace: [ 2949.875350][T25502] dump_stack+0x172/0x1f0 [ 2949.879740][T25502] should_fail.cold+0xa/0x15 [ 2949.884353][T25502] ? do_syscall_64+0xfd/0x6a0 [ 2949.889057][T25502] ? fault_create_debugfs_attr+0x180/0x180 [ 2949.894881][T25502] ? page_to_nid.part.0+0x20/0x20 [ 2949.899929][T25502] ? ___might_sleep+0x163/0x280 [ 2949.904805][T25502] __should_failslab+0x121/0x190 [ 2949.909767][T25502] should_failslab+0x9/0x14 [ 2949.914287][T25502] kmem_cache_alloc_trace+0x2d3/0x790 [ 2949.919693][T25502] ? quarantine_put+0x11c/0x1c0 [ 2949.924573][T25502] btrfs_alloc_device+0xb4/0x720 [ 2949.929541][T25502] ? trace_hardirqs_on+0x67/0x240 [ 2949.934611][T25502] ? btrfs_find_device_by_devspec+0x620/0x620 [ 2949.940903][T25502] ? btrfs_free_device+0xbf/0xf0 [ 2949.945860][T25502] close_fs_devices.part.0+0x1f2/0x7d0 [ 2949.951512][T25502] btrfs_close_devices+0xa0/0x200 [ 2949.956553][T25502] btrfs_mount_root+0xf42/0x1290 [ 2949.961513][T25502] ? btrfs_decode_error+0x70/0x70 [ 2949.966558][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2949.972846][T25502] ? legacy_parse_param+0x116/0x880 [ 2949.978164][T25502] ? __lookup_constant+0xd6/0x100 [ 2949.983207][T25502] ? security_fs_context_parse_param+0x81/0xb0 [ 2949.989467][T25502] ? logfc+0x700/0x700 [ 2949.993552][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:05:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x2000000000000018, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:05:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) [ 2949.999823][T25502] ? vfs_parse_fs_param+0xcd/0x540 [ 2950.005044][T25502] ? kfree+0x1fd/0x2c0 [ 2950.009187][T25502] ? vfs_parse_fs_string+0x116/0x170 [ 2950.014606][T25502] ? vfs_parse_fs_param+0x540/0x540 [ 2950.019922][T25502] ? btrfs_decode_error+0x70/0x70 [ 2950.024969][T25502] legacy_get_tree+0x108/0x220 [ 2950.029992][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.036273][T25502] vfs_get_tree+0x8e/0x390 [ 2950.040709][T25502] fc_mount+0x17/0xc0 [ 2950.045063][T25502] vfs_kern_mount.part.0+0xd8/0xf0 [ 2950.050204][T25502] vfs_kern_mount+0x40/0x60 [ 2950.054725][T25502] btrfs_mount+0x2b4/0x15e2 [ 2950.059247][T25502] ? __kasan_check_read+0x11/0x20 [ 2950.064290][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.070535][T25502] ? should_fail+0x1de/0x852 [ 2950.075194][T25502] ? fault_create_debugfs_attr+0x180/0x180 [ 2950.075211][T25502] ? btrfs_remount+0x10f0/0x10f0 [ 2950.075227][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.075241][T25502] ? refcount_sub_and_test_checked+0x154/0x200 [ 2950.075253][T25502] ? refcount_dec_not_one+0x1f0/0x1f0 15:05:42 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006701) [ 2950.075267][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2950.075291][T25502] ? legacy_parse_param+0x116/0x880 [ 2950.115179][T25502] ? __lookup_constant+0xd6/0x100 [ 2950.120252][T25502] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2950.126250][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2950.132502][T25502] ? apparmor_capable+0x2ed/0x630 [ 2950.137544][T25502] ? cap_capable+0x205/0x270 [ 2950.142160][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.148509][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.154779][T25502] ? btrfs_remount+0x10f0/0x10f0 [ 2950.159728][T25502] legacy_get_tree+0x108/0x220 [ 2950.164608][T25502] ? legacy_get_tree+0x108/0x220 [ 2950.164626][T25502] vfs_get_tree+0x8e/0x390 [ 2950.164640][T25502] do_mount+0x13b3/0x1c30 [ 2950.164656][T25502] ? copy_mount_string+0x40/0x40 [ 2950.164676][T25502] ? __sanitizer_cov_trace_const_cmp8+0x4/0x20 [ 2950.164698][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.196213][T25502] ? copy_mount_options+0x2e8/0x3f0 15:05:42 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006800) [ 2950.201740][T25502] ksys_mount+0xdb/0x150 [ 2950.206119][T25502] __x64_sys_mount+0xbe/0x150 [ 2950.210909][T25502] do_syscall_64+0xfd/0x6a0 [ 2950.215448][T25502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.221685][T25502] RIP: 0033:0x45c27a [ 2950.225587][T25502] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2950.248137][T25502] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2950.257012][T25502] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2950.265277][T25502] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2950.273269][T25502] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2950.281278][T25502] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2950.289356][T25502] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2950.310161][T25502] ------------[ cut here ]------------ [ 2950.315695][T25502] kernel BUG at fs/btrfs/volumes.c:1275! [ 2950.321282][T25502] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2950.322753][ T3908] kobject: 'loop5' (00000000a4035c80): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2950.327924][T25502] CPU: 1 PID: 25502 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #89 [ 2950.346068][T25502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.356513][T25502] RIP: 0010:close_fs_devices.part.0+0x5fe/0x7d0 [ 2950.362852][T25502] Code: 3c 03 0f 8e 57 01 00 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 92 ce bf fe <0f> 0b e8 8b ce bf fe 0f 0b 48 8b 7d c0 e8 b0 e5 f9 fe e9 3d fd ff [ 2950.365205][ T3908] kobject: 'loop2' (0000000032b9ec15): kobject_uevent_env [ 2950.382622][T25502] RSP: 0018:ffff88805f18f798 EFLAGS: 00010246 [ 2950.382636][T25502] RAX: 0000000000040000 RBX: ffff88808b736840 RCX: ffffc9000e79d000 [ 2950.382643][T25502] RDX: 0000000000040000 RSI: ffffffff82b2d0be RDI: 0000000000000007 [ 2950.382650][T25502] RBP: ffff88805f18f810 R08: ffff88805c612280 R09: fffffbfff11cae27 [ 2950.382656][T25502] R10: fffffbfff11cae26 R11: ffffffff88e57133 R12: 0000000000000000 [ 2950.382663][T25502] R13: ffff88808f105b00 R14: dffffc0000000000 R15: fffffffffffffff4 [ 2950.382673][T25502] FS: 00007f6b1e80f700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2950.382680][T25502] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2950.382687][T25502] CR2: 000000000070f158 CR3: 000000008f62a000 CR4: 00000000001406e0 [ 2950.382697][T25502] Call Trace: [ 2950.382729][T25502] btrfs_close_devices+0xa0/0x200 [ 2950.382754][T25502] btrfs_mount_root+0xf42/0x1290 [ 2950.417964][ T3908] kobject: 'loop2' (0000000032b9ec15): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2950.420139][T25502] ? btrfs_decode_error+0x70/0x70 [ 2950.430580][ T3908] kobject: 'loop0' (0000000098a07c2f): kobject_uevent_env [ 2950.436126][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2950.436144][T25502] ? legacy_parse_param+0x116/0x880 [ 2950.436158][T25502] ? __lookup_constant+0xd6/0x100 [ 2950.436175][T25502] ? security_fs_context_parse_param+0x81/0xb0 [ 2950.436196][T25502] ? logfc+0x700/0x700 [ 2950.445230][ T3908] kobject: 'loop0' (0000000098a07c2f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2950.451797][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.539005][T25502] ? vfs_parse_fs_param+0xcd/0x540 [ 2950.544299][T25502] ? kfree+0x1fd/0x2c0 [ 2950.548633][T25502] ? vfs_parse_fs_string+0x116/0x170 [ 2950.554214][T25502] ? vfs_parse_fs_param+0x540/0x540 [ 2950.559833][T25502] ? btrfs_decode_error+0x70/0x70 [ 2950.564865][T25502] legacy_get_tree+0x108/0x220 [ 2950.569728][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.577922][T25502] vfs_get_tree+0x8e/0x390 [ 2950.582362][T25502] fc_mount+0x17/0xc0 [ 2950.586372][T25502] vfs_kern_mount.part.0+0xd8/0xf0 [ 2950.591974][T25502] vfs_kern_mount+0x40/0x60 [ 2950.596488][T25502] btrfs_mount+0x2b4/0x15e2 [ 2950.601006][T25502] ? __kasan_check_read+0x11/0x20 [ 2950.606053][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.612321][T25502] ? should_fail+0x1de/0x852 [ 2950.617019][T25502] ? fault_create_debugfs_attr+0x180/0x180 [ 2950.622846][T25502] ? btrfs_remount+0x10f0/0x10f0 [ 2950.627814][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.634341][T25502] ? refcount_sub_and_test_checked+0x154/0x200 [ 2950.640766][T25502] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2950.646176][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2950.652715][T25502] ? legacy_parse_param+0x116/0x880 [ 2950.658247][T25502] ? __lookup_constant+0xd6/0x100 [ 2950.663304][T25502] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2950.669309][T25502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2950.675935][T25502] ? apparmor_capable+0x2ed/0x630 [ 2950.680976][T25502] ? cap_capable+0x205/0x270 [ 2950.685781][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.692047][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.698663][T25502] ? btrfs_remount+0x10f0/0x10f0 [ 2950.703640][T25502] legacy_get_tree+0x108/0x220 [ 2950.708434][T25502] ? legacy_get_tree+0x108/0x220 [ 2950.713502][T25502] vfs_get_tree+0x8e/0x390 [ 2950.717926][T25502] do_mount+0x13b3/0x1c30 [ 2950.722265][T25502] ? copy_mount_string+0x40/0x40 [ 2950.727236][T25502] ? __sanitizer_cov_trace_const_cmp8+0x4/0x20 [ 2950.733516][T25502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.739978][T25502] ? copy_mount_options+0x2e8/0x3f0 [ 2950.745287][T25502] ksys_mount+0xdb/0x150 [ 2950.749548][T25502] __x64_sys_mount+0xbe/0x150 [ 2950.754257][T25502] do_syscall_64+0xfd/0x6a0 [ 2950.758811][T25502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.764983][T25502] RIP: 0033:0x45c27a [ 2950.768890][T25502] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2950.788942][T25502] RSP: 002b:00007f6b1e80ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2950.797566][T25502] RAX: ffffffffffffffda RBX: 00007f6b1e80eb40 RCX: 000000000045c27a [ 2950.805563][T25502] RDX: 00007f6b1e80eae0 RSI: 0000000020000000 RDI: 00007f6b1e80eb00 [ 2950.813810][T25502] RBP: 0000000000000001 R08: 00007f6b1e80eb40 R09: 00007f6b1e80eae0 [ 2950.821886][T25502] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2950.829877][T25502] R13: 00000000004c8912 R14: 00000000004df720 R15: 0000000000000003 [ 2950.837955][T25502] Modules linked in: [ 2950.846902][T25502] ---[ end trace 5dbe974667bc001d ]--- [ 2950.848106][ T3908] kobject: 'loop4' (000000009ac7479f): kobject_uevent_env [ 2950.853255][T25502] RIP: 0010:close_fs_devices.part.0+0x5fe/0x7d0 [ 2950.867244][T25502] Code: 3c 03 0f 8e 57 01 00 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 92 ce bf fe <0f> 0b e8 8b ce bf fe 0f 0b 48 8b 7d c0 e8 b0 e5 f9 fe e9 3d fd ff [ 2950.867435][ T3908] kobject: 'loop4' (000000009ac7479f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2950.887469][T25502] RSP: 0018:ffff88805f18f798 EFLAGS: 00010246 15:05:43 executing program 3: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[]}}, 0x1) close(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='\xbfposix_acl_access\x00', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/sco\x00') ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000580)=0x3) 15:05:43 executing program 5: memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000006801) 15:05:43 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000200000002, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000640)="b452d51ecf87e1e7035e8132b30ba4847cfa38573d09222a08f9be6578806ff366b279a376615dccc841b972a6e86a2b9a0c5546773efc1a7c6a142ffcebb9e90665dfa0913a4ec3a7ab6b60401e4d137bca8da9a709fcbeecd1f29fca7fa13fb61e54c94243f56475b61e9cb390fe7219851829c7814e624bdbb2e8cf5cb621bad81e9c129e34cd116cb9c16a8a3b7f437a810fbecc8c6ad049b1969a231cddc877be24137996d83e58cda35b1bab6358a7043457369d230c12030465c5b06de7db60e8d775faf722359446388911b605aade9be0803abc02f27b64529939c81510f960c19f6432e227329f5e4c6c1d631f98d8c8f7a554c236dc2b41be42f8") ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000840)="47257493caa5ed62a581f18f00203ad61b09c6e28b3d70eca18c06301fcaa8b30f1d2d2aad15df0e000000000000006c65f91c61ab0d41d2edb1e756bf46a0ed4444ff4adb1ecd65ee4cf59ca2ea053d87a8839e5e0b490d2266a610d1ee8c9c825041f913e2045d01ec53865be273af119fa89115cd21662f69357f893569abb88279416be560a01942326b15778da816e095fbfcd4d47c672ea9fd9ef505722d5451f6a40ef06a64e4fdeddaf0d00d038d5d26b1f08532f4fe6e819f6ba2e75b66ee8ee8bbaf46a25095a05ecd0d") creat(&(0x7f0000000080)='./file0\x00', 0x101) 15:05:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r0]}) 15:05:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) [ 2950.906109][T25502] RAX: 0000000000040000 RBX: ffff88808b736840 RCX: ffffc9000e79d000 [ 2950.918044][T25502] RDX: 0000000000040000 RSI: ffffffff82b2d0be RDI: 0000000000000007 [ 2950.936794][T25502] RBP: ffff88805f18f810 R08: ffff88805c612280 R09: fffffbfff11cae27 [ 2950.952611][T25502] R10: fffffbfff11cae26 R11: ffffffff88e57133 R12: 0000000000000000 [ 2950.981288][ T3908] kobject: 'loop3' (00000000bac00328): kobject_uevent_env [ 2950.985270][T25502] R13: ffff88808f105b00 R14: dffffc0000000000 R15: fffffffffffffff4 [ 2951.003411][ T3908] kobject: 'loop3' (00000000bac00328): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2951.005951][T25502] FS: 00007f6b1e80f700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2951.024166][T25502] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2951.038432][T25502] CR2: 0000001b2ec24000 CR3: 000000008f62a000 CR4: 00000000001406e0 [ 2951.066035][T25502] Kernel panic - not syncing: Fatal exception [ 2951.073705][T25502] Kernel Offset: disabled [ 2951.079499][T25502] Rebooting in 86400 seconds..