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"}, 0x1008) fdatasync(r1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r4, 0x4}, &(0x7f00000001c0)=0x8) 00:38:06 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8000, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="4e1a2cbf08ef061d8d7c742b581a5418272aa324791d9cfecf82f70e5460d85fabcede5b7a96f728db27aabb2e2ed7f88adf2aa2e936a09bd461cb5d0934033ed8a4e635c874fdc218e7244f896df6bb783b8bfca30ac586b35ce43beb1ee92459f43cafa06d48509822be7fe7a588dcf8c4b5760953", 0x76) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:06 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket(0x800000000010, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x101, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r2, 0x0, 0xffff) 00:38:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff000000000000, @loopback}, 0x1c) 00:38:06 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000640)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000680)={@multicast1, @rand_addr, 0x0}, &(0x7f00000006c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000a80)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000c00)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000ec0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60100008}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x240, r2, 0x10, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r5}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x16}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x240}, 0x1, 0x0, 0x0, 0xd1}, 0x4) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="31050000000000000000090000002300030014000200736c6c6572310000000000000800010000000000080003000000000008000800e000000282c83d01964a3a5a25d466e9d219776c16313358d62cb196f8a02646355b64785cedc3bd85079bcfb4c3880a231d4546146a909a51483911c8caad26cfd0422597121a76a14eb794cf17c66765cbc6b64a604d357d7f1633e4413b936f38e1114c01fa0c4dcf5dda34240fd3f4fd676479b67626a7ea5720845c8c1dac628d47404c23da0bee8c938d3aef4357f4d678b76dab7c901f856cb856336805fbdf2989f2f516b35231f772000149441c0d0776a997ad42d43d8e"], 0x44}}, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) 00:38:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff010000000000, @loopback}, 0x1c) 00:38:06 executing program 2: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x109000, 0x114) fcntl$setstatus(r0, 0x4, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200700, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="2e8686018bb77da4bf9360f733b14504", 0x10) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0x0, 0x2, &(0x7f0000000180)='\\\x00', 0xffffffffffffffff}, 0x30) capset(&(0x7f0000000200)={0x0, r3}, &(0x7f0000000240)={0x5, 0x2, 0x5, 0x7, 0xfffffffffffffffe, 0x3}) eventfd(0x5) 00:38:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x9, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x10000000022, 0x3, 0x0, &(0x7f0000000000)) 00:38:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x1}) r2 = socket(0x0, 0x800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400600) r4 = fcntl$getown(r0, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000280)='fdinfo/3\x00') sendfile(r2, r5, 0x0, 0xffff) bind(r0, &(0x7f00000001c0)=@ax25={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80) setsockopt$packet_int(r5, 0x107, 0x7, &(0x7f0000000080)=0x3104, 0x4) connect$vsock_dgram(r5, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) getsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @empty}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r6, 0x6}, 0x8) 00:38:06 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) shutdown(r0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "59c76958d8b7f46562f039dc9b8c7ff3"}, 0x11, 0x1) fcntl$setstatus(r0, 0x4, 0x4000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x10000, 0x0) r3 = gettid() r4 = gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) sendmsg$nl_generic(r2, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000900)={&(0x7f00000001c0)={0x738, 0x12, 0x20, 0x70bd27, 0x25dfdbff, {0x20}, [@nested={0x154, 0x46, [@generic="2077e68f32958c5fc6bc89efb72f4c37cc3a10f0460b5376b2b934062de1f829bdd5d8eb86e7ce4c620d8e1cb765a9e49658125a0d0b10e0bef072a9796cdc147ce6f29b77143848dbedbaf7e25c86", @generic="b218ee7531c0c610822a74c1325387fe01adbdd8990e4aa4eed6718b62fc58db584181aa8789f8e22a6291b38fed589b0c85e9fdb85b61b8c35aa76da43e2cac691007b7090a34d84a04050bb29c1106e8a72fc17c06f65ff4fa88384cace04d211b41bc4ad1f51474151b6836e73544bb68f8a299f2e88d5c59b24a21b235647e3695a6be29daa786f20a2d8035854597a266344c51ec4155f7a1bc453da24ba178", @typed={0x8, 0x56, @fd=r1}, @typed={0x8, 0x76, @u32}, @typed={0x3c, 0x36, @binary="872b7823777c9cff3225f678aedc6b4cd4c5c98ae158e778303e78e0af009c330f6aa39821ab114cb67c879c71709ca1a6698a7537c3d8"}, @typed={0x8, 0x5, @pid=r3}, @typed={0x8, 0x62, @pid=r4}]}, @generic="92f742806e791ba16a33e54db052de1f19b6fae661e2e7ab802515350404af7e10cbee7948d77d9b3edafa4bbb4ef19f7a6512fb08f7cf394484b9a2d4b5cf3219e873793225f8c0f0992838dc1731f5130ea56cb2b569a8488693165da7f0d8ff7cbb1a6bec724e9f2964b6f062f200ee45be295352377c3972d0d5eff0c2aee0a61956992daf9521a82edb283d05a3c54664da3e0743568a7a73d7c1cbe8cc661504773214a5a47ac53d", @generic="cae8134f8e91ac6919894983a19d2a41f209719f75ceb62323d72303290ee5da44300216b82cefec7f8c28759cf191328480ef92a5f00ac0c0edb9abed1d520bc725b55d9183171edbec60918a9de730ed7b67969d7d6ad912e89373444eb350dd55f8f505d09d26dec4", @typed={0x8, 0x1f, @u32=0x7fff}, @generic="fd0c08d07c18e8c6ecb8a9712a330483307dad64aac32360407695257db9018ccb82ba50918e6940638c624fa4b15bbc4974807a5ec1b97e0cf1cfce4369f995a0219f9b47a5a83361357e741259178ccbd5cdc7f819fc0b231d092d595dea184a79b97d1eb13fb5d6050d512266fc4202f64ff66af95075ba5bd9f05a707a3ec0be2e3fba6d81be4ea260d0e55ec757af29bc1fbd108911eef71583b79799bfcfc9384090753f5a5ee0cbc657df6915c64ecb8709ac40736cca2baba15b8b12", @generic="90f7604f4c08c114aa6ab7a26f7ca84ac0ae4bbc36b313edbb9f4a5310d70e269c1a55e3f4167208c93e9edb7274cc2cc6e38e5535a7f5a104ac91825da7ab9d445d3be68c7148440e3745da39f7c0e43a68d2b0bec01420561153f9541028688e8c9ba806a9a422c515e76f7003934bb0d63c216182e4fbdb6a461b8fa29625d3587dda6f", @typed={0x4, 0x2}, @nested={0x134, 0x77, [@typed={0x8, 0x5d, @u32=0x1062000000}, @typed={0x14, 0x72, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @generic="5f0d5f1a260e8f5a02b800d1d61bd630926dfe79680e4c4333fef0bb66191e12beffcfd0174a67", @typed={0xec, 0x90, @binary="73b47af876ed011143a276088dad7287d7470833eef8e6058553ba5178c3c6645180f3284f0f3168ad66d0b58b975f0bc544bf57d42893d7b17538678f23c78269e5282bec16c2df9c83b2070b13916cedd4e58e8339b9f7f9993dd0c9de2a7831615304ce24ff85261513f0018e880e50442c3e31fdb38adfad10987c07023ea4260efbd7fe7be3b452469b8d2c351767538122ba2fcb1b1b9a3ee332487db216e5842e007aafe62bb4a6a2bc338ca22dcb4ba789f731c86f347c3ae0dcf8d4d7b344a4bafe1f6df08d3edefdb6912eb48b9fdde4a69fa00aebb43128e1de1950e9f552f8"}]}, @generic="227071637bd9c6ce33f7dd21a65ac0cac5892e12370ec922edd945a4c4a54c1b854821d7da42f42ceb80069d5f732f04089398e002dd222de2b03763a36836a6c3b49374bffa811507b151d8871666e1916a868dc515a84d03", @nested={0x1dc, 0x3d, [@generic="ddce7d256235ab800b562b882e680abcb44c86fe36197f86e90f4c35f07f293530192b3339460cbdbc71947c2d70d5c23bbdc53b213effcb89850d8b98064a2aee5ffb18b0acf04d9ab371efb0e1192a2ae361dc0d08572eb33c8d73c7b8df9c1e18d4eefb5af3bb74dab3a7a710ee0f746cf14db64d215cfb824c41f1d8c308d588e3a178fa78598c2a6e22003c3d151b1f181412b0670a23ff3541362fbe0dae0350570da39aab41e272442f4814bc29314de8a9b14dd0ce3d4c48e155a6e8aaca70e74014da42", @generic="1e08d3b76e28a56a1d7c24b35180b6099a3eda", @typed={0x8, 0x6c, @u32=0x7}, @typed={0x1c, 0x96, @binary="fd940c85072247ab88994bc5e479654e4183aabe7a"}, @typed={0xc, 0x93, @str='\"+(+%\x00'}, @generic="abd1a1f8f77d7cb32d6e5bcdedd942e2fd2661599bc98a80e095d3f41d5cbf01d16ed94db5e265fdd9d8dd635d920d7262e8243ebb4f4eb1f296da686d34870c0589a97a499006504e5fc2e0735fdabcba00f09dfd7a4291e28c535aae0d2bee01703f10d7c688c886f65058070e237447d8ca4150367f6794d2213aee1b51dc7513f0552cb5673d91", @generic="f1c99df8d5ead0efb6d37ab4f459d7c7ff06bc7c5e9086c4a39f489b84b8954156d404ab47", @typed={0x8, 0x8f, @pid=r5}, @typed={0x14, 0x14, @ipv6=@remote}]}]}, 0x738}, 0x1, 0x0, 0x0, 0x10}, 0x8800) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001e00)=[{0x0}, {0x0}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x4, 0x12001, 0x0) 00:38:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xa, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:06 executing program 4: ustat(0x40200000000007ff, &(0x7f0000000080)) 00:38:06 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) signalfd(r0, &(0x7f0000000080)={0x3}, 0x8) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 453.302213][T28251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:38:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xb, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xe741cdca188661be, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 453.344638][T28251] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 453.429992][T28251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 453.457694][T28251] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 00:38:07 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc3191637920000000000007f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x2000000001}, 0x60) close(r0) 00:38:07 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0x284, 0x0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x100}, {r2, 0x1002}, {r0, 0x2000}, {r2, 0x2}, {r2, 0x20}], 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x2}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f0000000540)={{0xf000, 0x4, 0xd, 0x40, 0xffffffffffffc806, 0x20, 0x9, 0xfffffffffffffffa, 0x2, 0x100, 0x0, 0x800}, {0x4, 0x3000, 0xa, 0xe00, 0x9, 0xffffffffffffffe1, 0x7, 0xf3, 0x9, 0x2, 0xffff, 0x800}, {0xd964b44b4dfff573, 0x2, 0x8, 0x0, 0x20, 0x0, 0x10000000000, 0x7f, 0x9, 0x100000000, 0x1, 0x81}, {0xf000, 0x5000, 0x0, 0x7, 0x1, 0x1, 0x1, 0x11b37da4, 0xad82, 0x0, 0x10001, 0x6600000000000000}, {0x6000, 0xf000, 0xc, 0x5, 0x1, 0x3, 0x0, 0x0, 0x10000, 0xf, 0x2, 0x2}, {0x0, 0x10000, 0x10, 0x6, 0x7, 0x752, 0x3, 0x8000, 0x2, 0x40, 0x100000000, 0x7fff}, {0xd000, 0x10000, 0xd, 0xff, 0x2, 0x7fff, 0x2, 0x4, 0x800, 0x8, 0x2}, {0x1, 0x4, 0xd, 0x3ff, 0x1000, 0x10000, 0x2, 0x9, 0x4, 0x9ff5, 0x1, 0x7f}, {0x2, 0x1}, {0x2, 0xf000}, 0x20, 0x0, 0x0, 0x20020, 0x8, 0x8000, 0xd000, [0x6, 0x8000, 0x8a1, 0x6b0]}) 00:38:07 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000380)=@rc={0x1f, {0x0, 0xc6, 0x0, 0x1ff, 0x0, 0x1}, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000400)="b9f64c5201e59910a3a643a887de1d1f96f41aed62c9e28e5ef2bd5fd6a25ba16112998130ed9ced6e9eb398554e62e4ccf13fb40b32f7861f1593478ed651dee71f90a13a44886c822580913591389ed0a23d7b183061fd9ecf833369c94c81f4ed023d4df52bbf915e692de473bec4aa28b69b52afb5b1d4132c4c74022a0c1a9dad3da91a085b60b31f0224ba2c45700ac314cf5a1313bea36e09a215fa01e16e73229f78b483b17043d9d16d5f507f8cceb16b", 0xb5}, {&(0x7f00000004c0)="81ac3b0934142ab0c211281670e9ad920d04dd14003dc5df434e3358a38494b44854b5d5a829120be8aa4dbc4a268b13e5745c120038f29c159b48636adbd8b0bacbfb924c7f99ef2c614fab582dbb7d7dc472a2f3b1330401bbf113b71951e0b80ca6b1308a893c86c2610c9f340fda7c1c5208bec33dd8751b4353fa76f9b33076fda311a4ecf6b40376e775888a386b35251a248c13a36ba7c07e0799", 0x9e}, {&(0x7f0000000580)="985e07b0adeaed85608d607324cbf217a9dd2649ffee83fb58a2fa242238ad4a18d95e663433a22b1f43c7f92482e4b8b8263b04013e47676882937a960943c4b36283cda28b55b069fc635d93aa27d3ef8c98d5e9c26aabda7d46c803705aa168f3fa6f97ec257d5175667968a5c8c4db1b3daccdddc8d65653a40f6c4bc292b809290689ee8ee74adb4bce452c7bb88e9f247c8d8fe7d7be0121e3d74c1bc4a29ee7", 0xa3}, {&(0x7f0000000640)="8de25368cb7d8ed0f3459afd3f48b2d412577805ae3c756ee5b28a719f3b9f50c17ceef1d1003fc1415caf4469b187830204a6ed58c47998e6a9993220e6c8f7efd8aa8012357044cf1aaec9701432a66966b5e4ea55b6bd58f47ed0bba38d41cd99b7fac263a1aa", 0x68}, {&(0x7f00000006c0)="40e6e5cecd80e2a04def2a55b32ae5d409b4c8a5a04f9695d9d3e8c10fa74bfeb02eacc91800946bd44ff9f0aba2f94b00b41255e02666f809bdd803028b694445971406415cf8ede51493bf9149f65623f661226ab658ad17cb3cf4c202b90a95d86d2e5b974e34edc8152f1a7adbf028903fd6daf7658394fdbe18c7ab75b1ba2de332cf5f98aa5eaaa5e159eb1e26984239768e70554be1a199985bfe8b087c70540a44e71ab005d4f43e2c51a081a3325372639623808f7698ea087bea909f72dc017e9410af47955595f30a951184ed93c3926bad5163377e4f8c7e5b06ac3358d8650c8a", 0xe7}, {&(0x7f00000007c0)="ee0d21fe9b154115efad22d2cbb5603c1711333a1d6721c46dd79143898bcbb1dcb4826353779971706f0a534344acec243a30304637dcc778067d156bd9e8d449e2753f1d48a1c2d299c0cc030a534ad8832817d71f66254126f84bcd277611577b2ea624c74cf545fef4c6bc854e58395fb2a8f3d47d6cf550a5660ffba83ced75a10d1a9268fc0da1d187b691fbe6ed9813d333012c2c927e1d4260e8160f94c75b8c5ed83488d06f887fc9950ebb3e50082cdaabbe6d2bfce0394bd392a9a409f3fd667f02eb07412fc23990167f3d9a07f12dbcbf5000303a39ed77249ee2e3ac9a34f4b9a5fbcb8f", 0xeb}, {&(0x7f00000008c0)="fb16da8111ab983536007a22aa6a29ae73460fca6b5121f9ed5627c166485ff3ec8c79be016799995589c8c4bf794bd0649db286f7e6c58f065d64bd990d327a5ccbf09df5df1298e04af8f3710efa309c7166bd20daca7958c2906ff555c0ebec1e458eb18feee7b8b5f479022682e7f5a80195dc1d95a7da0ab282f39203c7e9d9b301c3fe8d65ae31c3127fd6660a7578aeec89977dfd89461195a03cfbe8ce91fdfd1cec0bcbc115c525a165f38be0f4d6983a0d1f33b63e8273a4843a69a5ee139653c4d1a370498e11cc806daea9a17bcf9aff83fda1208f95b339e7639ecf9d670bac08fc57701a", 0xeb}, {&(0x7f00000009c0)="f626582cae5714e2e1564dfe26da28a0bc8275e3b6aa8f224bef229dd8cb2b28103c96a0f7336c30d230776f76089300b60a4f0cdf6bc9f6599d6942616ca881f865c7e0caa610a2e83dcba8fc2c5be3fada46fc87ba01e2776401e35fe251a9bd7a0fb161e4a78bf19786730e8b5e1e605d681ac0f33b7be076acb19bf6", 0x7e}, {&(0x7f0000000a40)="cfd7da2c668c4da52ffca863164ccddbe2240dba34d0f984b76c48e143c67c1dce78c58d3564177527d61ea1ce66c31a13f69ab2df1dd0cf59c4014c8fab0b16e4bd1873723c3a35ac8d94ae85f2a47046d5b877ffaf112c8559f7657bbe72abb07bfc6a413d778c1d99b54882d78906bc06e3002d", 0x75}, {&(0x7f0000000ac0)="006a977035fcc2348f9f8c443f74263f71f86411ebeb8f0ff10c45c5c22a47e30e83df7d441c8888d39109aa1136eefa8077f20d604af4bd1ef8d4f1006047db919ea26c5742ded348b4f416d26830755c887084902ee1120fe4047ad2973e5ea78dcbd93665495a1e7829e0345436d6300afdaeef482f95b890ea33729040c127970095b9f588cdd3a477e52c445c74cecdd472023edb73615b50992dcd26e6fab8c56d2390979e407fd693b11b96888a15d0057b51f8f77a9a6963831477af5672ce1112dc61f4b7845c57d3b9e74a271c5570", 0xd4}], 0xa, &(0x7f0000000c80)=[{0x38, 0x29, 0x9, "ee62820db1ab748b66efd64e541c45b9078f0b7a580dc23994892efe2d40cbdd3a"}, {0x48, 0x119, 0x6, "b5cf8ac5f58a5d467c2d1172f7ab02209d89602b80f10186bd8ab251de1af0e5e3deffcf497b994d055222c857f22ec2a4a0fed6"}, {0xc8, 0x107, 0x7, "a367c074a48c00e4457db12e381f9029417218525c227f702ccdcca3d45c0f24086a3c925c8fb47994aba6b3a602d722cbcf012ed37056a025f8cee2c8da17596c2c59871ea0a2627138970e0928baac931de083e3af229efade112e401b8437413b4226f7aacfb663b1a3b5f1c8068a71e43d0790959392fa8a6e74b357250e72062bfb4d0b0f050e35c9805a70313dbe5cd2454f934f995ef6d8b84cecc25a3ccedd2e693372a85a1e97c599597f8757af73a90b1e4da0"}, {0xa0, 0x10e, 0x6, "b15917646344b6f2b359f02b2f8b73518916e794ed5a944f4f5e930bd81c88db681b9310c69a612c7f9535437d56c124efa95de28e11fccfd490b280119473076e2b2ce5dd7663252b201388db62e674a94ac1a21d19d4e4af14226434e1c4b9e1ff5c91d048bee12431dd8ebfeb1e1514b0015586d69787178b24f8c38b5ff55cd9ac400a5e51219cebdb4212ced578"}, {0x20, 0x10b, 0x4, "db03654b078df54812f6564bdf98fa83"}], 0x208}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000ec0)="47253fbdf88ee82e5df07d7deb561160a9ea0d1e3be5cc6ac305871c63fc87bbc602f15f6edd4bd02da5365f3a50f9fe1163d4b77194f0c4682bcb4bba8ac836bc971f765c365958a213e304e82af11dc8d786075b26b4d62b12f755eda038cba52a1abc9a79daf40c64826a0208907f2bd6e66ebb4dd4a5bc6ba5cfd5f045138bde6bc2b912f1bb4f8f01a2e7eef2e22713c6f8b1ffd3cb035fe00a0a8ed3ce07919d295925a8539d7489e9dbe11af563a85f1a4b6712a4322b2c4233d62c8cc7d97e89bcbd5039c068e2bc8fe09e060ffaf78f0124d05131d41ddd46c01a7d8eb70179ab1711f0bceca2efb523ca713c38d9a5d688632dfba63e1322f57549000d9a6e18d5bc0c65c62623f2ce93050083b89b4cad077dd904a3247fc379dd30aa19e18e9186f16291e74ff67a55f3e71f8a10ff1140bd08c4b43f88f4fc8c1bf1e7b7679432eaa2795a0b663ec20971ffbe16202cecbd0a45c8d5ccefb4630105de169defb9af609986aaac12aeaad2d02668c8aa7fe92ad6e5dcdb33464fdbfd1b35010ae7329c9423f1bb984b81e2680cd4f52bba4bd9e6559bfc667649929bbdd217ff9fd1f253d12f4bdfb9648061a8018d9edc9b06f664b41867556b7f7990f307a6fb62f390be381b505f08f5e26d8f4f571e7db8559e253ae6a1c3f6b958da1d13219f26c2869eefdb3422ecb9e4e757217a371cdcff2bca180a3f1b87f97bc2f05d48dc10c9a34804ba2e2aff692c3e60949e3097a4b5e3deeda819b1850d2223458e9564289ce80a236e3a09575aebece2a78d4d6d2a62c54fce59e86a128fe78f34cde3c8198b9082f1d42ee83d03462c2d6df10f197a63d4092eb1bcb7a5095a4aad88c2b42cde4f5d4d0f231afc69597cb5e8b6e9a733cd75acc4309545137aac8f60351f2cd43257b2b0b58dcaf1ce4f5e67dfde7c83cf081901de690a4f835d5ebdeb3ec5ed833e2018a218f9ccd6cbe3e9a8becf83ab5e8f9b1e437a6893e8ff896167bda9e6804265e74b41dc4bb8ce996094286063eae660a426a141136e0dbaf885142cc9c9d6bcb209d9f1df25ff06cd902cc3a93bb389e33d0dff7518aba5c6db0de40e6de77ba145e3d5948f730853fc7a74908108a98826e98f9a54071253349581e4fda311408732f2757662b3426f5c0288b1263b820271fddc9f94303c234d2c378c06338e419bf3148bdb0cf7ea0f00d982fe6f9c0013c05291f4931501e80d68d58ce74d0964ad86344f51ac4277a5bb7f0867f0b1ab825abc0e9c37ad64fd27b59436d42fa685d1837043a0be1328614e499a671c21fddc70c8b872461c3e8d4107d818fe95f70c8ea32692b72d79518544ff2f4008b27c37646a9455d07e2d7e2fb603e6edfa51bdbee4653d9a03f8c27d5d9be955280fe74cf28a1b2d74e24652f3349a515c8ced556255f5ec8a765c64948ec90879c2d178d0351870e627299d5c8a70dce99a7c0f0f5ade4262508de6786ea9ecdf37882032406e4dda7c85647538d87d080d53a9a6388e1b3644dab7fbeb5d9a53929b39e951324a9025756a0a22d924ec34f87b935b073b586c531300af5031f83bf19ca4b03fefc92e0482679bdb61a85e83289848f8dfd6b6818612f46f2da93c1c9977ed954d9a14f58960c1db9e8e2ae80a7cc79972b4cb809dff49641736ba9f67385d2b4e951a367c31d86b634d2a4962d7d2eca9f147bbf2c48fbd08ef42ba1666dbbf957cd79e9567192baa612f311f1a543b899ef3da425f4b48fa68a6e01ef4039212cd5bab7232eb65da24776d4e2cd0069ffc7cfb47315c3fead5baebaa40a01ae370c9977507ad8795df44a6ba218e059b1b45b6c4bc9f05d86fd19a057177178829e392f3cec4b0853797062180c769ceb1c463e6089cda1a90771a0da22c4cbae5001b976905c54f797992a206797ef5f3ccd9fe4e482fd99904df9e426f68ec4ac553ceb5469226c687affaefa12ab4804b36ad0b8d856afbfc66967cccde79c4d35993c7992762a2209fcfdce74997d54b3a300c6332d97a2dbe19479f15c6aa40d2b42b40e4572bc295ac5e236c2c281718a51831eb2bb6df1edd77d9bbfa11c6d4a340cef46a8e24910bc3a8526451fce0058519c5ae051e3dce56c8b838b0538711178ff2cecceb1723beb316bb731ba445da4f0c62b7944026c172ed442d3d84d45f30f137f6645d123df8cd9434f60e96a548b53a1116a9104e775f83c999746dc7a38dff2a2d907e6bae111b80eb61f08fb719d8941fe3f8ac9cf4deb0f717561ba3ee37a67dcd7d629718d7304165af26320e3e114bf162d81fe9641d1c6a3589be2419741613eff821b1cb3dd8accc3d5e32715e4fa8e23b5dee043006aface6e40b8e784ea60cce0ae815be9e8a557e25337af53d5988200e31dabd4ab64553e6871e0d73a952744fdb6d32fe54d2637c72dc931d5e3a5c9e13365a2c9a8041f393938a3907b72670b991b0934de697b0fb9ea6aabd09f858f5ec78468641c761b754d8ed28ba95f03b6d0331f1865a7ba629896b525080ea01abd5a998d51e45b25a8d00f618f8ae1bde8ce93049631d38e179b07ac3edfc8e4a6bd28b75b0d1f217694335c4648a00fe76a4dbd4b8109ef5a60a4b8582fdc0df762c5e94dbf5923d50026e10c8b33cf05bac3e48b25a8dc3f192280e1d7d7a89a0c7b66c5daec8ed83b70613f1ddbb05a9d4e027d48f9794ea0e1b846610a9daafd0cb7a90ede46a08647129a9a52c9fc993ecb848c1fe9b05925c48381bc5cd15d936f35a4474adf488e060019e0424a69649048e83bf2123ed11ecc1dd3b253286cc0a19f5a2386443174edb8752938291daa50ec75e8e90f0d0848404ea7d640926157fbe129dbe457999f042f0cb38b37792a4f93a328296066f5aaab7e5aed5e51cc73fd3d2eb1f17b074ed162ac3ed4fb00709716839acde6ef1b3a82da5608c71185888c6050abc3e6b4061df474cd8108f767ff735a7118c8c1dc2b151feb6f364abde6ae0be2d0a3899b833fa1a7138e3e85849d290282f83b5f7692ee0809e78a49284274ea56506eb11ae7fae5e5cb512e8da032cc7548a5161849e1e41a8ca628ec1c17b8d8633782b2ac611c05b32aac67889ec5c1dc59d83dc96e0ea075b36f8a519d20fbee050f2f50e7a895c26688285f9e5eab87feb03214111cbd2c3b39c343737dc0a0d72a979fdde520a694b6601880d2552abca8c8399323ec1891955d6dd36fc9f8f6c19a81cef5ea53ab33908db18ce9aa7211cae16eff9cb782b1847a62ce87bbe3617e9e302a84898391b67ef4a59744e872371565e6e91a49a9dfba2406304deaa4458c0f346232113f62f71c313b497612cda26cd8d9f7147ca57e55e61a67dc78ac5e34285106e0bd568d6320eaef53a458ddd93f0907e9642e54ac9a820dd9f9484525f29e4bcb0860b35a211936295367d810a240f2da729521d39f02cdf8b4fd7297af3fab8695735cb0d000f84f357a15624a59c50c4e8167af8fc25d0028edf89d5299d62e9faea3741e12d3c5ad992bdc5e7e60aef55063dfff9dc953af0adf52238a0615b47874352bc431ab64c5849c959e3f74db66f66f936cef7d869551685ea868288b55a693a7f34ba54392e8252e3b9e9ae612d90bb78d039ab46c3445ff4874f384d3c35b718a959fa5b4a70b00dc13e3b7280aa079835fba11ba50330037d5803292eeb72c5e709c828a962e708c5e233b1b475eb5c03f7882c658e9e5f3199ac7a4ceeeccebc5134ad389bc85f4c5042dec087eee3839b0c64087b2d43f799effe7b9128389ad486cc3ae4ded0413c44778c16f1e17dd3c3757dc95a1bb485ac9f5ff92fc67c49a13ca0d6df6d57a697d338f3f91739a93c2752bbc85d8984a80ebba6a3277fdac86cbdbf0a74a242f46d2239dda6e8194d0959411c219cf9f3c959320554832df6bf8fcb37ca0202f01c0903d0d9efbc45e112690a248b8ebdc6405bc217fc6c7bb40036018d46bd7b2dce2d79f96085ac4a48a90caf09216c345a137b73f7bb3ccd87d40f31b83aec6c847312c2261c02745929c3ba760da53dfa8dcf5a44ff8724b4d741f18d97adda0764e711545422714498c18c43791c3c8dcd4385042513364255876ad85db2f42079d7678df2691e903b4411f8866ca9cd0be162320bbf7dbb66e9bee89237eaa0bcf52d164519de8d2d2b02f1553374e84f2aa679de009e9c4b57f98dfb4f0484bd5bd54344d3671fe35cf0dc637bffaa6a02a80d74eeca05e5ab58dc1fc68d59844fc4051e6f4dbe1de9ee3053c800a2c54b70097d4fca8b63662b4f442345e7922331330e7ccee809bf31836c5a26e81603e05de314e637370fa6745076d4413858e7e8fefb5a3ed6609ef02fb76565100ea635bb5f3f080e90f3baf8767272590c570932ace9c3aa0cb093138173b0d72f55dcdd695bbd2382a6b2c3c414a3f4c39e511c69dc3b3ac2c874154c084341e41ccba98d51f3977c7a76f1da49cd484513beb06bd77ba1490eb911abee29d89181c1884eb38e4148065034f8ec53d5a4165dd3266581ec6a6717ebbc65d61381dc36df6dc3417535f1e42506e8e9d4ac2e9d010b652c3aab899339769cf2708c182778f10b03e842a8401e413c87984e864419d8f7453229a3f2cb1e421f82bcea988ceba9319ded2a2b75ca541793a6c843ccf2cc94e57e1ab0fbe3833f1659a07ad44b1da5c87616d71a3f9219e22e3d899a0b67a2ff94992b1d5e317ae460d8c2b16ab819484a02e0e49cd99e42b6f6c082c4b88024302decadc2d0a477ad908500f13bb5fa740fb383308b7780b11f1121be7cc5c7480d357089046f660cbf0acdd169133cc80985ef421b35bd3b44a177f3d6fb0047859ce226345d48bc3dcffb7df3ab8bd30149a57e2f613b9ab79dc3fca8dc51fcbe14f571f37a232fe916e4f7db3dc2ddf8fec4c5c3cabd24d6305951b25c0201786a016293b52c5ab053b1384dbbb3a583e6452d9615cad8190a9096824747fa3b2facc80e4769fa80910397945e2ff1123529b6bffe14afd32fb26b79d65ca0df805fe9b3a4423920a7436a8f17ebdf0b1600ff68409bec9ce44d3c6a0101b85279521aeafd1c8b3bb17864104d4d5770b8f2aab7b6caa866f631fe29d602377b55a9e53e9eeab2c0740f4c4f1ce64f7f7210f3a962c7a8e19f01cfda44742cf77b0da918a17a610f022507f5b3d46ebd5dab44ca3cc74df4be0627103f73dbb8383d55a72b446470ff01b7fbe48cf3017e1254988d6aa0c66f7be4419db83b6614cb192e0791917694061eb9cb5ff8af81d80914e83dc181067fc13215ff8b520d4bcd0905afdaf080beab454ad87d786a444a2fdcfa401861bf88b3ef04c25e949134576ea74b9aa1584325c38f4d4a6f27991be4eb805853b8691880c89608fef18f8cd280f1e6b39d75acee0c4d85058747d2875070d721b2a997cac27472458c9cf2d9cdb31315d5593f5343aaf870ba8ea2824ba3cf54896fa94376f14a3cd734ca3973b441f2e2db30c7c42d63f01ffefdd245b2f68c67dce1349b01ff7a559333bfbb6822b6ea1f75a2bb8b0312bb9fc3fbcfb7eba90d8caaf5486d99dabcddbfaf9c9f10a629bf41588a75bc9dd517f4eae23b24f2c4ba372014b9e0af40e3f9103bfa25c761b7993b12c8eeea445690afb9b0a2985282e381136d2d200bdc797bf4fdcb4ed7e8d56fdd081142506603c640f47b687394a645915d195a9178a87899380f14dfb2343ec3060c0413c19692095fe95d9d012077c04e62", 0x1000}, {&(0x7f0000001ec0)="133e13d4963c4b93a6db5ec194cdc4b55a4af75722400450d1aff0", 0x1b}], 0x2, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x2a0}}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x81, 0x8000, "be06bff261ebcd270d03ed5c18376f884057a5565a754bc5db668238c59dc248a53939e0d32c5f7fe02f428b364c1630fb4baeddb8781b343726fad1b8896c", 0xe}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002280)="7500201809e5075568f35fa766", 0xd}, {&(0x7f00000022c0)="a0c36cf964a9be25ba014b8c8fb88fa818c8b1b777f4b22f0439e10b9d589a261c381df0c68a18d9e5bfacf11d6fbbeec4c8bee37271ab7b8b28f2d7db0861", 0x3f}, {&(0x7f0000002300)="dd8bf1f13079aa801bade1267de488b84a4e7121c41fa39356723611ea2a8946ac26e4a4198967ee49e2d3fb496de4e5a3328f44a748fdec3757f77cf0fdb2e7fed88b2b2859a9329610564aeb949a8e8ed1fb380c387e657bd5a66650ae3600d361290e67fea6fe6849a4f65c1f8d3c6da653bf7c19fa6fd6e9f8b1b6ceba2fe304db0cf5d7f92715c99714f784caa38c445da717ce22bd36331f323641802b222c4ad67fa953ec77adf13808517f6bc4ad75d0361118fc13474a9203157f94702e998dbcb1", 0xc6}], 0x3, &(0x7f0000002440)=[{0x10, 0x104, 0x8000}, {0xf0, 0x11f, 0x143f2c8e, "db3f4f072c17fb4e680f4faa55c64b7cb0e101018119e6bd986719e01e9abde7e82ff1ec1fa021fc824634f5538656c57555d92a87e43418f25f392434e4d8b138be9f462b42ad85648e992d498dd999ec2b65b304bdb7d92d3c46982dc23cb02301d1c73aae85f563233f366e52336f19c5669f178aa0f915868d41264930ab8e05ddacf86c315fb1f078497731155ad0cfe0b6a3c62856eee341cc06fa90feb7cc2263a35c1e21816678e3107eb17bad9e85fbe763f174d776608030d3c7d75a3c2d14dfc9ad41a20f0300c6076ad27c8a7a7d34d7f5047a"}, {0xc8, 0x6, 0x9000000000000000, "d9e56108b20719f707124d59bdd7f0d19f3a3bf7c0aa5d3c2e1445585e8b698c3a7ac7169d5d2da5295409ad9165ac053249827b669b913277623b4b9cc8ebe608d682d91c3fcdd8235e3b8054e2949baa445b22470fd6ed84fc9f1f762dcccedcb7e86ef9fefc91bf5a0111ce29842a5e04276d3156ac09e83851a158cf9dd75f7f48e0cb05174efab3f5038daef3c3f8b3580511110466b352daebb967368863372d335087bd9f2b51d27657b4ea82c682d320a893c4"}, {0xd8, 0x10e, 0xdc8, "158e46dabebc03ad78fc90574e8cfc0550b791bdc2cea4193f097e99bd081fe156f0ac1cc6d0de0ac8abbb653c7cde70aba9ecb3fa5de694a73f23de3af94dd164da64e19225264f21559ca7ecacb1de881d7b9e2def8cddf1e6013598e86e5cf92df4c98f736f94717b8ad63f0ce4cdb38d4b4f66ae7ad474723fda7c3b44617f8faee524368ce2d0bccb6279a2ba2e14a74e6c7aa2455675afdcdc949dc132da20045dbaf05223dd72d36cfbe7159cce806bef2ba09b33dc501e30b1415a538f7c8101"}, {0x58, 0x84, 0x1f, "3ce048e5e536e9b79bde337e9a126419afdb4c450658ec091750409392be6c984f209289acf18303020b34f7fb16c4740738af42c00d016c7d012763b663e116c5f151d5de"}], 0x2f8}}], 0x3, 0x8001) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) times(&(0x7f0000000200)) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x0, 0x40c0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f00000000c0)={0x8}, 0x8) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)={0x40000000000, 0x6, 0x5, 0x0, 0x0, [{r1, 0x0, 0x4}, {r0, 0x0, 0x2}, {r2, 0x0, 0x8}, {r2, 0x0, 0x8}, {r1, 0x0, 0x7}]}) write$nbd(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="67446640fe30ba7b534e3e0003000000265a6f01a319"], 0x16) ioctl$TCSBRKP(r0, 0x5425, 0x100) r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x500000, 0xaeafdca219c87247) ioctl$LOOP_CLR_FD(r3, 0x4c01) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3ba3, 0x121000) write$UHID_INPUT2(r4, &(0x7f0000000140)={0xc, 0xa4, "a82ba16439de706712b4ee31849d1f2fd438819e8df5e96a1492e1e9482e040bf63bebf59414f90c28cf29e4e0aa77b94d3c48f7b68f581baa9b4c01fbc764186c47a768006e8802aa1e672c6df2b2d246f8edbd604b5eed9a7cd4ba30ba79450b1643075ef0794f9d94d03685a8c07d5840e4150f87ddfd3c518cbfa1ed665e5ea1371639861e7858b4e68feb23f80c9b90190b0ea2159525377a64b4f8e7d443818b86"}, 0xaa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff030000000000, @loopback}, 0x1c) 00:38:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xc, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getgid() mkdir(&(0x7f0000000380)='./file0\x00', 0x0) clone(0x8000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)={[{@metacopy_off='metacopy=off'}, {@index_off='index=off'}], [{@uid_lt={'uid<'}}]}) 00:38:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000099ca1228bd11000000010000ad10000000000000950000e6ffffff0077d0e81352d1914f494dac6dc71d70cf9208c7307e869920f54cc17e9dbd7ef18811fb1dd70c08c078dae62f21745b1d2f0fecae2a64f37639e3edfd9330aa"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) semget$private(0x0, 0x4, 0xf33c5a44d963e1f8) [ 453.703222][T28305] overlayfs: unrecognized mount option "uid<00000000000000000000" or missing value [ 453.706343][T28307] overlayfs: unrecognized mount option "uid<00000000000000000000" or missing value 00:38:07 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x202, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'bridge_slave_1\x00', 0x1}, 0x18) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000240)={{0x6, 0x7fffffff, 0x9, 0x8001, 0x20}, 0x4}) prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x180000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd(r0, &(0x7f0000000740)={0x6}, 0x8) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000000c0)={0x2294a98528e2381b, 0x102, 0x4, {0x9acd, 0xffff, 0x80000000, 0x5}}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x78) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100)=0x6, 0x67) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000006c0)={{0x8001, 0x8000, 0xfffffffffffffffb, 0x81, 0xfffffffffffff6c6, 0xcaf2}}) r1 = getpid() setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000280)=0xb717, 0x4) write$P9_RRENAME(r0, &(0x7f0000000700)={0x7, 0x15, 0x1}, 0x7) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000300)='bridge_slave_1\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='nat\x00', &(0x7f00000003c0)='/dev/sequencer\x00', &(0x7f0000000400)='bridge_slave_1\x00', &(0x7f0000000440)='/dev/sequencer\x00'], &(0x7f0000000680)=[&(0x7f00000004c0)='cpuset\x00', &(0x7f0000000500)='/dev/sequencer\x00', &(0x7f0000000540)='posix_acl_access\x00', &(0x7f0000000580)='bridge_slave_1\x00', &(0x7f00000005c0)='posix_acl_access{\x00', &(0x7f0000000600)='bridge_slave_1\x00', &(0x7f0000000640)='bridge_slave_1\x00']) kcmp(r1, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 00:38:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff070000000000, @loopback}, 0x1c) 00:38:07 executing program 0: r0 = socket(0x400000000010, 0x5, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="2b706964732018522cd8ed1238f244f15457b87b0879450934f20800000000000000710497eadec71dcbf9c4599869c8"], 0x6) read(r2, 0x0, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c1e0309008002a000", 0x33a) 00:38:07 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{}, {0x0, 0x3}}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0xc000) sendmsg(r1, &(0x7f0000001400)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x3, 0x0, {0xa, 0x4e21, 0xfffffffffffffffb, @local, 0x1}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000180)="e9373dc1121c80d0a925b9bddfdefc1ba99c56df2844c9cfff07", 0x1a}, {&(0x7f00000001c0)="076d1a39d2d9be932fc1bcbc54f151ce2cbd06a8e6b9509f7c48b77f566a2c75175953aadff5aada61345e6068e000ff0b14e58010ba01df89f470db92170daf4807fb57d8d489419fc905a32bf583d6b0620dce2df7ee23adbcfa5b8c2f554c5a65a757cda206796a6405a93368310b25f2fe1ced99d47b5fd95e36d399f9bdbc939fd6b8094bd6c6ded4be034daf7185249c5626302b1bb8dc133059e2b98b713e24095a23d2f9f1a891df957a9d574f36097f5da07b1171fb39e59231ff4980110494216549a3b90c292dcfd5fa4ccf2de9b6348cac4885af919f", 0xdc}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="25ab1446deb09ff28155543bc18c88e2c4b2c97ceae2f469e46f708f8d1c87a420223ef1d8901bb9a1c5322e74a73deee5f316848fcafc23c9e3edf93b5a034cc9bd93f1a54085509b71fd2342e0c7e144fe308711bc80ad1ff9c0894169cbbf161945c9b411c96e591e8eed7800a7314912", 0x72}, {&(0x7f0000001340)="c79bb56b9a8d704dc8bd0efaa303883ad1221c7d520cfad7f6b0f5e1de86813ae73227eeb0603288a0b18c", 0x2b}], 0x5}, 0x7cb6676895e429f7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001440)={0x0, 0x9}, &(0x7f0000001480)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000014c0)={r2, 0x60, "f21f07c71a653b4cfd40e636b5cb584a20490d518257af10747586743a72d6b189da81b531935070352bcf1e1febd60f9f32fc8337273491bc3e928d5f3503da1d18d79bff552149071dd1d41b08b466b437c65987264ae48c759c7476c62c67"}, &(0x7f0000001540)=0x68) 00:38:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000000000000000000006d0000000000"], 0xffffffffffffffff, 0x1a, 0x0, 0x2}, 0x20) 00:38:08 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_sco(r0, &(0x7f00000000c0)={0x1f, {0x100, 0x9, 0x5, 0x8461, 0xb83, 0x8001}}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6, 0xc000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) 00:38:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140)={0x0, 0x127d, 0x101, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x7fff}, 0x3) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000100)=0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xc1ae8da29b0157c, 0x0) sendmsg$can_raw(r2, &(0x7f0000000280)={&(0x7f0000000180), 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{0x3, 0x401, 0x1, 0x4}, 0x2e, 0x2, 0x0, 0x0, "aa39790ec31c1c1c2da0e512718d5a25de07dc376ee6020f9f55eca945e521c8e8d3e0ba1d8f474021b6f399e53e552393a491a0bddbf4178edc24cb32de7e36"}, 0x48}, 0x1, 0x0, 0x0, 0x4040040}, 0x20000000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x76, &(0x7f00000002c0)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f0000000080)=0x84) 00:38:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:08 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0xac000) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2a0000) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000080)) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000008c0)=0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000900)={0xffff, 0x0, 0x2, 0x7}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000940)={0xfffffffffffffffc, r2}) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x5) getxattr(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)=@random={'trusted.', 'eth1,*user\xa4cpuset\'em1\x00'}, &(0x7f0000000a00)=""/2, 0x2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000a40)={0x5000, 0x100000}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000ac0)={0x6, &(0x7f0000000a80)=[{0x100000000, 0x9, 0x8, 0x3}, {0x200, 0xf971, 0x58658b0, 0x5}, {0x1, 0x8, 0x4f077c3, 0x8}, {0x5, 0x2, 0x7, 0x2}, {0xfffffffffffffffb, 0x10001, 0x2, 0x1a444174}, {0x6, 0x80000000, 0x5, 0x5c}]}) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000b00)={@bcast, @null}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000c40)=0xe8) ioprio_get$uid(0x3, r4) bind$rxrpc(r1, &(0x7f0000000c80)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @loopback, 0x10000}}, 0x24) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000d80)={0xa0, 0x0, 0x6, {{0x4, 0x1, 0x1d, 0x101, 0x80000001, 0x1000, {0x4, 0xfffffffffffffff9, 0x641, 0x6, 0x5, 0x6132, 0x9, 0xa000000000000000, 0x0, 0x9, 0x8, r4, r5, 0x7, 0x8}}, {0x0, 0x8}}}, 0xa0) ioctl$int_out(r1, 0x5460, &(0x7f0000000e40)) sync_file_range(r1, 0x1809, 0xee, 0x4) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000e80)={0x5, 0x6}) clock_getres(0x1, &(0x7f0000000ec0)) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000f00)={0x2, 0x0, [{0x4, 0xef, 0x0, 0xfffffffffffff383, 0x7fff}, {0xfd8e57e8183337d1, 0xc78, 0x95a8, 0x8, 0x10b60000000}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000f40)={0x0, 0x7}, &(0x7f0000000f80)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000fc0)={r6, @in={{0x2, 0x4e24, @remote}}, [0x5c, 0x8, 0x7, 0x7, 0x5, 0x3ff, 0x8663, 0x3ff, 0x60b3, 0x9, 0x10000, 0x0, 0x131, 0x1, 0x100000000]}, &(0x7f00000010c0)=0x100) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000001100)='trusted.overlay.origin\x00', &(0x7f0000001140)='y\x00', 0x2, 0x1) bind$x25(r1, &(0x7f0000001180)={0x9, @remote={[], 0x2}}, 0x12) fcntl$getown(r1, 0x9) r7 = syz_genetlink_get_family_id$team(&(0x7f0000001200)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001780)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x200010}, 0xc, &(0x7f0000001740)={&(0x7f0000001240)={0x4d0, r7, 0x0, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x1f0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff1c}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x9c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8001, 0x3, 0x4, 0x7}, {0x200, 0x7f, 0x7, 0xcdf}, {0x3, 0x1a9, 0x1, 0x7fff}, {0x4e4b, 0x8729, 0x4, 0x5}, {0x100, 0x4, 0x7, 0x5}]}}}]}}, {{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}]}}, {{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x78, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}]}}, {{0x8, 0x1, r3}, {0xc4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}]}}]}, 0x4d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f00000017c0)) 00:38:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") lookup_dcookie(0x7, &(0x7f0000000000)=""/154, 0x9a) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000140)) 00:38:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff0f0000000000, @loopback}, 0x1c) 00:38:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x10, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:08 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000380)=@rc={0x1f, {0x0, 0xc6, 0x0, 0x1ff, 0x0, 0x1}, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000400)="b9f64c5201e59910a3a643a887de1d1f96f41aed62c9e28e5ef2bd5fd6a25ba16112998130ed9ced6e9eb398554e62e4ccf13fb40b32f7861f1593478ed651dee71f90a13a44886c822580913591389ed0a23d7b183061fd9ecf833369c94c81f4ed023d4df52bbf915e692de473bec4aa28b69b52afb5b1d4132c4c74022a0c1a9dad3da91a085b60b31f0224ba2c45700ac314cf5a1313bea36e09a215fa01e16e73229f78b483b17043d9d16d5f507f8cceb16b", 0xb5}, {&(0x7f00000004c0)="81ac3b0934142ab0c211281670e9ad920d04dd14003dc5df434e3358a38494b44854b5d5a829120be8aa4dbc4a268b13e5745c120038f29c159b48636adbd8b0bacbfb924c7f99ef2c614fab582dbb7d7dc472a2f3b1330401bbf113b71951e0b80ca6b1308a893c86c2610c9f340fda7c1c5208bec33dd8751b4353fa76f9b33076fda311a4ecf6b40376e775888a386b35251a248c13a36ba7c07e0799", 0x9e}, {&(0x7f0000000580)="985e07b0adeaed85608d607324cbf217a9dd2649ffee83fb58a2fa242238ad4a18d95e663433a22b1f43c7f92482e4b8b8263b04013e47676882937a960943c4b36283cda28b55b069fc635d93aa27d3ef8c98d5e9c26aabda7d46c803705aa168f3fa6f97ec257d5175667968a5c8c4db1b3daccdddc8d65653a40f6c4bc292b809290689ee8ee74adb4bce452c7bb88e9f247c8d8fe7d7be0121e3d74c1bc4a29ee7", 0xa3}, {&(0x7f0000000640)="8de25368cb7d8ed0f3459afd3f48b2d412577805ae3c756ee5b28a719f3b9f50c17ceef1d1003fc1415caf4469b187830204a6ed58c47998e6a9993220e6c8f7efd8aa8012357044cf1aaec9701432a66966b5e4ea55b6bd58f47ed0bba38d41cd99b7fac263a1aa", 0x68}, {&(0x7f00000006c0)="40e6e5cecd80e2a04def2a55b32ae5d409b4c8a5a04f9695d9d3e8c10fa74bfeb02eacc91800946bd44ff9f0aba2f94b00b41255e02666f809bdd803028b694445971406415cf8ede51493bf9149f65623f661226ab658ad17cb3cf4c202b90a95d86d2e5b974e34edc8152f1a7adbf028903fd6daf7658394fdbe18c7ab75b1ba2de332cf5f98aa5eaaa5e159eb1e26984239768e70554be1a199985bfe8b087c70540a44e71ab005d4f43e2c51a081a3325372639623808f7698ea087bea909f72dc017e9410af47955595f30a951184ed93c3926bad5163377e4f8c7e5b06ac3358d8650c8a", 0xe7}, {&(0x7f00000007c0)="ee0d21fe9b154115efad22d2cbb5603c1711333a1d6721c46dd79143898bcbb1dcb4826353779971706f0a534344acec243a30304637dcc778067d156bd9e8d449e2753f1d48a1c2d299c0cc030a534ad8832817d71f66254126f84bcd277611577b2ea624c74cf545fef4c6bc854e58395fb2a8f3d47d6cf550a5660ffba83ced75a10d1a9268fc0da1d187b691fbe6ed9813d333012c2c927e1d4260e8160f94c75b8c5ed83488d06f887fc9950ebb3e50082cdaabbe6d2bfce0394bd392a9a409f3fd667f02eb07412fc23990167f3d9a07f12dbcbf5000303a39ed77249ee2e3ac9a34f4b9a5fbcb8f", 0xeb}, {&(0x7f00000008c0)="fb16da8111ab983536007a22aa6a29ae73460fca6b5121f9ed5627c166485ff3ec8c79be016799995589c8c4bf794bd0649db286f7e6c58f065d64bd990d327a5ccbf09df5df1298e04af8f3710efa309c7166bd20daca7958c2906ff555c0ebec1e458eb18feee7b8b5f479022682e7f5a80195dc1d95a7da0ab282f39203c7e9d9b301c3fe8d65ae31c3127fd6660a7578aeec89977dfd89461195a03cfbe8ce91fdfd1cec0bcbc115c525a165f38be0f4d6983a0d1f33b63e8273a4843a69a5ee139653c4d1a370498e11cc806daea9a17bcf9aff83fda1208f95b339e7639ecf9d670bac08fc57701a", 0xeb}, {&(0x7f00000009c0)="f626582cae5714e2e1564dfe26da28a0bc8275e3b6aa8f224bef229dd8cb2b28103c96a0f7336c30d230776f76089300b60a4f0cdf6bc9f6599d6942616ca881f865c7e0caa610a2e83dcba8fc2c5be3fada46fc87ba01e2776401e35fe251a9bd7a0fb161e4a78bf19786730e8b5e1e605d681ac0f33b7be076acb19bf6", 0x7e}, {&(0x7f0000000a40)="cfd7da2c668c4da52ffca863164ccddbe2240dba34d0f984b76c48e143c67c1dce78c58d3564177527d61ea1ce66c31a13f69ab2df1dd0cf59c4014c8fab0b16e4bd1873723c3a35ac8d94ae85f2a47046d5b877ffaf112c8559f7657bbe72abb07bfc6a413d778c1d99b54882d78906bc06e3002d", 0x75}, {&(0x7f0000000ac0)="006a977035fcc2348f9f8c443f74263f71f86411ebeb8f0ff10c45c5c22a47e30e83df7d441c8888d39109aa1136eefa8077f20d604af4bd1ef8d4f1006047db919ea26c5742ded348b4f416d26830755c887084902ee1120fe4047ad2973e5ea78dcbd93665495a1e7829e0345436d6300afdaeef482f95b890ea33729040c127970095b9f588cdd3a477e52c445c74cecdd472023edb73615b50992dcd26e6fab8c56d2390979e407fd693b11b96888a15d0057b51f8f77a9a6963831477af5672ce1112dc61f4b7845c57d3b9e74a271c5570", 0xd4}], 0xa, &(0x7f0000000c80)=[{0x38, 0x29, 0x9, "ee62820db1ab748b66efd64e541c45b9078f0b7a580dc23994892efe2d40cbdd3a"}, {0x48, 0x119, 0x6, "b5cf8ac5f58a5d467c2d1172f7ab02209d89602b80f10186bd8ab251de1af0e5e3deffcf497b994d055222c857f22ec2a4a0fed6"}, {0xc8, 0x107, 0x7, "a367c074a48c00e4457db12e381f9029417218525c227f702ccdcca3d45c0f24086a3c925c8fb47994aba6b3a602d722cbcf012ed37056a025f8cee2c8da17596c2c59871ea0a2627138970e0928baac931de083e3af229efade112e401b8437413b4226f7aacfb663b1a3b5f1c8068a71e43d0790959392fa8a6e74b357250e72062bfb4d0b0f050e35c9805a70313dbe5cd2454f934f995ef6d8b84cecc25a3ccedd2e693372a85a1e97c599597f8757af73a90b1e4da0"}, {0xa0, 0x10e, 0x6, "b15917646344b6f2b359f02b2f8b73518916e794ed5a944f4f5e930bd81c88db681b9310c69a612c7f9535437d56c124efa95de28e11fccfd490b280119473076e2b2ce5dd7663252b201388db62e674a94ac1a21d19d4e4af14226434e1c4b9e1ff5c91d048bee12431dd8ebfeb1e1514b0015586d69787178b24f8c38b5ff55cd9ac400a5e51219cebdb4212ced578"}, {0x20, 0x10b, 0x4, "db03654b078df54812f6564bdf98fa83"}], 0x208}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f0000001ec0)="133e13d4963c4b93a6db5ec194cdc4b55a4af75722400450d1aff0", 0x1b}], 0x2, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x2a0}}, {{&(0x7f0000002200)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x81, 0x8000, "be06bff261ebcd270d03ed5c18376f884057a5565a754bc5db668238c59dc248a53939e0d32c5f7fe02f428b364c1630fb4baeddb8781b343726fad1b8896c", 0xe}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002280)="7500201809e5075568f35fa766", 0xd}, {&(0x7f00000022c0)="a0c36cf964a9be25ba014b8c8fb88fa818c8b1b777f4b22f0439e10b9d589a261c381df0c68a18d9e5bfacf11d6fbbeec4c8bee37271ab7b8b28f2d7db0861", 0x3f}, {&(0x7f0000002300)="dd8bf1f13079aa801bade1267de488b84a4e7121c41fa39356723611ea2a8946ac26e4a4198967ee49e2d3fb496de4e5a3328f44a748fdec3757f77cf0fdb2e7fed88b2b2859a9329610564aeb949a8e8ed1fb380c387e657bd5a66650ae3600d361290e67fea6fe6849a4f65c1f8d3c6da653bf7c19fa6fd6e9f8b1b6ceba2fe304db0cf5d7f92715c99714f784caa38c445da717ce22bd36331f323641802b222c4ad67fa953ec77adf13808517f6bc4ad75d0361118fc13474a9203157f94702e998dbcb1", 0xc6}], 0x3, &(0x7f0000002440)=[{0x10, 0x104, 0x8000}, {0xf0, 0x11f, 0x143f2c8e, "db3f4f072c17fb4e680f4faa55c64b7cb0e101018119e6bd986719e01e9abde7e82ff1ec1fa021fc824634f5538656c57555d92a87e43418f25f392434e4d8b138be9f462b42ad85648e992d498dd999ec2b65b304bdb7d92d3c46982dc23cb02301d1c73aae85f563233f366e52336f19c5669f178aa0f915868d41264930ab8e05ddacf86c315fb1f078497731155ad0cfe0b6a3c62856eee341cc06fa90feb7cc2263a35c1e21816678e3107eb17bad9e85fbe763f174d776608030d3c7d75a3c2d14dfc9ad41a20f0300c6076ad27c8a7a7d34d7f5047a"}, {0xc8, 0x6, 0x9000000000000000, "d9e56108b20719f707124d59bdd7f0d19f3a3bf7c0aa5d3c2e1445585e8b698c3a7ac7169d5d2da5295409ad9165ac053249827b669b913277623b4b9cc8ebe608d682d91c3fcdd8235e3b8054e2949baa445b22470fd6ed84fc9f1f762dcccedcb7e86ef9fefc91bf5a0111ce29842a5e04276d3156ac09e83851a158cf9dd75f7f48e0cb05174efab3f5038daef3c3f8b3580511110466b352daebb967368863372d335087bd9f2b51d27657b4ea82c682d320a893c4"}, {0xd8, 0x10e, 0xdc8, "158e46dabebc03ad78fc90574e8cfc0550b791bdc2cea4193f097e99bd081fe156f0ac1cc6d0de0ac8abbb653c7cde70aba9ecb3fa5de694a73f23de3af94dd164da64e19225264f21559ca7ecacb1de881d7b9e2def8cddf1e6013598e86e5cf92df4c98f736f94717b8ad63f0ce4cdb38d4b4f66ae7ad474723fda7c3b44617f8faee524368ce2d0bccb6279a2ba2e14a74e6c7aa2455675afdcdc949dc132da20045dbaf05223dd72d36cfbe7159cce806bef2ba09b33dc501e30b1415a538f7c8101"}, {0x58, 0x84, 0x1f, "3ce048e5e536e9b79bde337e9a126419afdb4c450658ec091750409392be6c984f209289acf18303020b34f7fb16c4740738af42c00d016c7d012763b663e116c5f151d5de"}], 0x2f8}}], 0x3, 0x8001) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) times(&(0x7f0000000200)) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x0, 0x40c0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f00000000c0)={0x8}, 0x8) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)={0x40000000000, 0x6, 0x5, 0x0, 0x0, [{r1, 0x0, 0x4}, {r0, 0x0, 0x2}, {r2, 0x0, 0x8}, {r2, 0x0, 0x8}, {r1, 0x0, 0x7}]}) write$nbd(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="67446640fe30ba7b534e3e0003000000265a6f01a319"], 0x16) ioctl$TCSBRKP(r0, 0x5425, 0x100) r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x500000, 0xaeafdca219c87247) ioctl$LOOP_CLR_FD(r3, 0x4c01) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3ba3, 0x121000) write$UHID_INPUT2(r4, &(0x7f0000000140)={0xc, 0xa4, "a82ba16439de706712b4ee31849d1f2fd438819e8df5e96a1492e1e9482e040bf63bebf59414f90c28cf29e4e0aa77b94d3c48f7b68f581baa9b4c01fbc764186c47a768006e8802aa1e672c6df2b2d246f8edbd604b5eed9a7cd4ba30ba79450b1643075ef0794f9d94d03685a8c07d5840e4150f87ddfd3c518cbfa1ed665e5ea1371639861e7858b4e68feb23f80c9b90190b0ea2159525377a64b4f8e7d443818b86"}, 0xaa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x401, 0x10c00000000000}]}, 0xc, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d6f0bcf6c7bf070") sendmmsg$inet(r0, &(0x7f0000003e80)=[{{&(0x7f0000001280)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000003680)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x18}}, {{&(0x7f0000003700)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r1 = shmget(0x2, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) 00:38:08 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50dde0bcfe47bf070") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x200000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, &(0x7f0000000100)=0x80, 0xcc617913ca85c909) socket(0x400020000000010, 0x803, 0x0) write(r0, &(0x7f0000000300)="1f00000013000d0000070404390300000007005a717bb62645de2b9ab472f6ac0ca8d8274a9ee0f90f3871e6ff3342d7fa1776d7fb1f1b40b5da39812e684b32456698f9d0090eab9054aaca539bdb10a47808b068872e13c81772dbcd83d0e3b7c063c47833423fc81f2b0d80cf708588c283ef3d131df30de0fc6788f0c220e27a0b2afc3035da13e1b14407311435218dcdbda5dd2ec30cff30ba97cccca43becf90a5cf8be33ae17183a757e3d8d2f4d45a807708c11d52782a083c731c271948b9cf74af0e0d614fcf07a0d3387d53f2a2998f93d1197a4f85487934aa9a07ecf78f584de101fce129a14547e7f21b2eaaa7013da0a0f44d6cac720e7297e9bb38997a600322ae5", 0xfffffee7) 00:38:08 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xc0000000000000) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 00:38:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff1f0000000000, @loopback}, 0x1c) 00:38:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x11, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:08 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x8, @pix={0x0, 0x0, 0x20363159}}) 00:38:08 executing program 4: r0 = open(&(0x7f0000000280)='./bus\x00', 0x40, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2812, r0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x3, 0x4, 0x4, {0x8, @sdr={0x34324142, 0xfff}}}) 00:38:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x12, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:08 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vsock\x00', 0x1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000480)=""/206) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x40000) r4 = getpgrp(0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000180)={{0x8, 0x0, 0x2, 0xe3, 'syz0\x00', 0x7}, 0x3, 0x4, 0x1ff, r4, 0x2, 0x1, 'syz1\x00', &(0x7f0000000140)=['\x00', '\x00'], 0x2, [], [0x3, 0x0, 0xfffffffffffffffa, 0x100]}) 00:38:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(r0, r0, 0x80000) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1f, 0x5}, 0xf) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/237) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'bridge_slave_0\x00', 0x200}) prctl$PR_SET_SECUREBITS(0x1c, 0x100010025) 00:38:08 executing program 4: syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) [ 454.899053][T28427] Unknown ioctl -2130675966 00:38:09 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffdea) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000003c0)=""/4096) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x1d, 0x4) sendmsg$nl_netfilter(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0xf0, 0xa, 0x3, 0x200, 0x70bd29, 0x25dfdbfd, {0x1, 0x0, 0x9}, [@generic="cfd3b99cf24782ab9c1e9d74e4a6f644f2e0daa91396a8945098f51e7d7a7eb4a90e3addb842132172e6d588ff21ab0f593ba33571405b91d4526363a2ff520c93ca0ed0c99b1152994a55aab051444d8b332e0049ac40d6c55539e54276eb903308589f07636ebc7f38d6a919a84c9e469e9049f24a0b08ca21527ba3d6fffeef0f304a6c194a96063c9ebac6a628f4e85a45df95a17acf9158a6e1f9eeda9666f7bb54154c039ce9c8d49c0c1c887497a11b33730129e7f885e4354e2d12294070b24c9ffba71897f9089853fae03d091229914b5804b96108"]}, 0xf0}, 0x1, 0x0, 0x0, 0x4}, 0x80) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x13, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="aea562fd85f626d327837836a98c0eb5b09d36f4fea6fbadfb98e44e2ae52f735ce1d711b013e7aa37f36da689f97122e9a7ee11", 0x34, 0xfffffffffffffff9) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)="dbd4bb6cb77f27995ce814473b3a9ffdac2db602fb5a307168fce9e2ad4e8dd9f0216451490d0632a28c5ad2236a9f406c1d82b6f6f0cb08065eced3f03c3cc3aa8d0f9919a62f1a5b05898a66d8b8cb70091c7f3b07aa1d3726fdb1a09b4a5c165b68cfdbf4e7", 0x67, r1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x2, "245dd8f3c078a80c"}) 00:38:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff3f0000000000, @loopback}, 0x1c) 00:38:09 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:09 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$KDDISABIO(r3, 0x4b37) r4 = dup2(r2, r1) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0xfff, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x80000001, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ftruncate(r0, 0x0) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x14, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 455.467074][T28445] bond0: (slave bond_slave_1): Releasing backup interface 00:38:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffff7f0000000000, @loopback}, 0x1c) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x15, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @volatile={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0x50e, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}}}, 0x88) 00:38:09 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@expire={0x104, 0x18, 0x2b3a43f7235d2781, 0x0, 0x0, {{{@in=@multicast2, @in6=@mcast1}, {@in6=@mcast2}, @in6=@mcast2}}, [@mark={0xc}]}, 0x104}}, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f00000021c0)='/dev/audio#\x00', 0x8001, 0x840) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000002300), &(0x7f0000002340)=0x4) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) writev(r4, &(0x7f0000002280)=[{&(0x7f0000000140)="6c8b4262b9867b14be93551fbb041c7960a85c4465671032eb0546dc3c1c2ce8e2942386c5a78c905f4eea9be7cb9d5cb806899a5cfc48dd23dd78699a62e9094984132486b40ebbbc087f6166ef666a63b46d7b5eba905c1bdefa53912fa2e32a5a1f0b3f76db9f0d90565530bf1a80f669f531644981d14a8495402d612cfb651a38956ef32a8ca11d96eeabd948cecea2e7b47d28766d97358c4295a11d3a254e33b78a08e52b5be59e0ba8efeed7c39f39b79082bad76e2d67f8e58126d971ad56d40e51cecf65476205d17b11718dc8d29b00f191a0b71c3d6737ab4e5e29d900e6de4071328ff9871037cc188ed1fac09d7b77b9689bd706f46ff012a03370cd6042755d476ff0435054cfaaf52326b0b2244bd29182d7dfa61da8c12acd91f138add5844eec1303c179d89f6846e55703a286ee001d4fedfee886791a2b91bf7d1eda3dd3ac5a88fad375c3907ef7b04d5035c5273b665145a36313c964278b27a66d6e09c1265e4b1d006e7cd89d79782b5534e43432c84516f7d95fd7b6a5ec1b877c0c26d6ad24bd3bc39b71bb2082b3fe0e96d82632672464faa2e8ba842043d9731fb3e94362145adb331d4f45c5aef32cbde6d2e3df8a16813e1d18b73d3209df35555e1a3592217aa8c2e689c052a96ee76348be4452898640510996b85060875baff88b7bce0eef86ccee1134ed011b5d1dca28a9a77c93a5d61f164b8f28cfe6bc61b717fd981a17dd11a1a040cecaa420dcf336fa67b4c4899d8a800e9bd77b8d84986b1bfad07786f3271579f7d8c7b1f55d58d8bd60cf568472375f5c7424ff873073126bbe10045764a6656ce7f2ce0e01ae0612902f1bc1596ad3cb4984ba91850c49bfdc7371c16cf08eb79f5a0e07039b6749e85110fc243f20b8e594331ecdaf11b4539266615002e96464a0e99f404786a7440c1f84dfa737c2b9cb9f588898568acf5e575636e2dbd3358efead3dd591b63d068e3c5a853b8a93394e3c27139ea59677a713491c86b3db2abaeb9e4797bf1de0c2fb7bf7b37d351004fa376a1d9a5755e239bd14e1c6ce1f903c3b211cec4814d500a59b3cd22d7643bbd5d099955457440fd7a7cd49003e14245a9d9924728bc534e5b0f20f9d2feb83e1c4b10cd9428d5b388b71a03c8e98caecd0176a59f95187da0655ea2968c139059424f04c32c91721edaf19c510fb067ca064240cf280d1b7a71bc3b457e3125f567eb007b456cc747eb5a55ccb5c9a37a3b40aeaaa0463fa19c613068c6e11c97c7307b22f366700c6c50eb803e4211cb6358ace7f2325df6edc263710fa729913bd4937c304d0d22fdcfce9f431f09d2cfb6a533486e27edd4f49dcf7b55df85ad6003316a307b586da706fc76c16823d0a78046e2d4d0065a303c00201670f5b835a5a8e9be37d2ff5c2140e3737615bce183d400f665900ed55e68209d49f4f7cf81f66641bc5538f68901348269a60e71ad4726ffc4d09b1ad7f569c2e5aedbf13cd34714ef4385961f70177aac7344e374c2a4c241488ecf9fbeb862446bbdf06f126e762bbc70870484632e9e2ad11b8962251e063b1157fff8171b31e7a397e3cea042272f875e567d534d6485abe33759151e04c821a8c21ea50f406539e8482719e2c7873109edbb782cb6aa13ad4d608b3a89f5f223a32b88b14942f22f49ad2d688cc44dbc419061ffc21a0264e7953845e3aa5fb2680a385b7fce7ecd8ddc5f5f2d30d95efa4ebfeb9f860a4be524312c846d63ec004a2e63ac593f25e0a6bcf7e4fe9c908a3aaa142af9603c7677a137a8bb4f2af8db366bfcfb8e59d769597464934d423e3e43046aa3106b9feada2bfa001dd22a1de50703939057d927b86b918d3bd8cd839413a76f1acdcf39030ed46a8b68f71fcfbaf14e5cfa58c2f630a38f54fba198c28c14662a7281bc6268dfef89935e78b0108ba7b42660fda32288830fb15bd13a6cb50b89eab09011ee9d3640713145358159bf966977502ec8a6cbe23561bbab53dc51dbdf77ed3f97833cd5e39069cf188608f928606a020d5964e78e74a2ebf07b5f8542ee71ba48d2fe708901cfc187f529f502d02cf20f9ddf04b58f2dc3ebd5bb1f1d682e228ef0b99209b7b12fdc8356c6856ee89ab128e0ce4f7c4e8c303f0fb1ec0dd2e90aeed2c1001199e1c3b566de03b8b6c4ae5aa68b0dba4bfa304ecca2339d1fd771523997eb11a994228a0803239cfa2b558467b714cea0ef4d2ae44b10aebc0c9861fbcd77e8fd9a15196fa4c066b8f74ad1d3c6acb9da8335d0ae3fe0ce69c96bd0b264a353d2261c711c25ac68e80e2ebe08d60294830b29c69a19617d97fd77f3239de7a6b594200b90fcc6ce07b5013222dc6ff158cfd204aea31b3c2c226011358b81e42a1dffbf8a424ae1e6536b53f3b3ea6803986d435724728a958818387accd7869bce1de82ee769119eb3e1786a5cd706650d360d911d2c5bf53b06c7bf77d6d4243d14411f9357447210fa0631c38fc53fddd676970413f5fa2324a72b04717b04ffd583312efb993b4b75cf3c9f02908389b3edb7cbb5a8e10ca858ba68e317f2976a0ebd8a200ffc7ef4b22b888229c19523a89453f847de26afb2e853c76efd148b965a0a2bc75bb3f1870e9c47b28301c51e899c2b4807e0aff620febf87e04680216f08175a17de2e0f2e0492e1a6d680cf8187b5974313f83ecbeb0020898a0ecd56e1f29935f39ef53f0c6b6b4ad94b9f165ebc0fc106896bcd9bc37fc103b11061990bee326cd5ff76213d1ab6a63255d9fcc3f7544f234add97025328241405078d85703db8109b383c28a8c0f8831962099809237d5117c8eb9e1c3be666f5a40a848c7abde1d2b9f4d9827f7809662cff1b4474199426ec1563e9944863ef6fcf648df7f77c899eb9891456f57b2508841d6d43842e744fc590c2620b8eede2caabd29af09a775d7fe810ebde7d151dcae25e327b6fbe44353043499e188a7f29b2e0d28f5f908137c005eb3d539b4836180eb066a2c4580ebdd19456b72bec8d54d20cb64b46813ea8fb7220854cd3929537219930579709164c85c96098c2a514bfc298986fe5d0b9b10fc6b4e3187790bea5ce558ab2a6e569056ff2ab33e6c574f70be85d226a45ae02f6e46f40425765b79e3d885419850f40d3175e7b8665abf582fd3c20d03b955e41eaae2e78fb1d6da5bb44392fe2ee4cf104141628d79fbe34bf83e428dce6ec0dfb05a8cf36b0beeadf175e4be8f3a07f2783b867d0f197ef6d87ead68d6781f18bbb03d24a0a16002ff746763014e264dd9a0c7195ac2124fc88d116cbf5dfa8191ffb1f16911da1c859ef24440c4df02f9cb8751f646f3c81a181d40a60212014bf8e831fad03f7367a94f2a2d4f5c0b084ca43cf434a2635ef535aaf316b48347ee7a23645dea50ef5bf6446ab92ec2f32c6f3a281a6264b6be02932e7e1a971f4eccaecf2e6725b80b3ad3fa6d59b6d0eed443efc62975554270a59686aca7e7c475f2edd559702095be1f235f48328436767ac7f43e5ad5b8cf70b3bd5c192a8d6312db8bffdb1b92730f0b52f5d1f419011022110fcaaea40a49b2db788801a72d22898a637907d1fb7989dfaad2e5c9ea4bd791d84da45389b569f99d2c501707c5f3530cb3a3b2eed29a58b96069338895287b226ab58237f2f011d758e4fa3a47ac929724cb5646f3307ec36adcd2a8f9b915eff74724ec8a6c38447664c8bc3b9837e03537db6e5bd9eb8850f747ef31107947070c5341e1709ca60e5b918e7b112c7689a75a4f42d113cea2617399374c136792c6c759785228a10013d0db951e50d15e49fa1106c8c85fa33e11eafabbf723602ecb883a32ad42926a544f542ff53155bad62d4ebfdbf21e65b099c212b8390ed833804dd745679dffbd5fc9ece18843d3464a33380f5466a654deaf0e041585d9789d0f2007bd44027b930cfb7ff66876d91360d908dba33b40138471f948e94c2e75565ab94df0c7eaef61a65174b0d2e5ecd9a9762b1213097e61854b82e076b0b5a8287f77644250c33a6b03d7d6ad488065d6bf21189a4687b4438fdd8f620de41561f05e73c468c61305a7c2e06d2be27bc4732bbcb1ea46cc55172eb8b4e44345d3f9044301356c8fd2717c467c73b6433097ea80af23aae83d247c3f16b9c70f9fcb9560a212650249272fec31b90c9a3c322a9acb9b21d2db1119eb76663ab808dbc9ab9b2742e5cafa6a8b097df5b58a8eb84bdf0e914489d1598f4bf0802064745f390de0d3fd20fd092969cf78ea0705085bca6ff788e34f453e02d5da78b153a773b47203aedd752acd91144c987c79be8e32d6bf82d324f44caae77eaae786b0c268b132005acb6a687f0b4d98b5a2ecd2263d64b655e4ab4a69a1569f97069055a0771b59ed85269e72e9c0c0fa1e506b7d4461e54b7bcd857bb89132414e4723bfc769103ea709e5615e876ef50bc2443caeb39da4def46634f6e14b7562a07cd4b8b0391f61cad16aa2b7de9e8d596d7789ca950bf4db32c8b465a65507efce7aea6b577bd44847965dacf78d633571324a0c1e17391f77101d4479d280a98f6288d6ba0abb4750c7e5c214a3912cc0f38a58535f120277de4b5f6551319d14dc6d89a371005b01e99a3252343316c0ada6182011878fd0f1c247cb12a8061c2ca60415d9b5ad8e3913dba34111f6e5859f6dbea501d55898194f7f45bf0c28e2822bee78047aae23d8353d86d9a51572017444b993d9429bff5824de1d40eb8f86065197de287e91b3d58fafeb6c36aa7f262a5e020b001710f9e1c8b86253e610505c6442e4445e8e186a3b1cf28363d34bdb0a86915613d6b4e12743fb8a2e2b0f59ee198ec74c20d08bc2a075b485521a3585a2424082204bdf5d15f19cbd3ac43698e2cb897a49193c6576208915019eaee75864ab557a730ee8ecd6f9d9f95d12c6da1a8ca2f39808edfd3d5b79a9542bd23874fb350b2b960da8d52df660192ac4db597feb958f8ffd3cb14d388755c7c7ed3f72bab0a9d21dc994b9d312a961474074c089fd5c83fd3d43d1b74e78e027f2a124f573cbe47e0abc920dc88437b9108ddfd68eced90efe0aeb3774c6b4c0d193c59ea4f89ab1e513b2f646ff9442c2bd431113ea5f2ae7790a5b870eeaa1dd1d2a546b2c86e3565f21a8ad2d04a088cf9c1563a8765a86469529a6932481598f8e2bdd3900f1ebdf5a3596d3a5a674ee1061606f6984141522c793e2653e9964f869a2c0679152f6152ba1ac07bbac40b52a43e046fdae816fe01f2010b1666747410b7b5b8bad9ae0517f12dc55f03ec509dce96819ab3013a88d9601f0bb404e83843f0e6b8d79111429e3748d9c09df9eeceac92366154cb7c0f5241fa00d2233513ce496ec0b2c38a3ded19c1035d5cf66a73736523ac703e030c09b66b785decd762f04a7cca55a8d09839c6e43690ab7876f76aacbaf1c661ce34abc876b2b35f4200bab13e658c11737b41bd27d60d1f62dcec8a6c0590e66101cd192af0658dffd083003a6b0609de89f4e6b563d300f6d97d93ce5c0156cd20576e168b564e3ee3567af281755940b29fc07b267601bbfd99601525ca9db8c3980b78a10b9854e87c4ffa5a8cde57a436618f5ab3e326f53fe89a19452cc0a0ac6ad57c52424a8fe60016780317b855395aac6d65a76b7787d31feb39c5a1d62e746519cbebe10ac15355f3fb7e7841b7f828c6f530f02afe141ff642e5f6816cfdd8cffe9cc47df1502d3877bf68e07eb29", 0x1000}, {&(0x7f0000001140)="8da15bb676202dd652c52a00bb8a5043748f230c4c14c060f2f79ab5f35a7877d6632d4102464fafb9dbbb116a7974354d94174bd7c1103691e1bea33b7300bac5f15dbcf94b6dae89df24f4", 0x4c}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000000c0)="7e68871e278ee20763e4e2ca2e65b6ab2f72498a8484ec0d5d91fa87911f86ef18292905f4ba4cd16e54558f4bb21c1638ac52393e88d00e2279", 0x3a}, {&(0x7f00000021c0)}, {&(0x7f0000002200)="501362d2747c961e1528d151155867e4440b3164068036eadffc6ab1efa9599bd8b7df2463954b097c846f7972b29ac1c0", 0x31}, {&(0x7f0000002240)="62cb77b2d3903c5c45db4faead504a052afbee795e2a86d17df12acc51d53f9875ece895cc7d040b216a510dbea52abc63bca5a1e9d163be09fa1113c9dcb79b", 0x40}], 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 455.805495][T28455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x16, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x2) sendmsg$sock(r1, &(0x7f0000000800)={&(0x7f0000000400)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000480)="d204ea1ec20146a6db2e3a71fafdae2b3ac11fc8d3a97f7c0c21c213a2b88ff6d92182b138d560729f1789be34de4dd921e21a0a9c4bb36ea3f0b6412823268a3322ea70aecca4eb4caadc455c35f2000a6d4cb4c70ba9eaed4cfb7c312986b64e8db2e1cc54cd0d6d5ed557f69415eb2526c83818ecbffb5b226fe351a9a600dc539470450a313005b899da796b0c45951dfdb37a4f7e5c29f22857b56c8d06bbfc4e3d984c0661dbdb1440412d3d983f49b994ee61610af205688a8a6d58084023b58b7280a57592e4bb969bcc28d5f4a09d51e46a074d1870cd30a5", 0xdd}, {&(0x7f0000000580)="0b72b62cb19132959203f118ecaf03973211e2f76eada418e513541819a443dbc7ba7333b68f00b5b79b901cd1099184025425e319040c5d85be7c8bdccc566053ec62e8344c135e52a7ce431c847568e48d2720095f8c7f276cc25ff0e940ec70a0412652c8344a0be08894cafcd9ab394a3ace7f2eaa2185225a7edc2c07e543dd58cfffebeb3d9303b77c7d52b6cabb6790da9ddcf660a005bf8d21577e4e79210d634d519bb00ca09d9771f78f9e051d8e043358442bf9636997d80bd0f098d8c21fb6762c91cacc", 0xca}, {&(0x7f0000000680)="6f483fececc8254b1bc103cff51b528a6da09cc96abb5987ab9eee91fad2d40c17ca7368e9a8a3e57a58dd3d5924fec2f2ad988706929b790e5366ea613c8cf046d76fe7859019ad95a1c6f31402abe1df786491f35e64369d9038598ec88ef20435a8460383d54ea379ed0f78fe9f3239f131112330774e7d42005711f158b637c01364c5ac08e44351d70e4bae1c059283b5f7c932f9c667e51171cd76aaf9cc2bb12522c5cf4df5f9a76b0ef6d83cc4d9abb02469fdcfc6d585", 0xbb}], 0x3, &(0x7f0000000780)=[@mark={{0x14, 0x1, 0x24, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x60}, 0x800) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0x3, 0x2eb, [0x0, 0x2]}) syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200080, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) r3 = getpgrp(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f00000003c0)={0x2, r3}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000840)={{0x0, 0x2}, 'port0\x00', 0x1, 0x10, 0x10001, 0x7, 0x7fff, 0x7fffffff, 0x7, 0x0, 0x5, 0x80000001}) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000340)={r4, r5+10000000}, &(0x7f0000000380)=0x1, 0x0) 00:38:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="6f73782e657468302c27766d6e657275736500000000000090afaa9eeed348eb4fde74099dabe52cede20e352e037671b84444324f137cca6d960aaeea000000000000eb3e2fb2ce0997f65b44913dd23c0664078d3d7963dabbabc3527187c5dee81e21ad025cf6375243438361748e061b5040c1f4eb9d150d0fc3bb4a20ff9537bd1a2d56e27fb41f911254a4f1b5ec5ef37b21d32b5fe4049ddf23eca561e49ca93d78983cb248c933f64fe780e69c99fa94e6084b9190ec1509f28b4739c1f55e828ba0c40a32d58f2ce39df19ee73742c1cc576714800633099bee119d3f5d884ff87057"], &(0x7f0000000200)='/dev/usbmon#\x00', 0xd, 0x68d2adeb1f5b52f7) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40002) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000010008108040e80ecdb4cb9c00a480e1c0f000000e8bd6efb120009000e001300400000ff050005001204", 0x2e}], 0x1}, 0x0) [ 455.858979][T28455] bond0: (slave bond_slave_1): Releasing backup interface 00:38:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff0000000000, @loopback}, 0x1c) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x41, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:09 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff0100000000, @loopback}, 0x1c) [ 456.044741][T28489] netlink: 'syz-executor.1': attribute type 19 has an invalid length. 00:38:09 executing program 1: bind(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000080001, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffec6) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xff, 0x30}, &(0x7f0000000240)=0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x8) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000440)={0xffffffffffff6f83, 0x6, 0x7, 0x8, 0x40, 0x3, 0xffffffff, 0x80000001, 0x2, 0x2, 0x6, 0xf4be, 0x7, 0x6, &(0x7f0000000300)=""/7, 0x8, 0x7, 0x9625}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file1\x00', 0x6000, 0x100) fchdir(r3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000), 0x3) r4 = open(&(0x7f0000000580)='./file0/file0\x00', 0x1fe, 0x100000010) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f00000004c0)) write$binfmt_aout(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="393e7ef83d942bff3ccbab2e637615b704c4aa77cebc58325dc65a"], 0x1b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r4, r4, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 00:38:09 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x4180) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/79, 0x4f) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) ioprio_set$uid(0x3, r2, 0x76) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000700), 0x400000000000247, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000600)={0x4, 0x474a, 0x1, 0xc9, &(0x7f0000000340)=""/201, 0xa0, &(0x7f0000000440)=""/160, 0xc8, &(0x7f0000000500)=""/200}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x1) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x68, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 456.145677][T28513] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:09 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400000000400204) 00:38:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7d, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 456.333753][T28535] bond0: (slave bond_slave_1): Releasing backup interface [ 456.495566][T28540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:10 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x201, 0x0, 0x0, 0x0, 0x4, @remote}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x40000002, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000100), 0x800) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000140)={'teql0\x00', 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$rds(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x2, 0x4e23, @rand_addr=0x9}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000280)=""/27, 0x1b}, {&(0x7f00000002c0)=""/118, 0x76}, {&(0x7f0000000340)=""/107, 0x6b}, {&(0x7f00000003c0)=""/63, 0x3f}], 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000001401000000ff7f000000000000"], 0x18, 0x8000}, 0x4000800) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff0300000000, @loopback}, 0x1c) 00:38:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x102, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:10 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x6, 0x7, 0x4, 0x4000000, {r2, r3/1000+10000}, {0x4, 0x0, 0x4, 0x1, 0x0, 0x4, "35c22965"}, 0x8000, 0x3, @fd, 0x4}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:10 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x13c, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 456.851288][T28562] bond0: (slave bond_slave_1): Releasing backup interface 00:38:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000, 0x40) ioctl$sock_netdev_private(r0, 0x89f2, &(0x7f00000000c0)="aff3291040a86779db80a375fc5f676b485729ddc5af6a64ae4a9699f02f15d1ef61f7f277267030d06cb25bf0b7231787d75b6ec2c782d88c79713a7a646f5ccbe4d73b4e152093c61e542797d9db29af393d7f8dc713f22663e40a37a95f13acb5271c6600216b4c2f5b2ade3b3d3fcc2745cb0f0dd29a022211d36731ae0fdc10ecb79368a674f1ef038d7ff09e12c18fd49db79a9a8a6c09936975ec35d9707b906109d0054fdf8a2e9f60035ab68c0c71424aa1fe4cf4184e5a0f37cfe5bc4101aad6182292dfd1c00f6e58872c8a5c354afc8bd0b1") getsockopt$netlink(r0, 0x10e, 0x1, &(0x7f00000001c0)=""/58, &(0x7f0000000200)=0x3a) unlink(&(0x7f0000000040)='./file0\x00') r1 = getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) tgkill(r1, r2, 0xf) 00:38:10 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x52102, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000002c0)={0xe9, 0xfffffffffffff3cc, 0x10000, "f5be68a297cc2c301d82f3bb19715ca9d6b28f50c60a952bb1573c5f21b8ff6538eb19e18b4c6a447addd93d5eeae183694dc6d6fef11f7f39bc3b9ce163bc4c68d8bb11d173b8be22716e298205ad4fa376ee62ef231dfeec3eb4669f1cc4ff725515211c7c3bcb9a3650807f857f3c74439a31a251bc13feddff2d4ea08bf6209846f5b1f81f44405d4f456fc6cd2449c7763e3fc8f18fbdda9209ed5f9d7d75715cbd1461c9b0d5d250e056f4613a99922803e8566b81595532c8c838039dba41c78ce2c91fabe56de6568a69ea6d41e77c804ee5f20c0d2d1d24be1ba8fbfe8626221a7f8e1221"}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7}, 0x16) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000240)=@gcm_128={{0x304}, "5d1cf225937279d4", "af3a6ce9db3c02efb012cb1b25be6672", "a05b9ccf", "a541a451f988cfd0"}, 0x28) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000280), 0xd3) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000180)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:38:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff0700000000, @loopback}, 0x1c) 00:38:10 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x6, 0x7, 0x4, 0x4000000, {r2, r3/1000+10000}, {0x4, 0x0, 0x4, 0x1, 0x0, 0x4, "35c22965"}, 0x8000, 0x3, @fd, 0x4}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x171, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x180, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 457.058024][T28568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:10 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:10 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400100, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz0\x00') r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x18e, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 457.203013][T28605] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:10 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x6, 0x7, 0x4, 0x4000000, {r2, r3/1000+10000}, {0x4, 0x0, 0x4, 0x1, 0x0, 0x4, "35c22965"}, 0x8000, 0x3, @fd, 0x4}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff0f00000000, @loopback}, 0x1c) 00:38:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000540)) 00:38:10 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:10 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x115100, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000000c0)={0x4, [0x7, 0x80, 0x80000000, 0x3]}) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) [ 457.364407][T28624] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:11 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x194, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:11 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x6, 0x7, 0x4, 0x4000000, {r2, r3/1000+10000}, {0x4, 0x0, 0x4, 0x1, 0x0, 0x4, "35c22965"}, 0x8000, 0x3, @fd, 0x4}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 1: sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10041, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000180)="c6ef157d03adc939054af9ca0900000000000000ef5a9721bc1a082c00000000", 0xfffffffffffffcef, r0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x45f, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r1, r2}, &(0x7f0000002700)=""/83, 0xffffff84, 0x0) 00:38:11 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x302, 0x0, 0x0, 0x6, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x101000) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff1f00000000, @loopback}, 0x1c) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1de, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:11 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 457.633059][T28665] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x66}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x41}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd9f}, 0x150) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) 00:38:11 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x201, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:11 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000004e00)='/dev/null\x00', 0x111002, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000005000)=ANY=[@ANYRES32=0x0, @ANYBLOB="b7000000d1ef8fc12743329c0b5ec5bacb154163bfd7b0e1b53f6723c4e5b74cc8ecc323995b2df41db47fda5e0ac415ea5320f024c409ce95d6c0bdf181599fa925c69fef41bf4c5d8a939865bd67d0a35b50579c86f02be682abcc9cb12e7d5e2134b786df44822c8a2be713c191289e402036a97f602cc40d7c25f10f7847bbaaf2f53b1b568871478c5af4749a0434ad8a5695e8c257cdebe698faa846a5153054b40463e1e07e6a1efa16c166c01d009087d4795ba52044562b"], &(0x7f0000004f00)=0xbf) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000004f40)={r1, @in6={{0xa, 0x4e21, 0x1000, @dev={0xfe, 0x80, [], 0x21}, 0x1}}, 0x8, 0x100000000}, 0x90) r2 = syz_init_net_socket$llc(0x1a, 0x4, 0x0) bind$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffffd, @random="d5793ad27b80"}, 0x10) connect$llc(r2, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r2, &(0x7f0000004c00)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x3, 0x0, {0xa, 0x4e24, 0x7, @mcast2, 0x6}}}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="d9bea90f6e334d7512dcc4a196ea86aa8bb90939692541029c4be8c36c4d8e5081ef76dcad547b37bd321ba3b942b39ada012e48445f1afa2d1476a98ef983da00e2ce6b7039817980bffa4747e94313cebc19a48a77684f1d90d77fa68e2d1a76da9b095403f3dcb8266a5093c82703217aa3f03d64a76158e249a8b6044e98e95bfc9de0178cf292ab972da0268ce3d058d5bb7e248deab774a78f3c70c8b4930d205a1142191376f712c0bae6212905eaaa29867db450bf8719c55f5bdb1f54efb2008bc93ca4c35629aee57c06ed1f14c83f91b2aa16ee5e"}], 0x0, &(0x7f0000000280)=[{0x0, 0x117, 0x3ff, "24068c40dfeef57beeec9943143293f0f813d7f6eee0de686e0ed1a444"}, {0x0, 0x111, 0x100000000, "eda4dacfced4a50075167c203d65d5a55131faae8a62ad11d252fe5b0607b357e43f8b4d67fb6147cf1dd985f1d8c3980ef312b2709cee5842ab85895309b08984aa1815a004c111d3dddb07f4b417123b84bcf11fb615c21861c368d25a2eb9d4061f17c97aefb2409dbd3b95052024831a1a8c1dd5a297ba048405772a6414a15558e109387bd0b10f584a1f3375c27d376d08889c"}, {0x0, 0x114, 0x5, "02c5a7428b07f949475e814a7d987798d5ffd1de4759a896cea9d87f4281ee57d67e755b5731c147867240207eeae7f66a60a0f95aa47981c852fc4131dee7b33aea714b50fb73684a0f39db057bb169753caa31307be4a33517b16505b4e876b371749b13bbc6afa1018085ce6a6fd4259703c8066a326ec949800bcf98b95b4bfa8de9e4ebe884e6d68356409f120ee516c2e61be15aec"}, {0x0, 0x11f, 0x7f, "4643a02055a8f339e48a482dba8748ed7ad4ee987e71f27a5ea3cb44bd251661b8b10d002430b661"}, {0x0, 0xa24eb34bbe682398, 0x7f, "777d48a0fa25b1625fec37cfd0ac30ad12fefb0565f76fc1c81b8bb1fb8fab56a0346246437f96dbf87ff0ecbc5cdda2c1e8eb430edd60b0978efad5016ec8d1"}, {0x0, 0x10c, 0x2, "ab0009efb0f3803547cf8641317b123c6ebdb4da310a6dc1a476ca"}, {0x0, 0x6, 0x80, "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"}, {0x0, 0x107, 0x1, "193948fe303ee3141efd6a5b585348a63aa961ef8a96d356db5ce5608c9e920d8472db403d2e2c6044fdde3c3c73f8b3b866863ffe7ba6e8247dddb318a9185241dbbd9434bae7d23add9a586a91a7ee6c37707f8a99314a225116e2c96840e7980bcba703e081dff2ab62957fbd3e84f4030d9709d53ec0b05790ab8a9f44aba17367d5f62867bbcab83770f63a507632131a3ebeaade300dab480e5b4cfb3e454fcf52d5507aa5b5d46c15775b536604a0d18da3324efb421e3032d1daae3b0039cdb7ca97ce4f47b08b1d57dca5c5b4f040c685619e5c6646c0044250fcd6c7c64e63f7cae5bfc42a9273dfa281af846009af"}, {0x0, 0x84, 0x1}, {0x0, 0x1ff, 0x2, "1d103f2a8af03a5db8deda28bdd400da5a47fe1a3b33ea4986c29f2125cd2cddcaae326ae453883dc17e0259da2c6a34aed2bc72bac739fa9702523aea639cfeafe721da4d8e1d089df2f0ac391836721a94e3e8344e8ab47f7c4be72c46d2019338dd5f54ddc3076ab27abb8eb1155568920c441ecd8dbea6310b30b2362b234fbbdaf5eab50795adc71850e17c0327e19739fdf34dfc405263749564e537b698abd3917b91cc42227f58d19ff0f099ee249f13d9a303270e93119d34038a6d22010c0da7fb0bd268efb453f4bd3d379bf6d614b36de464c506b9cdea63cef14bcc606d88"}]}}, {{&(0x7f0000000800)=@pppoe={0x18, 0x0, {0x4, @random="5411f2c39033", 'bond_slave_0\x00'}}, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000880)="a6d29a76afa263a678ef21ec1ebb205445abbe88c28a7fd664bc25f366d5d6528605f87a8e733752d8025d833a1a33a37b427bf6b2994e493786112bafe14928c52e27e3cbb5d267ac6291225f6fafd4f101e7393daece67c86506cd30d3c15716a1ce73e82c8f6ef7eca309121e3e08a3b76120d66f6dd94f9e47a8e1a61bd3aff491a50604f7d73413fea4acb219d7b308d66864f3482b90c429e18100231c5a9e7f4b29e1eb60856dc0ddfda6e086374d9962131379139c97e92560dab1919b522f6de2de98cea711be1768505de45b1b19ada051b8496e73a75f181b0ebf7575a79231278ae680fea383b098fef70e1600a6195cac"}, {&(0x7f0000000980)="a98ad477e64888b95c6caca877f76462c1f17562050715d6046b515ede64e045a7ec83ec0b6805d1c81665684f33c6a583aa5405313d99460a3acb8a49fe182766554e20daf8ce0db55b993448d3aa413547f5cbf809470923c82bc2a8"}, {&(0x7f0000000a00)="fbeb75d617d5b90e122764c79e09c58044e0f5eea7c23270e8cc8e246079b87eaf432b37ec6ae56e66948bbbc3f517111d4a02bbd385075dc64e17c0cc31d1cc1651de9715b6d563f0f842b28266332eb7198eba185a8f753263335d2f761404e90bc529edb288cb8576c168f13c1a074a64e1ee8bc6e704e53bb201ac258d4d42ca481b868908aa"}, {&(0x7f0000000ac0)="8b06c0de1c3ac0affa9812e6570de18f24758627d2621719157d35ada7c2d43894ed7910d8dd015c7367d6e276ddfb80864c7b1e72f5d38ea966907538d81179f959e93649345c3f78aa499fa1c79e2a19d534988bab3d773f69002ee4136aa853f1d854cdab6396e1d3263ec25e0a6c8cf7d906f8844951bac39fdbe180d36b8f6920289a7419a6952b5d817797d5b1e49d03c6ea73aab6cc412ec72aea7640c576"}, {&(0x7f0000000b80)="01ea5e5fda67ad6165192dda05fa7b283ccc2b4be4"}], 0x0, &(0x7f0000000c40)=[{0x0, 0x84, 0x4, "75c08e6b07b8bd9c2ea6101a4acb3afbe8ed4f112ffb5de81b90c2cc2763b80efc2a0332916aeaeb5ce62e4140db62af2b0bfcc13aba79a9eb3fa9d8e0398bf2ef7c61f23a92df123be6eab6978408febbc0d316f3b066a237c27b84faf4e7b05fbefa9bb5834609d5e8b1a78910fafe3ddb0d05032911e4c0da1954f38cdc8a5d23ec8ec1ab8ee579623242c85cdea84d784e3820be4733f8c6b5ff55323b0f5cd5753678172f8b2cc75421a736fd5880da7c2a5be09a2e0ab3e4835c3bc8e9f9ab56c1d975e04dd13149f34a65d087f806b1fd302e4a8efc3d011764a94994c8b0e809da75d165b6018ac38e60"}]}}, {{&(0x7f0000000d40)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2, 0x1}, 0x1}}, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000dc0)="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"}], 0x0, &(0x7f0000001e00)=[{0x0, 0x29, 0x3, "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"}, {0x0, 0x10e, 0x1, "9bb4c4a02b72d7b5acafbb48dd5b330482"}]}}, {{&(0x7f0000002e40)=@un=@abs={0x0, 0x0, 0x4e20}, 0x0, &(0x7f00000041c0)=[{&(0x7f0000002ec0)="a121ccbd9b7718faf57eb037d1d8599dd8ff59a885a8b3b9a30a69edf83ec9e816"}, {&(0x7f0000002f00)="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"}, {&(0x7f0000003f00)="626a7246d7f334b12ffcb3b265ce2a6c600b6451c075c5951881df53d33caca0227d8405695a68f2981322b58f1a873101c629c7cde108259ab3a27c728a298bb53efd5c6321ae2203ef122e01d46ffd5c5a27fdd0f1"}, {&(0x7f0000003f80)="b29402d1421ca5808d33ab7bfecba052050369b4c958c4243a493729c4741b1f1acbd8ab72be7bd4ec823e00b0ee3101ebc8e861160526db76186bc448988c70b1cf2e2f76a43682807e80dbc283c19cb5047b42822e30b678b1635572337cf4c87509068007762f721af66dd6a7c792dc5d90b069b63a137581240c06c9efae3a92c0617cb819b0866add161e31937752fbd5b3b9077e610675d4afbb89d7e35ec594dfd3905307d7"}, {&(0x7f0000004040)="18cda76c464d83319964dfa7686efbb7f06a181c447d61524b6291ff1b1db8f69a284e8cd0fd8be612c697da79ff99ce8d32e58a7fc77eb0192b4ebaa8d3f0751d83848353f5e8c1a3658081ca478c62b56f8ce1470a4cbe542b3ed9cc66263955c1c94d06f295"}, {&(0x7f00000040c0)="f76829605766217ac63c0e14cb179040e38d2b0ad9c9f70c825575b5b577daea727240294aa7e4d31ebbd93b7b8f536cfbb8b79273299622eee901bdc90442d5100919ac4bfdf458f6201c590cf1fd182434098617a8464c3f5b7d7225bf59dd0bd42d2bcd1b8aa2de5c8eeb123ca85139af7ed98d6656eee640be906075b2bdc771fbf8109f4a13c7eec95e99e94068e92fa3b7881d2f85677041f483ac4fd87c9921a963fe171273c923c441c1059024f99ac555d8dd526e37287d54a7b5604cb4b6b70c4d113a112fb5f1e243bb045394f54bdbd33f9988bceddecd794b66b8ce4e77182e"}]}}, {{&(0x7f0000004240)=@x25={0x9, @remote={[], 0x3}}, 0x0, &(0x7f00000043c0)=[{&(0x7f00000042c0)="f4111e8097669f8895f96f1be9c18c4a3d1e279cfeead94a2d59c6d1831a0874ed2ec9b2cf1312d95fc4a3e59fc141a9b6f3d7bbd11ca636f7f22740a0659fb0709c8d6b5607d70dcd083d50fe51c855e0b56365cb1bcba17d038f0c21e7559e3cc4274ac895aafc23850ed54ac23d5f7e41b0db1c626c5926551e977dd4b1f8566b2c7e0abba3ca24764c2841ce2cafc8e99dd6fee25e980fecc0d719e94047f07bd3d2230bb07cf244a11c18711f61e1060dfa51ac7a30e64bfb04b4c507efb418163aa6dea44f27b374aa7840a4997bbed25ca2cc00a8cae9ded15fce11d21f93cd2a7fa5b2642b8a"}], 0x0, &(0x7f0000004400)=[{0x0, 0x108, 0xfffffffffffffff9, "e68181bda0099f6e8f2719de31fb310f982ed6fdc5a1dba02f59efc80feab083e306f74cbb7d7ac0a767f614c1c44c77aa48b93fd8981bf5827487fd56e4b59e92a1dd74bd11ed7cea7da769f53f56a0fa2be0b4caa520e76af7fcff42dbe2e91e181ac7917c3d2a95bb06eeb8269569d19413da09f218507ffe942b"}, {0x0, 0x107, 0x8, "152d4f6969580aa8e79eb8e20edccdf882ef46f122a013105229767d05a006a0953d86e3423c1233f8edcb6055d9f102ac29f259f43b79c82a192bccd6fe369f353da529e8f9af54479108f7a20b0a54e1c09a351a8233a0dd843a333a39f01cfcb1f022720824284a880dbe392a5e908e263f0ccb2f33173e47937bc3c474e5053469081191e7291cc487bdda052e0d7985388f388b17f5436ffa335c6f"}, {0x0, 0x102, 0x400}, {0x0, 0xb9ddce6176a98061, 0x4, "5e744325fcd67c2c9b2bfcfaddebb0eacd505a3cf06c728b706e57c023c9bcca6195d5f2999136f3c6571db0c36d0bdb7b167d96a87b6b7e188735b053088768b3e3a3eca3ffe0972a5ae55e24fb8c3daec746fa5cd669317db4d43d6056d7055c4113dcc48ed5afd4351d6e5e21a0b68eaf0c69182937"}, {0x0, 0x10c, 0x2, "98a5a1de4fc38e4964e4e612ea02c72e1d1b85425dd5154f52e4d48061729c246a98d4cbb6b3eb2f4dc1a3882892b8f1a046003e5c814f5faa876232eb2861b80c10de230ba9201cabf902777ace6e2f879f015623eec386bf64e08c5625964a0f1f8c39d696f5"}, {0x0, 0x10d, 0x0, "4fc6bed4e8be22e7d11a1043fb6051f8c80b6a736101b194402cfdcf2c9c4e0b2c9ec3caae3ba7b73fc847344245b9b3c7e6b8536c52f30d2e0f605f9259e4e340c6d123a92a65c9c31dbf8c649d65cb442567462b5f71756442b22a13b0ee5ec7a568391baa28516a337d7a1a7d01c5ab1e2ab0fa690a0ff271e62adc4054acc53653326489018f8900c38f458b98b38df1e84c01474f5e4cd56e411cf34e6e865ec774b995235c"}]}}, {{&(0x7f0000004740)=@pppoe={0x18, 0x0, {0x1, @random="8e263ef083e9", 'veth1_to_bond\x00'}}, 0x0, &(0x7f00000049c0)=[{&(0x7f00000047c0)="41bc6a6e95fa0c1bba25786f83db92b4575367d2fe5400b028f86f720ca3f51f44d711d70a76f69dfcafa06c27626b00672c6f4fbb9a84f60415c9fc4e7e44be73d3cade8e977a1229eaa36db68f6fdbf0a4430f1cf95bd7ee16c1341ed25a1df156f380203adcf2d1ba240e38677d3e44dd0a5e"}, {&(0x7f0000004840)="2b25cd7b9e4b574a9bf1027ddb292df83c3b88e69822916ffb3509401edc87d461c67485619f921593ea86c02ed7c0cc13655e7c598a0f63a2eda13fb54745544d6510682a044a5120e80e972286d97966b295b0e6a7a2ea82b8cfe469584f59ad39c3309b2007ae30249963"}, {&(0x7f00000048c0)="d794fc2876c985a731117301c75451bf7e419e13d4b778318d0943c0203b610cda132de34085b638469050054b3f1e6a30298a18471826128a9f1d707c9e178498f1b51a5601d9a54996fe949aa0216f5bddb0e6b2689b457ef042c501859e0e"}, {&(0x7f0000004940)="65886520b817198a2a86b50edc591d9b527d5c5f57d6701a4c25926ec681be0ad93f23ec2ae33941fc00139dcc34df694b88923ec0067f9567cccee4e9634cb77bf312e95b76d6d4c79972493202021e0f095b85cae136ba0af2ff40c359ef710a6fe5b2985a20fe5de8c1e06c00f811348b19a8953b01"}]}}, {{&(0x7f0000004a00)=@can, 0x0, &(0x7f0000004b00)=[{&(0x7f0000004a80)="aee4b81238d83c7aea15930888c7112709cb8ae2b054dc780fce2112766cc628cd00ec4bd3986bc5c229f4c41a46273b26b8e46ed67aac1c717da22ab1bf182d51b93ddcac34f3ba894671fe4cf958c080da63"}], 0x0, &(0x7f0000004b40)=[{0x0, 0x111, 0x9, "5ed2b0da9f7b876971c4ed75d16d5ff6374950472ca75e724d"}, {0x0, 0x3a, 0xffffffff, "8de23a14f590abddfe02422516646b9d2d58d5f5991caf1af7134313c10137f10b2ec3811f24e76e77aab77a4b4bc6e149271052d40b8a9369308e0ab7aff5a9c16eac05b7876869e06762807741902d1aeaaa9ea62809c4452cecc27dbf"}]}}], 0x400000000000123, 0x0) recvmmsg(r2, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000004dc0)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x641f) 00:38:11 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:11 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff3f00000000, @loopback}, 0x1c) 00:38:11 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40000, 0x0) setsockopt$rose(r2, 0x104, 0x1, &(0x7f00000000c0)=0x800000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:11 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x207, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:11 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x80, 0x0, 0x4}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x3, 0x1) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000680)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/102, 0x66}, {&(0x7f0000000240)=""/49, 0x31}, {&(0x7f00000007c0)=""/93, 0x5d}, {&(0x7f0000000700)=""/179, 0xb3}, {&(0x7f00000003c0)=""/146, 0xfffffffffffffd71}, {&(0x7f0000000480)=""/13, 0x58b}, {&(0x7f00000004c0)=""/237, 0xed}], 0x100000000000027a}, 0x6}], 0x4000000000000ae, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000140)={0x81, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), &(0x7f0000000280)=0x4) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x2ed, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:11 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:11 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffff7f00000000, @loopback}, 0x1c) [ 458.298484][T28747] bond0: (slave bond_slave_1): Releasing backup interface 00:38:11 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x7, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x5, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) shmat(0x0, &(0x7f0000ff3000/0x1000)=nil, 0x7000) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x2, 0x100) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x20, 0xf25, 0x80000000, 0x20, 0x6, 0x9, 0x3, {0x0, @in={{0x2, 0x4e21, @loopback}}, 0x7fc0, 0xb274, 0x1000, 0x6, 0x9}}, &(0x7f0000000340)=0xb0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000380)=@sack_info={r3, 0x7, 0x4}, 0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x880, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r6 = getgid() fchownat(r4, &(0x7f00000000c0)='./file0\x00', r5, r6, 0x1000) r7 = shmget$private(0x0, 0xd000, 0x60, &(0x7f0000ff1000/0xd000)=nil) shmctl$IPC_STAT(r7, 0x2, &(0x7f00000001c0)=""/110) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:11 executing program 0: syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x300, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x325, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff00000000, @loopback}, 0x1c) 00:38:12 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 458.597073][T28752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:12 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:12 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @empty}, {0x6}, 0x0, {0x2, 0x4e21, @local}, 'gretap0\x00'}) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x344, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x350, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@unspec, &(0x7f0000000340)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000380)={@rand_addr="25091ab7eac6ef85647427b851e1da1a", 0x8, 0x4cc401dbc6100764, 0x0, 0x5, 0x7fff}, 0x20) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000200)) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x0, 0x10) recvmmsg(r1, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f00000022c0), 0x0, &(0x7f0000002340)=""/4096, 0x1000}, 0x7fff}, {{&(0x7f0000003340)=@xdp, 0x80, &(0x7f0000004600)=[{&(0x7f00000033c0)=""/168, 0xa8}, {&(0x7f0000003480)=""/31, 0x1f}, {&(0x7f00000034c0)=""/32, 0x20}, {&(0x7f0000003500)=""/117, 0x75}, {&(0x7f0000003580)=""/112, 0x70}, {&(0x7f0000003600)=""/4096, 0x1000}], 0x6, &(0x7f0000004680)=""/177, 0xb1}, 0x75b}, {{&(0x7f0000004740)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000068c0)=[{&(0x7f00000047c0)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/23, 0x17}, {&(0x7f0000005800)=""/4096, 0x1000}, {&(0x7f0000006800)=""/181, 0xb5}], 0x4, &(0x7f0000006900)}, 0x1a}], 0x3, 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000240)=0x9f0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x103, 0x323904) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000180)={0x1f, 0x1, 0x4, 0x400000, {0x0, 0x2710}, {0x2, 0x1, 0x2402, 0x8, 0x0, 0x0, "9c5ba2ed"}, 0x43, 0x2, @offset=0x10bc, 0x4}) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f0000000080)=""/83, 0x53) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 00:38:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff01000000, @loopback}, 0x1c) [ 458.884197][T28811] bond0: (slave bond_slave_1): Releasing backup interface 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x366, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 459.061061][T28820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:12 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x380, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff03000000, @loopback}, 0x1c) 00:38:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3d4, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:12 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=@newsa={0xf8, 0x10, 0x100, 0x70bd25, 0x25dfdbff, {{@in6=@empty, @in=@broadcast, 0x4e23, 0x6, 0x4e21, 0x0, 0x0, 0xe85e94694172e307, 0xa0, 0xff, r4, r5}, {@in=@broadcast, 0x4d6, 0x32}, @in=@remote, {0x7, 0x6f3, 0xfff, 0x1, 0x0, 0x400, 0x2, 0x7}, {0x8e74, 0x1000000000000, 0xb4, 0x1}, {0x2, 0x5}, 0x70bd28, 0x3504, 0xa, 0x1, 0xfff, 0x41}, [@ipv4_hthresh={0x8, 0x3, {0x1a, 0x12}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x40) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000400)={@ipv4={[], [], @multicast2}, 0x7fffffff, 0x2, 0xff, 0x7, 0x5, 0x6}, &(0x7f0000000440)=0x20) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f00000000c0)={0x77, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:12 executing program 1: syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xf7a90c55b3d49b8a) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:12 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 459.299512][T28872] bond0: (slave bond_slave_1): Releasing backup interface 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3e4, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff07000000, @loopback}, 0x1c) [ 459.492471][T28877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:13 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3f2, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:13 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xffffffff, 0x80040) write$apparmor_current(r2, &(0x7f00000000c0)=@profile={'stack ', '(+,\x00'}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 459.663084][T28917] bond0: (slave bond_slave_1): Releasing backup interface 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3f8, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff0f000000, @loopback}, 0x1c) 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3fe, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 459.778910][T28922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:13 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:13 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2, 0x0) r3 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000240)={0x2, 0x6, r3, 0x0, r4, 0x0, 0x7, 0x35f8}) 00:38:13 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff1f000000, @loopback}, 0x1c) 00:38:13 executing program 2: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@default, @null, @default, @default, @bcast, @remote, @null, @netrom]}, &(0x7f0000000140)=0x48) getpeername$netrom(r0, &(0x7f0000000180)={{0x3, @netrom}, [@remote, @bcast, @default, @netrom, @default, @default, @bcast, @rose]}, &(0x7f0000000240)=0x510) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000000200), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x500, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 460.025134][T28964] bond0: (slave bond_slave_1): Releasing backup interface 00:38:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:13 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x600, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff3f000000, @loopback}, 0x1c) 00:38:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 460.224728][T28970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x700, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:13 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:13 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0xb, 0x1, 0x800, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:14 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 460.401403][T29012] bond0: (slave bond_slave_1): Releasing backup interface 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x702, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffff7f000000, @loopback}, 0x1c) 00:38:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x900, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:14 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004f00)=0x14) sendmmsg(r0, &(0x7f000000a940)=[{{&(0x7f0000000080)=@in={0x2, 0x4e24, @broadcast}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000140)="017e9e209d6fbaed47f2e201b62e40cd2c35cfc97026d20d1d8cd76f989d331aeaf39473260470c0694b7cd74b057f37be167a0b359e24e41c9e8ae375d1552417e303f3fb1e6f14cc57b7c826d475d7a9d81e774703500c593284d207c167a26fa2144d4828c8c84b35b46b3118489fdc1b77d05ad03258f19d", 0x7a}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="a4ce728150a1b0c6137b9be3f5c10ca63ddfd2742e34e3b04be691af8c7a9aa4b50f27630df997eb8b023313ea0ce597b90a", 0x32}, {&(0x7f0000001200)="b415d6052587b35698eea3f117be57f71fc9c816478df2aba2cd7b5b0b80ea1f5ae8c5b489a0cf9725b59e40e4165c7dfe97a22877155b6759b633473c9b10726cc9fc7e143ab30d6db9c9d53d44c3", 0x4f}, {&(0x7f0000001280)="9d891add3146f4f02b5c4377a59eaa4f5d94c930a1d4ae978ee3af2c62cd98438fcbd0904617ef789b79a5e3bf3b53bdd43b643efcda", 0x36}, {&(0x7f00000012c0)="ba800564f09e520cb2d97c3393e719d0802a35bbb6c727f15ee367d350a0c556bbe4b4efdb89a0dcc567a4f4a206d3917995ca58467f", 0x36}], 0x6, &(0x7f0000001380)=[{0xe8, 0x117, 0x8, "f99e537777095f5955127c7913176cdae6a8d72810aed5b99657093be22f84c1efd3a3b031238ea66b8c3bd78e733c1292fe15ea4054120ad57a72a05d516da899daa0cf3545021f29de3aee1a20c09a74d1ecc5764e9cbdccd029deebf4e8707f80e95a24082fd34e22e5ac98c18f45ec8abe81477168e7ad773cc0f2dccbc6c052069352aa1b7032767243b401fd272742a2a01c6938bea67f1e0cdf56d9b9e948b2e8fa2ca725174634346bd23bacb730c4270bc35d3cb794f7222872170d4bb04f78cb5fc1ab2dbe9da09afb1c78d34188894270"}, {0x38, 0x110, 0x9, "482c1c31103791d9325fd4dfa3062cfa41454520fb559dbcbe50eed708b54e15fdc716a8a8f69e"}, {0x28, 0x0, 0xe9c5, "cd42f373737d39978572ca1990a2ceffbe"}, {0x90, 0x11, 0xffff, "347b606afef4545b6111d0a941054252f304f511b7154b66171109a38645fbef30fa20c77642330e1924e290a520bfef321bc4739d8b89c938a1c192358429d4bae4adb5cc0a70efc082da9c7f514ed1b7a8fa84556cd2749bfa98842158abe65fac0f061c6957cfa224890e60e7a618bb7e1f626c6933b1c5b0"}, {0x20, 0x117, 0x1, "a39baeaeb547f5ae6c"}, {0x70, 0x84, 0x9, "c9333b73971eedad5570aeb21dbe1c19754a74fb5e3b2c576a6f39603cef19be26cb8bf295314609db89529fedcac7806ecc5b09d334837632eadb27a413de638b216e4d0468dd4fa32ef3f9bd036a657c3203e3ac8a4e802ee710"}, {0x60, 0x11b, 0x400, "4c599526af0827d709c898e444e6eb2e2457ea0adbb9bcff55b3d77dd27fd71c4c4a75fbf40464af0404d0b44b42d1e8ce4e973f80a28c632ba15ca3bc8d99d5dbf3ec834b6043608fabfd746409"}], 0x2c8}}, {{&(0x7f0000001680)=@can, 0x80, &(0x7f0000001700)}}, {{&(0x7f0000001740)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001800)=[{0xf8, 0x10d, 0x7, "73c5547f3a4cde3b616b77f9815e772980a7408c8d6be4d8ba06f17e96d9300ee071abe1da8d63c8a4dd81046ada5b04aa63f1a3dcc7b676cd321ae9ebd3dfe08a21366e0423516ec391bba772d07ee158679761a3df9036285f893272b43e265fb4423be8a0b3c1ad15f272500768ee486d969357683ae927e85d25e1fb8a06c1bb3c3fa90d7b36c53edd30a24a2be87c4a60e422822016d4ef59b842c0c04ebf7d3b216b7d6acdb8893b87abe86b9f103f28317444523fa897770dee2cbc8dcbe87d9f33f4f36c9999b315de80fcfd4426d8781edf1cda33f316099dc327cf6dd5"}, {0xa8, 0x117, 0x8, "ba58ae99277bde3d6624f886523b4bfa272cf7ffb86d45816459c776fb100f96ee53b8f47edd62f64fa002c3216e70849cdc110498e86fda5c5100086f62843e923f280eb537b52c908e8f5a6e38939e04df065aac537c1a9a9e601c234842cd15816ff5378b7081e27d0b3fbac69333df308131658771231580054bf96ada253a8595a0c761c10ee6448b3b6270625de720bcf03c9a"}, {0x78, 0x118, 0x7, "5bf544cfa9e0766f6e59fdc526f18039393c6ccfa19557b5aa9cd33c4147e25fe2efe988c99bd7111d29ec32fed89913920ebb2e5f9d89ec67cc4452a8de6116e47c75cb7c60bcbfe13aa29d59709e9c7d609f2c012ae45407d30ff343f7cfffe3bd1a"}, {0x1010, 0x29, 0x9, "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"}], 0x1228}}, {{&(0x7f0000002a40)=@rc={0x1f, {0x3bf4, 0x3, 0x7, 0x8000, 0x400, 0x4000000000000000}, 0x6}, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000002ac0)="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", 0x1000}], 0x1, &(0x7f0000003b00)=ANY=[@ANYBLOB="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"/5016], 0x1398}}, {{&(0x7f0000004f40)=@ll={0x11, 0x9, r2, 0x1, 0x1c00, 0x6, @dev={[], 0x28}}, 0x80, &(0x7f0000006180)=[{&(0x7f0000004fc0)="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", 0x1000}, {&(0x7f0000005fc0)="b7fbae2493eaf56bce3f511150b42e660d963e38ea454f188dd450b295fdc47ad14d85aa48a78da32206c786ccad2f25128b390532df34f7e5309bdee8b012c841112f6ed4940dff98b778f40d8c3dd22211c7c118dda4df481e31afd2a3ec5fbc77469d0f97356ca00802f42740fcd5e78924981360402ef01d8fbf827cec9a1d30fbdd5bb51133874f8bcc81a75987d19902177ade44", 0x97}, {&(0x7f0000006080)="62a56df0939d7e1921393967e3238849cbee605eea03564b81dd7e25d778f8406ad59f0e93ad5c329e213e9340e098056b86d66b08359806f9ad268eafebc8864cb555444c6510162b6255d6b14b3faca65f7caac9040ed2ad9b700582ba402e14bb9c828d35b70e76daa8da23fb49beda90893fa7508162a0a2f7440d1c4151cc74e47e4057e1fa3ceedc001f55879a42bb58163dc7801fa157f361a7b771f87f6b3e3017d8913b8b94585d21b2cf39b5c080129eadd70d466cdd6ba612d2dccb43caa6215007ef9560", 0xca}], 0x3, &(0x7f00000061c0)=[{0x30, 0x10d, 0x9, "dbfb77a24dce7878ad072dc31da40dd9d6e5a4d8d2ead728663b50d50902d0df"}, {0x98, 0x102, 0x0, "76f578133cf8c5d127f1a898d3dfda7eced8b507aa2b181c646fd1c7dbe716a8e80c07d78d1f84000cc9abaeb2be0355a243bea1cdd0c301bac31ed175b7b709cabbd76ad776acbf94936f163e0db84f606739f56b3bf7f61dc4202f56cb88d7d3e77d2fa90dc3a63e26750bda1afbf0c6ea555012969ec24967404bc529242f63b1033b2a5a"}, {0x20, 0x104, 0xb2d, "0b516a21dfd2a0a7e4"}, {0x78, 0x107, 0x10001, "c6e083204364f77c50c0ab8b47e740612f0f19e2decb42a2774a631c7a9626aa55a88531da56d2d6755124ee1bf8f90d2ee7452880a52bfbf344dac45b5398f7846d60a6c049db719a7e748dfa704cc91f6510ead7b707e2bc58021938861bca12f07adcbd"}, {0x18, 0x102, 0x2, "510e1bd6"}, {0xc0, 0x114, 0x100, "59f40ae88f62017f68fd48881faadc3347d463070d25a4dc0beee0af21e562c63a8e68edf3fc981ed4e2a93f0795963c7ec45f4746c2ab0d4e5a974183b105d42a8808ba111857fe87137a54d1a2c148db1aad640e271ca49be353133c5a9b8a63e3c0f2d0606aa6d48ca6c1299bea876e4360f3144559aa57c6fa62480d465e509ecf32f5fe02fcbb4545cc4aee449b45e16a74998d1f9049e7b2bc7fd56727c97576193d86f38ab9ef3d"}], 0x238}}, {{&(0x7f0000006400)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x4, 0x3, {0xa, 0x4e24, 0x1, @local, 0x7f}}}, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006480)="a44335d9bab1f50ec3994b24c9a11f37e7b92962e6cf7de44335a925a2160b6cf9c5edecad3c39bf0651280b14e6e407044f4de175f5904c6efad755ae3aecb2fd77c7e31647ea71ba6bc80b6db35cdc245e1bdc442fb5fc0daa787789316f376a43e12d35160f5c670d7f55a1251e81ea1fda6f29223cdda999d6fb9fad70d8d3cb5659e7a8b57f193d5734a6c1ac937e3b1c8c44af8ce472545fe5f02087a7b56fe8657f4ac2af463cca8c95c64fba1e325387ce1c9f326b744552a411b2bf032b6b63e2a2836a2ab7395f133862a5c73f50e2136d50e8282fd1144bc2d73b123f38b926afa9d029ea3dbb18228fcf", 0xf0}, {&(0x7f0000006580)="0e62c868ad21ae83d7583ffbc3531c929e41538e1e45c70c8cb735743dce7085d8510414128859c0f57a722750123e8c00d737f46bff3b2eb653895b33ed9ff0e9e0f117fd1b5aea1f8f82468ac74d2bbe7cf46a1e47de47a174134ad789b47ea99f6f4903aa4087921d5e2e3999df32197d5d2f20ff11fc879260ca5842f08093552ec58d07c0028a3e31872000521d22f748cd1811f06d3902acd314b4dfba3708088d174554cbbf219abd44b1521ec5cb4b452220f118bf2d37e333b503ca80a603fbc88470c5d346a7dfa7b8a645cddb9fbe617a468ef3b7b239cf639e0ebe771ffd1ef48e9af952e398cd4b9bcbf6a43d083a7097733207600731e56a", 0xff}, {&(0x7f0000006680)="6fbcf02e79880ded0d2191ccc30d44daadb6ad49668fee4bf1cd1b54", 0x1c}, {&(0x7f00000066c0)="5ac129f5450e3d82a6f4bb67c88860c2c4872808b84196362133bb4f7931a27a189e558c3e98747fa57cad8f386e64716c6e77ae1a8deb49983292fe25e93ebea10ff14a", 0x44}, {&(0x7f0000006740)="6cfbcf04ef1abe8d385b947d0c9df56550343c9615f3c34119e9fb417256a8379e9d9dcdc41d2fdd2dd08eeeccdf30cc167022388c704d34921888953b13e9451b74ee5fd08b7cc2d17ef27948830d5f39727e76e1a3cd2f62f4814752cd9969a2f19c6f4e77", 0x66}], 0x5, &(0x7f0000006840)=[{0x1010, 0x103, 0xffffffff, "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"}, {0x40, 0x84, 0x71, "f0cbbe2992af987aaefa46898af5a456e43d8a010a0f43c0557ec837187f629001081505730879a4b2809e"}, {0x30, 0x112, 0x10001, "3566ba7f7f91ca0882c9397254c2b8ce860271686e25ffdd46488e"}], 0x1080}}, {{0x0, 0x0, &(0x7f00000088c0)=[{&(0x7f00000078c0)="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", 0x1000}], 0x1, &(0x7f0000008900)=[{0xd8, 0x10b, 0x10000, "0324a48bf461101cc56a919172b1c4add985d2d5adbc9db260c17a9f82b5fd11bb1367bc48a516ae7996b7afc5c42ad419071f13e4b955a712815d673ca31ca19a4ee5483ad1f47cf8e66322d16e15fec378df63fd1405862b7e51125d60b65f9a1c24bbaf89389aa20858cb8faa7228780ae83f7c0d58833c39cfec68bc4da90cdba9a8e3eab13f37f589d648128c1c59968ec2917888774f8bf3fb9247d81679d8c6cc71eb985e939db76a450097097211f5699eb31bc87483d87660a8ce8828dbbdef"}, {0xa8, 0x118, 0x29, "9d31612da39e8370c3b1c623b110e32c8bdc53d946ef06f2e7db79cdcc9d52326bb45054cced90145670b749764206d816d582f77f45f8714932c3ab68203bc1055f748fee851a4a2fad8e7c60064d55d9a5b9da951d5084e7826d4abb8f0b4692410d9f99969a550bf2ef8a8005459c78b339e1f94ad6e01eea1675d7995f57e97916566f31bf958b8741ddd8515c16f1"}, {0x58, 0x113, 0x8, "de6621c009123ed397abadcc14f1abfc836a22847a426186c70c35df329551162480674c25fb2923ffd8a03f42a89f29b347483d5f290357c0ed9d40bc60d3649920"}, {0x58, 0x10d, 0x50000, "9115fcf5935217eee730dce18b36d1e31027db4f42b50a98f98a89fc051025e2b0c42e7b0196299a4f9b633539685dd932b565f710de640d2a3deeb584a34e25199afcb9b02f"}, {0x108, 0x119, 0x1ff, "ab35ca16f76f1987c3c83960123ff9df250e2a1344d28cf3eb296cb01674f1ab840d651fbbefd8c380b7bf7819209a8b3705730986e04a108e70fc7a74ce35bc5bde994eb699544b869af4a5d9db203f86f4ad7c2bb039235b0d1ea24bd042db5bf618d250891609ef77244fc4b30c3c54d3bc7ee8d7be1ace513a54f353e2c36a42b4322fe7ae4f5b69a5daf0ee35d9a7d3748cbc0b69c796770848127233bea1858dd518b7525eec7c3624ebb146438c52b5ac7d568931255ea968c148c8e1341e54c123fc8a16603ac521074329664c61aa3caa725742056633a5e8fad722e7bab85149a9b5b6a932f1f8cae1e650814058"}], 0x338}}, {{&(0x7f0000008c40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x2, 0x2, {0xa, 0x4e20, 0xc5, @ipv4={[], [], @broadcast}, 0x4}}}, 0x80, &(0x7f0000008d00)=[{&(0x7f0000008cc0)="162f9f1b649fd391066820138267b1d240a6d812b6c5dec5c86805e28b2c13280f90bc726b21099274ebd24c6a7249a016", 0x31}], 0x1, &(0x7f0000008d40)=[{0x88, 0xad, 0x10000, "d99edff0afa952b96d1538f4bec21d780df41e505cdbf0d3ea8ea9edb55acd353874832702954b9f25c6ce54c4be494c251b635240adce7879d108bf46e263652775cd44b066922d9475a557856bb9d76c8669c705bc0a5734d53a74deb78877459d3eeb9c2747fa0039d97b7d71e11288d06e8165053ed3"}, {0xe8, 0x10c, 0x8000, "b90d69208e398742b9b41b604fc575b07faa502774113c21fb80a3cc073be51724b1e8a58732f498cfb8b771c44c0f98c72baca4964edaeac87a1d89dad9fdf4ff8d5a86c06d27cc991a535b107b3dc95952555834548e3aae7e2062029c726d1b11bd519a557ef98dc1f7291f7fa94436335a6aa4b3e4b272789c5de4e82a5b5d68ee7fb38019109f7eee092d68b2615fa86e226cda07a070f932cca4585705acc1585665a21f4b04cb4ea884cf8cc00ac1f63b257a45065448723a75fc5f3ebe605f4f1a48bcad63b55fb5b3ef3e7ebdbb"}, {0x1010, 0x3a, 0x4, "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"}], 0x1180}}, {{&(0x7f0000009ec0)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0x80, &(0x7f000000a280)=[{&(0x7f0000009f40)="8494043b17c476b0a605957aa6731f3e59ed444cea910b3fafb9e855b9ead2d7e0ac1da3935759b84149ccce47c89224af213f2ab562e1cbd1c6709f19eabc4ab2b68dd6cde160acd5c7db4e8019a594a0d9b68278173b6bc224762e07574a8bb9a3a393f9a68d944a23e305a67aeb96a6d00400bd9c87bff0bcd12389e418869f5dec3aab545b22617fdbdca83a21de2b2dda2940eb72a8758179935290d7c0e5140892e7186b1a582dc2fdd046560d780152005c824dc569f48f829cbde2e410ae9e89125c87fbddbce224315f633c0710df195756094e7f46fe3674872b5c678c7f262827aea5", 0xe8}, {&(0x7f000000a040)="f40c9e65f2109af9fa51b5e6fdf9d61847d6c8002e13bed2f2cf2342026caa5693fb843582d1b91451e9dc136b90a668", 0x30}, {&(0x7f000000a080)="418218c82924b818f06d373c1253ee5a0886d76183fc5c788501bdce3ff26b8c4bf4b09b57c3f7b278439a1ae9400b686dda4fd3acf059e337c1eb217d42b631f4664908145289659bdc7d24902ac67334fb0710d94707cbff652e355fe7786787764ddb393c26366727b3c17b11d8d05c08a8f39b2fbdb78e744d94230f5eb76642f0c1b1d344ea702018175693253d9ab05d46c644a15ef5dcacb3b649c29091b6d24fc4c0977511500c3722b91a350d390b4dff7d873471b50b8f6eeef4fd5e9cda9d4259d97989cf1b6ae838d87e47242c705eeda6", 0xd7}, {&(0x7f000000a180)="c525101a9bc6eb269e028414ec8a2c8a9baddcca20634963fdfde13342f11b28cfc9f848a448c7c3127004c02a981bdb8454af3830a3bf3ae1988195c5a46c09913c3ca980e4c55aa0bcbaec03bcdc4203ecc83b2a798e7794ad82573c30ffe3c483e8c24cd451f26f530ec3b4cf93dec6819c23b6d6704e548d55ffe395a54b9665794a14984a14a724b46d9e608340aefa03a7af0b8b36978d06ee9e070238ed246095fc951a0ebf35ca69101e63633c29e3a429044b061ca7432aeb805533448f455eeb6fc9535301dac0eb2ff33f00", 0xd1}], 0x4, &(0x7f000000a2c0)=[{0x48, 0x1, 0x7fff, "020cdd5bac9e32bcad96f788aad1e257d335e76b162816db89c9b4c782454c21fe5194fe3ac9af3e2c3934034605117a69ff8722"}, {0xf8, 0x118, 0x3, "963a4f967f2b307888024759119b87f390caedf9e4b2ed2aa80885cfd3f2895b1733e69a21838a24bf5cff26c660bfa9bc7349cacfc1314848e6d7d5f499b70ca1eabad6191b339e032ba8a23666a0527a7f326c8d1a16e346815722ab83a5f8a0c83a24842fd5adfbf75888167db20e18d302dc87a9b967a41d1f21762b2010e52362400feeed6e34fb003cd1ef51fda1174a9d52d7656bfd6a6f6ae26b26234c48e04f85b96b9ad61d6b950f31f9cd90875cd257d5b90bd21f6bd0642d48e18cea9421745f7732c44a247513c01376b9c346e8c488ef337cfa3b65a032264561"}, {0xa0, 0x0, 0x0, "58cb4a7a880b6db66c3915a827237863609c73ff78a5a5faee271db6d0e572f2a9a6b4ecb19a56a88a5ccea2e44aae963c52a711180e280280f88852a0e22706a45f6d164b63d4a103010409bb62a206802b97254d650ace450eefdfdbcd0f330c75d779aea496ce755583f5e654014c8fa59f179ae24495a702368663bb2c0e446993af44cf91bba3bf78346706"}, {0x10, 0x113, 0x10000}], 0x1f0}}, {{0x0, 0x0, &(0x7f000000a680)=[{&(0x7f000000a4c0)="6977bfde301724ccc266652cd72918e8c37394ea54478d2ea1fa0f203b99b1404e5cdebdf12edbf3e026a7d021dd2270466cbf236530dc6235d2f338d11fcda41d3412f5189ae7420f2a431c", 0x4c}, {&(0x7f000000a540)="3d4f80bc0219afb17ebbfc330c251debc89709fa9b6a9b3764c5c393cd4cfc1fcf199574738ea5", 0x27}, {&(0x7f000000a580)="e9b1c95b06139341b7b49d4dc064d4983aeeb6d6139493992a307d046e0db98bab9739294e827d6a43d34a2fbbeaf080d5b5e0f468c9f8028f6d14349991aff69f549603448412e133b9609a6b52778437459612c13dbfe3983466da5a45dee664f580b36d6e5748a6a141270b2bad328e8bb423b00cc4b2dd185c1c0b5b037856c5420358266250e1f899e142cfecfb4fac554a0c9b20233f6c59963db80f87987f8160762c449065a9fb8aa7c10c610e882a371fe0329771076263e9cfa42e04abd6", 0xc3}], 0x3, &(0x7f000000a6c0)=[{0x28, 0x10f, 0x80, "5a9cf238c4ebc43faa3d1628800ba4503a32"}, {0xd8, 0x1, 0x4000000000000000, "594f0a71911a553801ec66c18ee8804414484d39e6d23d3aafa4a56c5b35fbe99541878266d933ff121ce1e62f4c4e69baae4e2e08d8dfb70e3df0907a27d1ff736f1f295dcb7db8d0e30671751d4947253e0ed6bf365751cedae89d4006481c30b5fcbe27bce8737da6b9d93f104c66ab54fb67f7332f68894c201775b0ee6942339865fe1b04949b4eb25a35332d2d2b17de5406d81268124b2ea880e0fd067a5bcefe66fb2de37c781ee6464c9d320a3f8c31171ccf2c9917e5073ad38685dc1c7467b47879d3"}, {0x78, 0xff, 0x3, "440e8df24cee770104b7a6337a8a48ee7ddf3dad1f934c02f01a504e26ce8ef92b1eef2c852e62831ddb543bf543710a7d115b23cfff97d276a7f2e145f1c3d8798ba423d169b117bfdd959d81c8a6ebe5692b5c5719a9f9d20ad649bd6acedcce12a6"}, {0xe0, 0xff, 0x3, "725c79add72656564627607411569f42f8e3ce3380953c15256387b36b4ea1a8d9e30ddbf38a0bf58e4fecc541688d12ccc931cef91003d1bbfda0271af47a3d14a98655622b0ffb8acd599907508f242e3b99007c5de7e87b864768e57d6d4426b403e30b0c461dfedaa2d6267fc73930d69c5b105e138378dc619ddc138a39bed1d577a0514e6ed7ff6761fff2404c19b9eb7a5cd0e2d50cc02074772cccc11a1ee63f1868bf99b6fecc8f5e21c30237f2e00d308138640f6f75449cd15d1f3a221d3b4e762b8b4ca86dcfdc"}], 0x258}}], 0xa, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000001700)='/dev/usbmon#\x00', 0x89, 0x2) bind$rds(r3, &(0x7f00000017c0)={0x2, 0x4e22, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 00:38:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 460.600234][T29019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xa00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:14 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x5, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x0, 0x2) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000080)=r2, 0x4) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x10b82, 0x0) ioctl$CAPI_GET_ERRCODE(r3, 0x80024321, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 00:38:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 460.745379][T29053] bond0: (slave bond_slave_1): Releasing backup interface 00:38:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff000000, @loopback}, 0x1c) 00:38:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xb00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 460.933284][T29065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xc00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:14 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 461.100927][T29101] bond0: (slave bond_slave_1): Releasing backup interface 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff010000, @loopback}, 0x1c) 00:38:14 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x8000, 0x0, "69eccf989e5353eda45953404a212ac53b05dc9111552a5a1346b4e1cf99b6a8e215f7c11c752452afca5f52d00addbf5489c8f7dbc2d19b42f7812ddb922e84fccc83d26ccb17f186ce9623052a3a5c"}, 0xd8) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 461.218624][T29115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 00:38:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 461.413865][T29140] bond0: (slave bond_slave_1): Releasing backup interface 00:38:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 00:38:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1100, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff030000, @loopback}, 0x1c) 00:38:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 461.693986][T29152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:15 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xac0ea5ba7ad7d87c, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000140)=""/193) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1200, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:15 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 461.962469][T29202] bond0: (slave bond_slave_1): Releasing backup interface 00:38:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 00:38:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1300, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff070000, @loopback}, 0x1c) 00:38:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 00:38:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1400, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 462.233157][T29210] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:15 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000004280)='/dev/amidi#\x00', 0xfffffffffffffff8, 0x80) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000042c0), &(0x7f0000004300)=0x4) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f0000000080)="e11b9b6753666b619bd6ef4819140b0f1f22cb69f758ffe9df07f9791962f0a3aa040beecf670852087e1a354e83a7aed0b80a1d6a8c62fdc3edd7535c19e685d7e29f22c4b4253e7a6202ee579a28ea66f172f93edb0a22cbf481") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1500, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff0f0000, @loopback}, 0x1c) 00:38:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) [ 462.517107][T29259] bond0: (slave bond_slave_1): Releasing backup interface 00:38:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1600, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff1f0000, @loopback}, 0x1c) 00:38:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x2503, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 00:38:16 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3c01, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 462.861419][T29271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:16 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x800408200) 00:38:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff3f0000, @loopback}, 0x1c) [ 463.029405][T29317] bond0: (slave bond_slave_1): Releasing backup interface 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3f00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 00:38:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:16 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000000c0)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:38:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 463.315675][T29323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x140, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x7) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000140)) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x100, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffff7f0000, @loopback}, 0x1c) 00:38:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4100, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 463.583497][T29368] bond0: (slave bond_slave_1): Releasing backup interface 00:38:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 00:38:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4403, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) [ 463.744442][T29379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff0000, @loopback}, 0x1c) 00:38:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x5003, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 463.930896][T29417] bond0: (slave bond_slave_1): Releasing backup interface [ 464.050656][T29423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:17 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x95, 0x9, 0x1008, 0x5, 0x3, 0x3, 0x2, 0x3}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff0100, @loopback}, 0x1c) 00:38:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x6603, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 00:38:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x6800, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 464.425602][T29443] bond0: (slave bond_slave_1): Releasing backup interface 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7101, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff0300, @loopback}, 0x1c) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7d00, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 464.594544][T29453] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:18 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x10001, 0x4000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="f400000044b0c68206d2e6e49c90c38f2a3dc0d624aa6e495e0b11c6f4baa344b7bc8410e39f1959027a18ce197d8d039363f6240c7c00d716c2fd689bc88797ab8e3f415a001b0e2fad62d306b101d3e5ea753a82524ee8a21e1117eb608b2b5edef7b973bccd4f76d812dad7cbe7847f617a6d927312400e181b5721e3c9c5485e7d6af4818406fef8fb631a882326703eed9f0f7353bf651ea562b013ade7cd7cfc58ff89c8f882c017a1d81200128bfb021746ff97c6bddfdeea69390fe856dff624ad213fc7b889d28f5665401894977a7b322d90d32b7c36bd2eec15fdc8cc62f227a2845c3c2971bd6914180614d66272703272e02e7d02cb09"], &(0x7f0000000280)=0xfc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r3, 0x1ff}, 0x8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @loopback}, &(0x7f0000000140)=0xc) 00:38:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8003, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) [ 464.791305][T29489] bond0: (slave bond_slave_1): Releasing backup interface 00:38:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff0700, @loopback}, 0x1c) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8e01, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:18 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x302, 0x1f}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bind$netlink(r1, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfb, 0x100}, 0xc) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001340)='/dev/btrfs-control\x00', 0x4000, 0x0) recvfrom$unix(r1, &(0x7f00000002c0)=""/4096, 0x1000, 0x2000, &(0x7f00000012c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000080)) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000280)) connect$netlink(r2, &(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000}, 0xc) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 464.955161][T29499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) 00:38:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 00:38:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x9401, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 465.093028][T29528] QAT: Invalid ioctl [ 465.128250][T29528] QAT: Invalid ioctl [ 465.138961][T29540] bond0: (slave bond_slave_1): Releasing backup interface 00:38:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd403, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff0f00, @loopback}, 0x1c) 00:38:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xde01, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff1f00, @loopback}, 0x1c) 00:38:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 465.340998][T29567] QAT: Invalid ioctl [ 465.346292][T29546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 465.368555][T29528] QAT: Invalid ioctl 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe403, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:19 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x18c41) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000140)={0x0, 0x81, 0x0, [], &(0x7f00000000c0)=0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xed02, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) 00:38:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff3f00, @loopback}, 0x1c) [ 465.612420][T29601] bond0: (slave bond_slave_1): Releasing backup interface 00:38:19 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x5, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') sendto$ax25(r2, &(0x7f00000000c0), 0x0, 0x800, &(0x7f0000000140)={{0x3, @default, 0x1}, [@default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf203, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf803, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) [ 465.864811][T29607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffff7f00, @loopback}, 0x1c) 00:38:19 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x4440, 0x0) recvfrom$unix(r0, &(0x7f0000000440)=""/228, 0xe4, 0x10002, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x7, 0x0, 0x0, 0x20000000000, @local}, 0x177) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) fcntl$dupfd(r1, 0x406, r1) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000200)={0xf, 0xffffffffffffff8f, 0xfa00, {r4, 0xf}}, 0x9) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x408000, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f00000000c0)=""/26) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x30, r6}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:38:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xfe03, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 466.039205][T29656] bond0: (slave bond_slave_1): Releasing backup interface 00:38:19 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x4, @link_local}, 0xfffffffffffffeb9) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005000)={0x0, @local}, &(0x7f0000005040)=0xc) sendmmsg(r0, &(0x7f0000006880)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)="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"}, {&(0x7f0000000080)="2da33e6530636a20702d7c8d188ff12a24e7a055ba18"}, {&(0x7f0000000240)="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"}, {&(0x7f0000001240)="067d3c3fcfa39efc4382df4a36e0eee1bb7c967630b734d3483035996b8f6fb8f655462f2a5a4fef2e1d26afe831a31baeb92423e678efd7f609b4971c46c89d9acf9606610933dcdc005a030a9aae47f9cdfdd3085e0d0ad4bc671d95757f2f2f24c20f4e65174d1196a9984aca524628e77458cd6ec089b7a184355e9ed783281ccb879e4fae5955b92ceaa24a1152d1ac03f6edb887adc2b3b698c3eb64c4a041265adc8d49457147b91f992f11704333635b8c76e988a60f4268993b375ccdd10c52db19ae8ea14c"}, {&(0x7f00000000c0)="789ae2e1061da4a4b2b197d5881bf78c1fa6e48f599de4"}], 0x0, &(0x7f00000013c0)=[{0x0, 0x107, 0xff, "9a1ed3c2b32edbe596e8973d265f827a8e81d77f8a551d3fb393e4d960e262ac9533b4655d0f2b2de1e17e1369e17836c702fd1e985d8e2d030d7c49b11d08c8cf18cfe5382c5dee011190ef53ad1ff2e0207f1b315319f8f683965c0693e2a75774517d3773f003b5bfdc"}, {0x0, 0x108, 0x0, "ed7c8ac1d24323441d387c2d71fdfe56a8e23106213d4d4c2f7958cc7ac0c2c6bd46df4554df77314b2aff2ab1de7c46f7eca77f072bc9b40f74dab76ff821fa7d979263b10bee1da4bf6624bd9fb1d9431f0e3671037dccce53db083f6fa77f04107f3c1004564afc921eb31b5cc0972cecb930fe4f48c83efab857a23adb3c5710b8d7281ff26c5ff0cb0568f814f9e189ecf3455dbbba2322a3"}]}}, {{&(0x7f0000001500)=@ethernet={0x1, @remote}, 0x0, &(0x7f0000002600)=[{&(0x7f0000001580)="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"}, {&(0x7f0000002580)="b2aef7f422c32341a8361706e0e01d883b581c7c19f6ae78f7295b0b22cf6a41116758ca122ba0f31b6dc46a5053b97d005c386bfc40ac7a6809949b995f656ba0703c056be0151f7cbd12a67955d4ddcbaf3e48d7ee94cce4bc92a2ac3da7a0dcc81e9c"}], 0x0, &(0x7f0000002640)=[{0x0, 0x10c, 0x1, "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"}, {0x0, 0x103, 0x7995, "25f796b1076f9d3f707f2dea180c3402dc1d58931925c1f7a26f1fa3a991163d8f"}, {0x0, 0x109, 0x0, "f1abc7a46493b6b4c4ab462600079fc79c42630a411fb0887fcf476d42d56caefaf91782563c38ce13620e94784e6d86356913e588a30ac61a71fd33a5e5ac3016b5239bf1d1fd977036057d27c4c01c65c00f84365cd071d7e4e1c37d8456af6248097ff8fc4286c655815d0b97884381220f8947b18c26eb1b3f8cd0d4578fdd11f16e4997364c3b0c9034a392e9a5616e8808c55fec779d9b09d9bda76c3df836f08006e39bc81b71"}, {0x0, 0x3e, 0x1, "e0242a1bdeca1f9bd81cb52ca7a71a7667597ed259f1ab27edc0801858a1867a4f9c1900ffea1d714b9a15b807f126"}, {0x0, 0x107, 0x80000000, "2616b97f0fcf0fd64c59ed46688639ffa8dcbd493f8cbbd51c0c2ab0de8053376ca4a4b4edde5464964e1bf6335b706497619270d09dbb6205de632890fe55fff6e87547e2262c87f45d58cd9a5fc225a689f93792a5809cfb9edcaf7f3576dde615fe7b17ee90a7726dd40f40851dc0f5ced1e903eda373d39e7740b0bd08792bc8f977683f6cc838c4d2c72cf2a0541cf7b727b19574697824c1da"}, {0x0, 0x10b, 0x8000, "0502e965779b2aa0cfaf860527bb5ec4c7a42cc89a3dfc0fc1142906ea165c3ef8c97195cb9873569f9d493e8b38e803511503cb8b74222e95fe3fd4ab273f47e2f484a14e1418a1fd"}, {0x0, 0x109, 0xd924, "1e199b5e03880c6bf49f5dc73d52b2a76faf825d20df7095acd2abd93f7eae3d104eb6738e75bd1b9437ac94d52b2cd5fa4897ef659c39b569cc16fb47dcae2c005243a2d341a74bf2c2b3f9b7e6d2c6d06fd4"}, {0x0, 0x10e, 0x3, "87777e8f9202314449338a4ecf358c008761bfac115b20ce92dca2dfaba4446c1eb3fa0f4725e45c3832db2b229d2cf3a3e6e4838529b77324e07ccea5773adc9bd2673f7a60268a850a9cb054a03b84ea22f480805bdeb22c6252fcc316e17538efe39e5febbc346f96895d172e359e890e8b18c252bf235d3386e3139ec4bf1ef2f3d630fc9920bf58c8d3e974293c3042575b497abe72103143f5bf75941d0015d6f2a702475fe676b01f08fa882d0e6be0e5fa8b579394f408124f9067793853bcf09f339631f270c8a075d1fdc7b80a9e49152c03e21b358f3383eeb5"}, {0x0, 0x109, 0x1, "480722b40505e616fb32f920779a67fbaac468d7fd778510bce145b5f96d96eae76010508bba4fa4cdcedf04c991ab0e019273170aa451982b373f3fff49c7c57346ca8133103a938714e7557facbc46eea80378e684a30a57cc77e2d8851fa0e96cc2a3fb2c6c9834686dc6029f06b084bd9c4230f09bda619aa22af65e42f3b0a77a408d6a884e49472f68bc20e08b05589977018b02d316c9be48213b7e881dd59cc54fdcd78991e61ee5768418"}, {0x0, 0x105, 0x3, "fe0bdd0609e4f1fd2a1c235c3fc4777d8378b0009376b1ce640d310fe3cf9fb5f5a9a9ddf4bca0819a7f0b65514859d90f03eb30463ed1df6f7ea8b0a4c6e60093447ec178ab2b43b7c65dce7b65"}]}}, {{&(0x7f0000005080)=@can={0x1d, r1}, 0x0, &(0x7f0000005180)=[{&(0x7f0000005100)="4d4a0b826f3641e7a7c34e8f8796f3f53b9a7e5bf12a924752adb200a06ae8a7a7460cf40fb2f8ffc934e44fe40f0c6b77bdf1"}, {&(0x7f0000005140)="46b386172cd4cf538725e4d2d6a7014457778da17c18bee183bb152d7fa5b9fa"}], 0x0, &(0x7f00000051c0)=[{0x0, 0xde2c97688aebe5eb, 0x1, "5cf92599459d0f9e9a75975efe83d7d771f28b5e62e8961d5f7c19e6722039b06c661710eb4fab2064ee6b493e196e28c381c26b2fb3e0fdb520621e03160778cc02d91b2cdf5f913838529125cd031743eba0c73b361e3b74fbbb1c440f83e250f62f82f23d1f172c09c1b72b4ec186b4fd"}]}}, {{&(0x7f0000005280)=@caif=@rfm={0x25, 0xffff, "76151f5f28e8faadbd2792f96a8e20fe"}, 0x0, &(0x7f0000005800)=[{&(0x7f0000005300)="1c5661206e13f232f5053526ed9cabcff45146813484600138346007b46957b881"}, {&(0x7f0000005340)="54ef6df16cc0ab3b3c36df8cb4e8989960b1bb7461f7ead9c2efb7c1917542e6e257261610c8561c5b7b6045fd4ddc9f1a9ad4bb361f655ebce999d72449e76bc0c15a6a40b938d67131dd25c99278980f2b3e9e6eaa22eddbc9c028394c4e935c36b7c84f9a5d3872131d82bca4dc47c5d9bda651fb6e83f89ccfd330ccdbb179fd666cd540ed84f182cae3a7ae3cfed251e6b1fbdb9f995eeae850a0456f387842969ae4121c012221f1aaac2c3448589857fae0bb8d065b01f7c2f9a30b84245e19a587ca04b7305edafc3d4414410c6af21bc847b7e47a014fa567bada1d3bcf429d317521919017833dcd489919e7cce26e97d84055"}, {&(0x7f0000005440)="a18f25079f23e4b52695b07d7d2a3a8291cb7a7a43af854ce44dab820eaac6eb43087f9f62f1566edeabf5860d54cedf0a4096aec5a5915f76cd49ef1a7468b5e9dc357a3d4c16cd220542a2d594fdd0419a72d96f02b4b69505be14290104782fd27c921903f8d2e5e47a9e319fd4c9895c1e9c33a268a22f8540bd9959b8c7a399e978ac9b4cffa27828a2"}, {&(0x7f0000005500)="145c74ade49992fcb87b9955e6a77e3ec63cbc5751a4987693243bb44dfc9284842deeb0e30aad10a0951dbcea8df4ae7f5493434993c5717fc91b1a6cfa6c7211e312a5c36f738fa757bef6f2c838"}, {&(0x7f0000005580)="b01d42c9626f89f531cf"}, {&(0x7f00000055c0)="541d7b85c74b12568d61686b348d647c31dfbe74ec840e14a2e8267d1abb904c914b7fdeaf3d33a8e59ce1755737327b33bb26247208d9cf790539c22221982d09eed43eb63cc6f4eac1fdfea9421fcf1af0fb60a2b71dd998c3557c0270ddb71f37a93a22b7afc2ad1805576649563fecb65250596b2e5e6fa62355b0f95160e0902d186a16f3cabe6c34ddce53612057955bfe9e047e8ac97fb3f8db5d1914bafec4f175899346700835c1de875f59602638a65b18a55aec67f835d22b58d85c6490ce35ef60cfd71401ce5da129c652acbe7a3c433f4165d8ef307bf55ca111303cf86f8a"}, {&(0x7f00000056c0)="17d1c4899d64973b4542afed563c6cd9fc7d98ab7ae44a02d671b8ec1b151b482084d1d1691f6ecea5bec1f5ffc454ed28467b8735af866edb8beba834dca76b9dc9e20a20169244544522e9336291c28a23ab790e6790562ff86b38b41444c295ce8079069c9a7daf568e18d378963788f272203bd3375358be43fabb9ee9bb065a"}, {&(0x7f0000005780)="d2a643c0c7cf41c1da9378d3aeb5d5e47491c27d81cdca9c1bb3ab54f3ced8bea3174b2398acb7cc0749399c182a63dca8300061d5f2ad64a910ea404cfde7f6d181caa3dafa6cb3d5aa13930d7763b41b5c2aa1c0ab80cb"}], 0x0, &(0x7f0000005880)=[{0x0, 0x113, 0xfffffffffffffff7, "0c614ff359a2bdf87b6c8f41fd8fdc08dd1670e6a8e3955d30ee144e1568b5c925701c265b6d248ff967fa64b4ab98b9ef9486e93925"}, {0x0, 0x10a, 0x1ff, "0a91b48bae6d5b381ecdfba3f3fc936ea4ffadd4f58245026515295e05c36ece353cfa4d2635b8e34e058d88a42766eae658a6f23919491a9e41465b5a60e015ad021684cdb7c79e41fcecf0b7f9351ed92b2a05f89ff3260084b8041712ccaac809d041d2e18475e84da564f1c29e760d746abf2f594805ec075fa74ce8a2f4d5a46c95b9e51616f071ecad061f624fe97ec1f20a369bc16c83acc221fbc277a9ca3d42d33fbc4f6dc5adf1b974ddfdb11b7682c219ea74c1baf407127cf21a17ae2a8a0034d81d"}, {0x0, 0x11f, 0x10001, "d69ac7cfceaf9893ebdaa7e195faaf27978d398d072909132ca73fae04639664a2e66e80c653c5dbe43f150839e1d6a11d8a68fed72a5687a20dc8b86b618b9faf3bb9da48944e50b176d0b2e44013ace4b3c1f8c2b63b8e41bbde5944aa7c65f8fa4280b39cc9cee6d7534123c580eeb6b1f595838c4831cb19cd31c31d5fa452889907606abb9675ba2a1d9d80172d3e1a7b5cb00b27e0a3fd75dfa4b03cde9bc38f96fedfe9b937e588a96f062c4a5305c2135497b5d74554dba8eae92e2a87668f1c8c"}, {0x0, 0x10f, 0x4, "f87bfda9bbfd40bbff1adf3fbc3347b4f9482e6c78"}, {0x0, 0x1, 0x6}, {0x0, 0x0, 0xfff, "859449bcb63262d5def402b0dc54b3a631852b5c6d2a9e534edd00fea377feaffa68dd880b8ba5e5f07394752f5f89f3acee2613f384ae7629711a4a229c237d669c8fbfe02393f3580ed4d5632b337ce2beaf6f17abc40349982ba8481b46232a598e8c40988c24a80a15a2d647d81ff158672cfa80a017a1f5f1623ce467476188d66bda2a5dead6848930488fa79e87c493235ee54fcbcc008ba76703045db729e45f2acb71759a73418091860e10ea4e7132b2da"}, {0x0, 0x10c, 0xffffffffffff0001, "21cce150623f46946da4035aaff116b75b02ddbf6eb7e6f225a78c097dc363"}, {0x0, 0x10f, 0x3, "11e78a07c5048886dacca354c64da55db450f65193294bde489f76bbc6b7dc989f28891f6122c81bbaf50af222c901bac693d514da2e1da989ea9f6d81503a1fabbce0865249cd7824acc3013add5042688aebd72f6907718f14e5dc0416a435fa58b6a76e0bad9427302c8571bf3820fa865fd1c4315d8adae35ffa76f8b4d90e050170213b48b3bb3543a2aaff50eb4b989815305d1704ba876372288fa9422ca19ddea5bc00ff0861ed870772e52f40958d4b8fbf71ef7b07ba66f0fb51550f2dfa96436bde1e5a4d34394348c29d52a6"}, {0x0, 0x18c, 0x6, "30ec546ae87362efa6d151f6f88902288fa2e1bd2f848cc5fb1e130a6f8b2c07f7c413391ebc99242764944cb2ea80594bdd25750f5c6aac764067219e5b3952a6375e9499d8a0c1995696314d6189105e6db4ddf30331094b50f3a22085267f2e335e18730ff875f02698a632a69dae3c4f54ffeb7913ce064216a690256b42a5ce02c2aca9ab63de575de25ed43e1150cc2aca44156cdad0e08c882ae109d9256669a626e2ccfc6384ac68dbe1037274a8ae42ec8d0dfbc720382750ab730133f3fdda71"}]}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f0000005d80)="76d4d1860f4b0d10dfbc617e0139af590ddd3651b23befc7edef04a4f753c3bb87a6b00281371e7cae9eba3b2ed090862870ef0b801b67b3f5bad2274b1773f84c"}], 0x0, &(0x7f0000005e40)=[{0x0, 0x101, 0x7, "4c91a7d67f28d191cf2d2aa65053e37214c7eb139517f2300b557b3d1e7de764969dfe088d327b07685cc874e7420e449e4db2fea0b0f05dd92a487eb665b9f024d99d2a9ff165e3bf4f846b38f5e1f1770236e5c8c7122ffdf297f093fab645dcfdbe07cadce653f30f613c89f33e17578d1de34ae4ebb9e7028352b8fe3cd4aebd9ffd58199bf6eee96b5253"}, {0x0, 0x0, 0x4, "03d2dbe02cfc7b3abdfb1a0c0e9708486354ac94536a2272e056c93f44"}, {0x0, 0x109, 0x45edfe1c, "a15064555cb0d69cb48108699563cf8aafcdd7893a63a710ea5ce94e4cc1c9d555de9d9fe7a126fb36102d81b00edc7677844bbc6c129a0ad007b24b8dd00385621c2d7fb033f7a58c6fa4f07b1ffa0b8e4b9a08c306304477ff6ebf339ce2a2e40342f2cefb07ed816064a938b4c15242b5f84b3dc775c3c905af6ea1b3b96a9bf51c1fd89e75204a2e9430f1195560c175cf95b3a219f586a10cb4f0c5bbdc0f8a0ca570f5cf09f3112bb5ad2d1fdda9714a70f24b35323118857199f49fb558beafbb3f843791f046971d2b58bfd62b45efed5fe12af963a2c75f55856cc2df958ebb07b89d32063af8a00c73b0ad22b3b240"}, {0x0, 0x109, 0x7c6, "99dfe6d50a56948b205437083071acba4cff32c32a9ac22769de4b4c7f013d9f6a3c55026b433dcd7653030f3019be2c5a01467881eb139ba3e453190fbd0aa397afac9c67df14cdfecee124f7186ae25aa3920251364343b39d4e6051f92033bbe759773e14b86c333eec5dc3d79436659f8be8a2d07d3f0bfd0f036473e392e2c9de683b4848912b7dfa6940c9ffd0de9342deeeed82a198990bd58540a6a2f1694b4ebe8433e923b0475d07d338d0a3fb9ea1bd6225db5e6f4e49339491b67ba779d7a26d529e8ef98c6cb3a8383d020bbd4f6b2fe110bb38c44d83e549e3afc86f8edec4c5"}, {0x0, 0x100, 0x80, "7a578319e89a249e2a8b9ac2b98cabe0ba7d1c23f9ea"}, {0x0, 0x112, 0x5, "b6c331baf50f7c8ea3a7f0066c465b77ebfd8bdcc590b110d5309eaff790df8b05bee81f6f1618ada3507e4aee15d83868994ec1e43fc02ff74f758cef14d4e3dc9497ee4d3067425955a76dd30d0b33bef9efb228d3f7c4bb06e3c32184d000927194dbe625a3c91c8c391e8dade915033e738a"}, {0x0, 0x1, 0x1f, "162e854a7bd5531998dec98839444f62ed0b13f211e6930f113c8986f47f4b34ee8c710e54efc9aae891707afaea751cd4e5ed6c9dc44fa73bc31886fef5e7d46b73f3b79f18311ca33e682e206c13d3331f2a95eee04f2b3f50"}, {0x0, 0x118, 0x80000000, "f8ba4c8b569cfec51013866fd1bcea4c5323dbab4f53d8b8baa062fdf551acc852562a023476d711d1d8a656237202b5"}]}}, {{0x0, 0x0, &(0x7f0000006640)=[{&(0x7f0000006280)="d348c54371a067d95c6d06bef453d83586231cb96f751ac1c6a0bca11c53a5435cf2fa9b388beba9d6f3b884e3c1c33633abced6adb4cab19eed83d850bb7a6185181a8d590b66812389754f3dd6100786e501c1ee0c5694dcd718b39cf7cc2cbd53dcb908eb5b7bbf5e9d646e98a3538e7c1ce48009c2cbec2a90a351e77902c1a1a326a9067f0d6429552946ac5f9ddb8015b2061c4703b0230d5bfce9d5ee34518e21dbbc5fce903d1b045ba54bc67cfae187ca9d49dc2fffe7aa5d999da7"}, {&(0x7f0000006340)="3df16775fd19837082e7c54a25eef70d7a3874a4cd1ca864e2ddfdd2b4a3d1"}, {&(0x7f0000006380)="810d73794d722e814bfa99876c4a701b0a77cdf41a1af0e4248fa1297f4a0fdbb21372dd3197024339877343b892a9f23a10f6b72132f008dc62d88abd9a007e85ef7145e08957c5ba7e31de1fab8746194668c6faeda234e900e16856fa664a6477fb6b94fd0067f4626a67f25e75054508f15ee81a26601306afb77d75e14cf4cb3eb44bed30603f484b77ab69b5f17184aa3ca49e5d9366e819e07d90f0c75c9e5ab9395bf7e5aa3c217094aeaf5a68ff6ec08dfd"}, {&(0x7f0000006440)="b343"}, {&(0x7f0000006480)="e5b3998d"}, {&(0x7f00000064c0)="48b02419760f0dc1ff7736dffbd2585a09cf5495240ad8bde33b9ef8229457055200423b6226e0ed46812afc7a680fff167f93244ed1196d434268c4e6b2210b710fca6e6d4cae8e471ab59c6f7a103e9c196a456380977c541edc8ffd2e6c0c4c3794228dbdc296921e42fadca961be81c24293a23edb1cfe9d0271983326b0db7f7b5e78619d9ad0206f4f41dabe98036502150e56"}, {&(0x7f0000006580)="0e853c6af331195017a4695fd7f23a2ea0bd6ed679b05d1bfec38db535b32d36d0166c1e655e65a70e7a38488dd3d336e55667b692df71ec0a840583a53d7147a141dd1a5a9ef529811f579c1bc4ae533ea4910e3d473d12acb3600cc23a8b2207bbc0ea23f835dc3a23fe0a392862bdf3f20a2e69b3f74ae4a8f0463463ea7a0763925abb31f6be7867f7e8b287f4a2644561c40ebee7a8a4e7bc3d23c78414f088aa0ade9165285d2cf2c129512e204a5eb0c896d52f676df9a05da19e3c"}], 0x0, &(0x7f00000066c0)=ANY=[@ANYBLOB="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"]}}], 0x4000000000002e2, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x40000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff00, @loopback}, 0x1c) 00:38:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 466.248900][T29665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:19 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x121800) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x40000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x1, 0x0) fcntl$dupfd(r0, 0x406, r1) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400000, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x1ef1fa0052f542f1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x86e) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f00000002c0)={0x9, 0x0, 0x80, 0x5, 0x10000}) 00:38:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x2000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff01, @loopback}, 0x1c) 00:38:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000", 0x3f, 0x10000}], 0x0, 0x0) 00:38:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 466.438588][T29711] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:20 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0xf208, 0xbf, 0x9c, 'queue1\x00', 0x3ff}) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000240)=0xb, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/rt_acct\x00') ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x702, 0x1, 0x0, 0x0, 0x8, 0x5, "74976523e6bb93e27fdd948d22faa6884af249f8d466a7b9d09bb03a02c9b2e18bb7245c8617ffc42ccffdc8ec31c527f40be0c6212678b98a84e0f4491effb6", "0f6b16b39f3fc661beab85ddbf593591886a756193d00e9563a74473c05549401f35005cfc72250616f4a6763c6abb4d6fb44004aeefedd8b243a15d2e556b70", "eba7bb935774ba4cecc69776dc1f1ce88628cd24a212f0eee064051be9658623", [0x200, 0x1000]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x2010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff03, @loopback}, 0x1c) 00:38:20 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) open_by_handle_at(r0, &(0x7f0000000140)={0x1008, 0xffff, "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"}, 0x101000) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 466.677128][T29747] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x248feff, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:20 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x80) 00:38:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff07, @loopback}, 0x1c) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 466.893602][T29775] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 467.022958][T29792] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:20 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 00:38:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff0f, @loopback}, 0x1c) 00:38:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x5000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f424852", 0x44, 0x10000}], 0x0, 0x0) 00:38:20 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0xd00d5a9cb8e24125, 0x3, 0x100000000) setsockopt$inet6_tcp_int(r1, 0x6, 0xb1841b367a89321d, &(0x7f00000018c0)=0x2, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x40000) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCXONC(r2, 0x540a, 0x6) 00:38:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x6000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 467.282285][T29828] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) 00:38:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff1f, @loopback}, 0x1c) 00:38:21 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x40080, 0x0) getsockname$ax25(r1, &(0x7f0000000200)={{0x3, @rose}, [@bcast, @bcast, @netrom, @rose, @null, @default, @remote, @rose]}, &(0x7f0000000280)=0x48) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r3, r4/1000+10000}, {r5, r6/1000+30000}}) 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 00:38:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 467.511722][T29862] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:21 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0xc20c0e0d39fd2c80, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000240)) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x2, 0x0, 0x0, @link_local}, 0x6eb1f916eb44b520) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000000c0)={0xa, 0x100, 0x1, 0x684063acce50bc4a}) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000680)={"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"}) 00:38:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xffffffffffffff3f, @loopback}, 0x1c) 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7020000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 467.721310][T29889] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:21 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5a3e, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) 00:38:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x9000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x2}}, 0x1c) 00:38:21 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = dup(r0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x2}) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x20e, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 467.964854][T29924] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:21 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) write$input_event(r2, &(0x7f00000000c0)={{0x0, 0x7530}, 0x0, 0x8001, 0x2}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 468.069322][T29938] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xa000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 468.195500][T29953] bond0: (slave bond_slave_1): Releasing backup interface 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xb000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:21 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x16) ioctl$KIOCSOUND(r0, 0x4b2f, 0x94a1) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) write$capi20_data(r0, &(0x7f0000000140)={{0x10, 0x10001, 0x87, 0x80, 0x3, 0x55c}, 0xe7, "cd34bd063f924e474df6b2e9b9a40ae3c303ecb86c3def197c722acbe893c591e3cc8ce4cfb693a9e5be3e3a992d394a9895b934ca6e193f0bfbc5e3450d423d4707f59bc9d2a7f91b9c66c9c9ea3adbe0b94866aedd07f6e2049543fbca7ada0a5658ff58b2cd3614d4b5b50a5325234328d75ed6d5567a567631e264dbb37d4f361fee70f34ed378bf86da8da3abc2fbd058c51112c23c8edafd54c3568841b9bdf93db1039690c4dd7e560ea9913f488c1b740fd0986d9c90a89f7d1c0249855985e3ad050dc4b34d99fba9633f321e2b9a098e1efa59080450838d1769cfe3d6b579311a10"}, 0xf9) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 468.313455][T29963] bond0: (slave bond_slave_1): Releasing backup interface 00:38:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xc000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 468.393486][T29961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x3}}, 0x1c) 00:38:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:38:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:22 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:22 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r1) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 468.958901][T30012] FAULT_INJECTION: forcing a failure. [ 468.958901][T30012] name failslab, interval 1, probability 0, space 0, times 0 [ 468.996094][T30012] CPU: 1 PID: 30012 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 00:38:22 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = dup(r0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000000c0)=0xffffffffffffffff) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x0, 0x100}, &(0x7f0000000180)=0x8) readlinkat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x2}, &(0x7f0000000200)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 469.004096][T30012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.014138][T30012] Call Trace: [ 469.017431][T30012] dump_stack+0x1d8/0x2f8 [ 469.021762][T30012] should_fail+0x555/0x770 [ 469.026180][T30012] __should_failslab+0x11a/0x160 [ 469.031151][T30012] ? __se_sys_memfd_create+0x10a/0x4b0 [ 469.036606][T30012] should_failslab+0x9/0x20 [ 469.041127][T30012] __kmalloc+0x7a/0x340 [ 469.045270][T30012] __se_sys_memfd_create+0x10a/0x4b0 [ 469.050535][T30012] ? do_syscall_64+0x1d/0x140 [ 469.055224][T30012] __x64_sys_memfd_create+0x5b/0x70 [ 469.060411][T30012] do_syscall_64+0xfe/0x140 [ 469.064903][T30012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.070780][T30012] RIP: 0033:0x459879 [ 469.074662][T30012] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.094238][T30012] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:38:22 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 469.102622][T30012] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 469.110567][T30012] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 469.118525][T30012] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 469.126470][T30012] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 [ 469.134438][T30012] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) 00:38:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 469.255121][T30033] FAULT_INJECTION: forcing a failure. [ 469.255121][T30033] name failslab, interval 1, probability 0, space 0, times 0 [ 469.268499][T30033] CPU: 1 PID: 30033 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 469.276485][T30033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.286536][T30033] Call Trace: [ 469.289840][T30033] dump_stack+0x1d8/0x2f8 [ 469.294191][T30033] should_fail+0x555/0x770 [ 469.298616][T30033] __should_failslab+0x11a/0x160 [ 469.303559][T30033] ? shmem_alloc_inode+0x1b/0x40 [ 469.308498][T30033] should_failslab+0x9/0x20 [ 469.312982][T30033] kmem_cache_alloc+0x56/0x2e0 [ 469.317729][T30033] ? shmem_fallocate+0xc90/0xc90 [ 469.322652][T30033] shmem_alloc_inode+0x1b/0x40 [ 469.327408][T30033] ? shmem_fallocate+0xc90/0xc90 [ 469.332341][T30033] new_inode_pseudo+0x68/0x240 [ 469.337080][T30033] new_inode+0x28/0x1c0 [ 469.341208][T30033] ? __kasan_check_read+0x11/0x20 [ 469.346206][T30033] shmem_get_inode+0x11b/0x700 [ 469.350941][T30033] ? __alloc_fd+0x58f/0x630 [ 469.355437][T30033] __shmem_file_setup+0x129/0x280 [ 469.360438][T30033] shmem_file_setup+0x2f/0x40 [ 469.365090][T30033] __se_sys_memfd_create+0x28e/0x4b0 [ 469.370347][T30033] ? do_syscall_64+0x1d/0x140 [ 469.374998][T30033] __x64_sys_memfd_create+0x5b/0x70 [ 469.380168][T30033] do_syscall_64+0xfe/0x140 [ 469.384646][T30033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.390526][T30033] RIP: 0033:0x459879 [ 469.394396][T30033] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.414165][T30033] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 469.422550][T30033] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 469.430563][T30033] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 469.438510][T30033] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 469.446456][T30033] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 [ 469.454405][T30033] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4}}, 0x1c) 00:38:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:23 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x100, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x5, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, @link_local}, 0x10) ioctl(r0, 0x0, &(0x7f0000000140)="04f67d252f41dac3951bd3ecfd83971c729126265ff4c584ecbd4ab0ba6eb4767af07a04e5fe5b837f29ece1b8dfa68a77e2b6b4378d377a139dedbbda0eea7ad17718283b3409d6eb3b0889f9c1208f0f2d49c5c814f7f008a33fcf527af063b1efecf2e19a5e516639a4a5") sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_FP_MODE(0x2e) 00:38:23 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x10000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) 00:38:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x11000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 469.881008][T30059] FAULT_INJECTION: forcing a failure. [ 469.881008][T30059] name failslab, interval 1, probability 0, space 0, times 0 [ 469.905400][T30059] CPU: 0 PID: 30059 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 469.913408][T30059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.923446][T30059] Call Trace: [ 469.923461][T30059] dump_stack+0x1d8/0x2f8 [ 469.923473][T30059] should_fail+0x555/0x770 [ 469.923484][T30059] __should_failslab+0x11a/0x160 [ 469.923495][T30059] ? security_inode_alloc+0x36/0x1e0 [ 469.923509][T30059] should_failslab+0x9/0x20 [ 469.950156][T30059] kmem_cache_alloc+0x56/0x2e0 [ 469.954923][T30059] security_inode_alloc+0x36/0x1e0 [ 469.960037][T30059] inode_init_always+0x3b5/0x8d0 [ 469.964979][T30059] ? shmem_fallocate+0xc90/0xc90 [ 469.969920][T30059] new_inode_pseudo+0x7f/0x240 [ 469.974677][T30059] new_inode+0x28/0x1c0 [ 469.978821][T30059] ? __kasan_check_read+0x11/0x20 [ 469.983845][T30059] shmem_get_inode+0x11b/0x700 [ 469.988586][T30059] ? __alloc_fd+0x58f/0x630 [ 469.993073][T30059] __shmem_file_setup+0x129/0x280 [ 469.998078][T30059] shmem_file_setup+0x2f/0x40 [ 470.002727][T30059] __se_sys_memfd_create+0x28e/0x4b0 [ 470.007989][T30059] ? do_syscall_64+0x1d/0x140 [ 470.012645][T30059] __x64_sys_memfd_create+0x5b/0x70 [ 470.017816][T30059] do_syscall_64+0xfe/0x140 [ 470.022311][T30059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.028195][T30059] RIP: 0033:0x459879 [ 470.032063][T30059] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.051639][T30059] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 470.060037][T30059] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 470.067984][T30059] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 00:38:23 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) recvmmsg(r0, &(0x7f0000002880)=[{{&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000002c0)=""/230, 0xe6}, {&(0x7f00000003c0)=""/193, 0xc1}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/189, 0xbd}, {&(0x7f00000025c0)=""/170, 0xaa}, {&(0x7f0000002680)=""/107, 0x6b}], 0x8, &(0x7f0000002780)=""/197, 0xc5}, 0x7}], 0x1, 0x100, &(0x7f00000028c0)={0x77359400}) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000140)=""/138, 0xfffffffffffffdda, 0x40002041, &(0x7f0000000080)={0x1a, 0x310, 0x9, 0x1, 0x7, 0x7}, 0x10) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0xaa7c79ffd282db05) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000200)={0x0, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:38:23 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 470.075939][T30059] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 470.083882][T30059] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 [ 470.091824][T30059] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48}], 0x0, 0x0) 00:38:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x12000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 470.245988][T30088] FAULT_INJECTION: forcing a failure. [ 470.245988][T30088] name failslab, interval 1, probability 0, space 0, times 0 [ 470.302098][T30088] CPU: 0 PID: 30088 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 470.310098][T30088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.310101][T30088] Call Trace: [ 470.310118][T30088] dump_stack+0x1d8/0x2f8 [ 470.310132][T30088] should_fail+0x555/0x770 [ 470.310146][T30088] __should_failslab+0x11a/0x160 [ 470.310157][T30088] ? __d_alloc+0x2d/0x6e0 [ 470.310168][T30088] should_failslab+0x9/0x20 [ 470.310178][T30088] kmem_cache_alloc+0x56/0x2e0 [ 470.310189][T30088] __d_alloc+0x2d/0x6e0 [ 470.310198][T30088] ? lockdep_init_map+0x2a/0x680 [ 470.310206][T30088] d_alloc_pseudo+0x1d/0x70 [ 470.310220][T30088] alloc_file_pseudo+0xc3/0x260 [ 470.323555][T30088] __shmem_file_setup+0x1a2/0x280 [ 470.323568][T30088] shmem_file_setup+0x2f/0x40 [ 470.378750][T30088] __se_sys_memfd_create+0x28e/0x4b0 [ 470.384034][T30088] ? do_syscall_64+0x1d/0x140 [ 470.388702][T30088] __x64_sys_memfd_create+0x5b/0x70 [ 470.393875][T30088] do_syscall_64+0xfe/0x140 [ 470.398350][T30088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.404214][T30088] RIP: 0033:0x459879 [ 470.408086][T30088] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.427662][T30088] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 470.436042][T30088] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 470.443987][T30088] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 470.451932][T30088] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 470.459876][T30088] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 [ 470.467844][T30088] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x5}}, 0x1c) 00:38:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:24 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) socket(0x0, 0x800, 0x40) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:38:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x13000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:24 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:24 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 470.855181][T30114] FAULT_INJECTION: forcing a failure. [ 470.855181][T30114] name failslab, interval 1, probability 0, space 0, times 0 [ 470.868551][T30117] FAULT_INJECTION: forcing a failure. [ 470.868551][T30117] name failslab, interval 1, probability 0, space 0, times 0 [ 470.885181][T30114] CPU: 0 PID: 30114 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 470.893176][T30114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.903230][T30114] Call Trace: [ 470.906522][T30114] dump_stack+0x1d8/0x2f8 [ 470.910855][T30114] should_fail+0x555/0x770 [ 470.915278][T30114] __should_failslab+0x11a/0x160 [ 470.920218][T30114] ? __alloc_file+0x2c/0x390 [ 470.924820][T30114] should_failslab+0x9/0x20 [ 470.929321][T30114] kmem_cache_alloc+0x56/0x2e0 [ 470.934085][T30114] ? trace_lock_release+0x135/0x1a0 [ 470.939284][T30114] __alloc_file+0x2c/0x390 [ 470.943702][T30114] alloc_empty_file+0xac/0x1b0 [ 470.948462][T30114] alloc_file+0x60/0x4c0 00:38:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, 0x0) 00:38:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, 0x0) 00:38:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x14000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:24 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x190, 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x1) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x100000000, 0x40900) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) [ 470.952797][T30114] alloc_file_pseudo+0x1d4/0x260 [ 470.957730][T30114] __shmem_file_setup+0x1a2/0x280 [ 470.957740][T30114] shmem_file_setup+0x2f/0x40 [ 470.957748][T30114] __se_sys_memfd_create+0x28e/0x4b0 [ 470.957757][T30114] ? do_syscall_64+0x1d/0x140 [ 470.957766][T30114] __x64_sys_memfd_create+0x5b/0x70 [ 470.957774][T30114] do_syscall_64+0xfe/0x140 [ 470.957791][T30114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.987034][T30114] RIP: 0033:0x459879 [ 470.987045][T30114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.987050][T30114] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 470.987059][T30114] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 470.987064][T30114] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 470.987069][T30114] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 470.987075][T30114] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 [ 470.987080][T30114] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 471.002965][T30117] CPU: 0 PID: 30117 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 471.040795][T30117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.040799][T30117] Call Trace: [ 471.040816][T30117] dump_stack+0x1d8/0x2f8 [ 471.040828][T30117] should_fail+0x555/0x770 [ 471.040840][T30117] __should_failslab+0x11a/0x160 [ 471.040850][T30117] ? __se_sys_memfd_create+0x10a/0x4b0 [ 471.040860][T30117] should_failslab+0x9/0x20 [ 471.040874][T30117] __kmalloc+0x7a/0x340 [ 471.064750][T30117] __se_sys_memfd_create+0x10a/0x4b0 [ 471.064763][T30117] ? do_syscall_64+0x1d/0x140 [ 471.064777][T30117] __x64_sys_memfd_create+0x5b/0x70 [ 471.064789][T30117] do_syscall_64+0xfe/0x140 [ 471.094782][T30117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.094792][T30117] RIP: 0033:0x459879 00:38:24 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) timer_create(0x4000000000000003, &(0x7f000004c000)={0x0, 0x19, 0x0, @thr={0x0, 0x0}}, &(0x7f000004cffc)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4a043, 0x0) timer_settime(0x0, 0x1, &(0x7f0000666fe0)={{0x0, 0x1c9c380}, {0x0, 0x7}}, 0x0) 00:38:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, 0x0) [ 471.094804][T30117] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.113773][T30117] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 471.113783][T30117] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 471.113787][T30117] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 471.113797][T30117] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 471.194973][T30117] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 471.194979][T30117] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x6}}, 0x1c) 00:38:25 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:25 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x15000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:25 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:25 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) sched_getattr(r1, &(0x7f00000001c0)={0x30}, 0x30, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x802, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000854) 00:38:25 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) unshare(0x24060400) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ppoll(&(0x7f00000000c0)=[{}, {}, {}, {}, {}, {r0}, {}], 0x20000000000000fc, 0x0, 0x0, 0xfffffffffffffdaa) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000140)=""/230, 0xe6}, {&(0x7f0000000240)=""/224, 0xe0}], 0x2, 0x0) [ 471.863374][T30163] FAULT_INJECTION: forcing a failure. [ 471.863374][T30163] name failslab, interval 1, probability 0, space 0, times 0 [ 471.874940][T30162] FAULT_INJECTION: forcing a failure. [ 471.874940][T30162] name failslab, interval 1, probability 0, space 0, times 0 [ 471.898134][T30164] FAULT_INJECTION: forcing a failure. [ 471.898134][T30164] name failslab, interval 1, probability 0, space 0, times 0 [ 471.899694][T30162] CPU: 0 PID: 30162 Comm: syz-executor.4 Not tainted 5.3.0-rc6+ #94 [ 471.918733][T30162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.928782][T30162] Call Trace: [ 471.932072][T30162] dump_stack+0x1d8/0x2f8 [ 471.936396][T30162] should_fail+0x555/0x770 [ 471.940796][T30162] __should_failslab+0x11a/0x160 [ 471.945719][T30162] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 471.951415][T30162] should_failslab+0x9/0x20 [ 471.955895][T30162] __kmalloc+0x7a/0x340 [ 471.960029][T30162] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 471.965730][T30162] tomoyo_realpath_from_path+0xdc/0x7c0 [ 471.971261][T30162] tomoyo_path_number_perm+0x166/0x640 [ 471.976717][T30162] ? smack_file_ioctl+0x226/0x2e0 [ 471.981724][T30162] ? __fget+0x4a1/0x510 [ 471.985864][T30162] tomoyo_file_ioctl+0x23/0x30 [ 471.990627][T30162] security_file_ioctl+0x6d/0xd0 [ 471.995545][T30162] __x64_sys_ioctl+0xa3/0x120 [ 472.000204][T30162] do_syscall_64+0xfe/0x140 [ 472.004691][T30162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.010570][T30162] RIP: 0033:0x459879 [ 472.014442][T30162] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.034024][T30162] RSP: 002b:00007f162cdf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.042416][T30162] RAX: ffffffffffffffda RBX: 00007f162cdf4c90 RCX: 0000000000459879 [ 472.050364][T30162] RDX: 0000000020000240 RSI: 0000000000008990 RDI: 0000000000000005 [ 472.058317][T30162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 472.066265][T30162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f162cdf56d4 [ 472.074216][T30162] R13: 00000000004c54af R14: 00000000004d9b38 R15: 0000000000000006 [ 472.082207][T30163] CPU: 1 PID: 30163 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 472.088006][T30162] ERROR: Out of memory at tomoyo_realpath_from_path. [ 472.090172][T30163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.090175][T30163] Call Trace: [ 472.090196][T30163] dump_stack+0x1d8/0x2f8 [ 472.090210][T30163] should_fail+0x555/0x770 [ 472.090223][T30163] __should_failslab+0x11a/0x160 [ 472.106915][T30163] ? shmem_alloc_inode+0x1b/0x40 [ 472.106925][T30163] should_failslab+0x9/0x20 [ 472.106936][T30163] kmem_cache_alloc+0x56/0x2e0 [ 472.106948][T30163] ? shmem_fallocate+0xc90/0xc90 [ 472.111072][T30162] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 472.114514][T30163] shmem_alloc_inode+0x1b/0x40 [ 472.114523][T30163] ? shmem_fallocate+0xc90/0xc90 [ 472.114532][T30163] new_inode_pseudo+0x68/0x240 [ 472.114542][T30163] new_inode+0x28/0x1c0 [ 472.114551][T30163] ? __kasan_check_read+0x11/0x20 [ 472.114563][T30163] shmem_get_inode+0x11b/0x700 [ 472.180147][T30163] ? __alloc_fd+0x58f/0x630 [ 472.184632][T30163] __shmem_file_setup+0x129/0x280 [ 472.189643][T30163] shmem_file_setup+0x2f/0x40 [ 472.194302][T30163] __se_sys_memfd_create+0x28e/0x4b0 [ 472.199565][T30163] ? do_syscall_64+0x1d/0x140 [ 472.204224][T30163] __x64_sys_memfd_create+0x5b/0x70 [ 472.209405][T30163] do_syscall_64+0xfe/0x140 [ 472.213899][T30163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.219772][T30163] RIP: 0033:0x459879 [ 472.223646][T30163] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.243247][T30163] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.251647][T30163] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 00:38:25 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x16000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:25 executing program 4 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 472.259622][T30163] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 472.267576][T30163] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.275533][T30163] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 472.283487][T30163] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 472.291457][T30164] CPU: 0 PID: 30164 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 472.299435][T30164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.309487][T30164] Call Trace: [ 472.312781][T30164] dump_stack+0x1d8/0x2f8 [ 472.317109][T30164] should_fail+0x555/0x770 [ 472.321509][T30164] __should_failslab+0x11a/0x160 [ 472.321519][T30164] ? security_file_alloc+0x36/0x200 [ 472.321528][T30164] should_failslab+0x9/0x20 [ 472.321537][T30164] kmem_cache_alloc+0x56/0x2e0 [ 472.321548][T30164] security_file_alloc+0x36/0x200 [ 472.345876][T30164] __alloc_file+0xde/0x390 [ 472.350295][T30164] alloc_empty_file+0xac/0x1b0 [ 472.355044][T30164] alloc_file+0x60/0x4c0 [ 472.359296][T30164] alloc_file_pseudo+0x1d4/0x260 [ 472.364242][T30164] __shmem_file_setup+0x1a2/0x280 [ 472.369268][T30164] shmem_file_setup+0x2f/0x40 [ 472.369283][T30164] __se_sys_memfd_create+0x28e/0x4b0 [ 472.379203][T30164] ? do_syscall_64+0x1d/0x140 [ 472.379214][T30164] __x64_sys_memfd_create+0x5b/0x70 [ 472.379222][T30164] do_syscall_64+0xfe/0x140 [ 472.379234][T30164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.379242][T30164] RIP: 0033:0x459879 [ 472.379253][T30164] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.379258][T30164] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.379267][T30164] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 472.379272][T30164] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 472.379277][T30164] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.379282][T30164] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fe56b5256d4 00:38:26 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:26 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setrlimit(0x7, &(0x7f000000f000)) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x9c, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2040000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept(r0, 0x0, 0x0) gettid() [ 472.379291][T30164] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 472.541323][T30190] FAULT_INJECTION: forcing a failure. [ 472.541323][T30190] name failslab, interval 1, probability 0, space 0, times 0 [ 472.558618][T30180] bond0: (slave bond_slave_1): Releasing backup interface [ 472.559117][T30192] FAULT_INJECTION: forcing a failure. [ 472.559117][T30192] name failslab, interval 1, probability 0, space 0, times 0 [ 472.566399][T30193] FAULT_INJECTION: forcing a failure. [ 472.566399][T30193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 472.586257][T30190] CPU: 0 PID: 30190 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 472.599468][T30190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.609507][T30190] Call Trace: [ 472.612787][T30190] dump_stack+0x1d8/0x2f8 [ 472.617099][T30190] should_fail+0x555/0x770 [ 472.621500][T30190] __should_failslab+0x11a/0x160 [ 472.626421][T30190] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 472.632120][T30190] should_failslab+0x9/0x20 [ 472.636621][T30190] __kmalloc+0x7a/0x340 [ 472.640758][T30190] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 472.646454][T30190] tomoyo_realpath_from_path+0xdc/0x7c0 [ 472.651982][T30190] tomoyo_path_perm+0x192/0x850 [ 472.656812][T30190] ? trace_lock_release+0x135/0x1a0 [ 472.662088][T30190] tomoyo_path_truncate+0x1c/0x20 [ 472.667090][T30190] security_path_truncate+0xd5/0x150 [ 472.672352][T30190] do_sys_ftruncate+0x493/0x710 [ 472.677189][T30190] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 472.682889][T30190] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 472.688325][T30190] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 472.694018][T30190] ? trace_hardirqs_off_caller+0x58/0x80 [ 472.699628][T30190] ? do_syscall_64+0x1d/0x140 [ 472.704284][T30190] __x64_sys_ftruncate+0x60/0x70 [ 472.709198][T30190] do_syscall_64+0xfe/0x140 [ 472.713680][T30190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.719547][T30190] RIP: 0033:0x459847 [ 472.723421][T30190] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.743004][T30190] RSP: 002b:00007fe56b524a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 472.751391][T30190] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 472.759338][T30190] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 472.767285][T30190] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 472.775234][T30190] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 472.783269][T30190] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 472.791238][T30193] CPU: 1 PID: 30193 Comm: syz-executor.4 Not tainted 5.3.0-rc6+ #94 [ 472.799210][T30193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.809254][T30193] Call Trace: [ 472.812536][T30193] dump_stack+0x1d8/0x2f8 [ 472.816849][T30193] should_fail+0x555/0x770 [ 472.821250][T30193] should_fail_alloc_page+0x55/0x60 [ 472.826426][T30193] prepare_alloc_pages+0x283/0x470 [ 472.831524][T30193] __alloc_pages_nodemask+0xb2/0x5d0 [ 472.837320][T30193] ? stack_trace_save+0x150/0x150 [ 472.842330][T30193] kmem_getpages+0x56/0xa20 [ 472.846816][T30193] cache_grow_begin+0x7e/0x2c0 [ 472.851567][T30193] cache_alloc_refill+0x311/0x3f0 [ 472.856574][T30193] ? check_preemption_disabled+0xb7/0x2a0 [ 472.862278][T30193] __kmalloc+0x318/0x340 [ 472.866501][T30193] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 472.872206][T30193] tomoyo_realpath_from_path+0xdc/0x7c0 [ 472.877737][T30193] tomoyo_path_number_perm+0x166/0x640 [ 472.883187][T30193] ? smack_file_ioctl+0x226/0x2e0 [ 472.888196][T30193] ? __fget+0x4a1/0x510 [ 472.892339][T30193] tomoyo_file_ioctl+0x23/0x30 [ 472.897083][T30193] security_file_ioctl+0x6d/0xd0 [ 472.902003][T30193] __x64_sys_ioctl+0xa3/0x120 [ 472.903784][T30190] ERROR: Out of memory at tomoyo_realpath_from_path. [ 472.906665][T30193] do_syscall_64+0xfe/0x140 [ 472.906678][T30193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.906686][T30193] RIP: 0033:0x459879 [ 472.906697][T30193] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.947148][T30193] RSP: 002b:00007f162cdd3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.955551][T30193] RAX: ffffffffffffffda RBX: 00007f162cdd3c90 RCX: 0000000000459879 [ 472.963514][T30193] RDX: 0000000020000240 RSI: 0000000000008990 RDI: 0000000000000005 [ 472.971491][T30193] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 472.979448][T30193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f162cdd46d4 [ 472.987401][T30193] R13: 00000000004c54af R14: 00000000004d9b38 R15: 0000000000000006 [ 472.995370][T30192] CPU: 0 PID: 30192 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 473.003346][T30192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.013414][T30192] Call Trace: [ 473.016712][T30192] dump_stack+0x1d8/0x2f8 [ 473.021045][T30192] should_fail+0x555/0x770 [ 473.025465][T30192] __should_failslab+0x11a/0x160 [ 473.030404][T30192] ? security_inode_alloc+0x36/0x1e0 [ 473.035770][T30192] should_failslab+0x9/0x20 [ 473.035782][T30192] kmem_cache_alloc+0x56/0x2e0 [ 473.035794][T30192] security_inode_alloc+0x36/0x1e0 [ 473.035805][T30192] inode_init_always+0x3b5/0x8d0 [ 473.035816][T30192] ? shmem_fallocate+0xc90/0xc90 [ 473.035824][T30192] new_inode_pseudo+0x7f/0x240 [ 473.035833][T30192] new_inode+0x28/0x1c0 [ 473.035842][T30192] ? __kasan_check_read+0x11/0x20 [ 473.035851][T30192] shmem_get_inode+0x11b/0x700 [ 473.035863][T30192] ? __alloc_fd+0x58f/0x630 [ 473.045091][T30192] __shmem_file_setup+0x129/0x280 [ 473.045103][T30192] shmem_file_setup+0x2f/0x40 [ 473.045113][T30192] __se_sys_memfd_create+0x28e/0x4b0 [ 473.045124][T30192] ? do_syscall_64+0x1d/0x140 [ 473.045134][T30192] __x64_sys_memfd_create+0x5b/0x70 [ 473.045144][T30192] do_syscall_64+0xfe/0x140 [ 473.045156][T30192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.045166][T30192] RIP: 0033:0x459879 [ 473.045175][T30192] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x7}}, 0x1c) 00:38:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x75652b508aa7461e}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000055781309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200080, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x1ff) 00:38:26 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1cbcfdff, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 473.045181][T30192] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 473.045190][T30192] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 473.045199][T30192] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 473.064854][T30192] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 473.064859][T30192] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 473.064865][T30192] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x95}, 0x98) 00:38:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x25030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:26 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 473.283944][T30216] FAULT_INJECTION: forcing a failure. [ 473.283944][T30216] name failslab, interval 1, probability 0, space 0, times 0 [ 473.336951][T30216] CPU: 1 PID: 30216 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 473.344954][T30216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.345218][T30193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 473.354998][T30216] Call Trace: [ 473.355016][T30216] dump_stack+0x1d8/0x2f8 [ 473.355030][T30216] should_fail+0x555/0x770 [ 473.355043][T30216] __should_failslab+0x11a/0x160 [ 473.355054][T30216] ? __d_alloc+0x2d/0x6e0 [ 473.355064][T30216] should_failslab+0x9/0x20 [ 473.355074][T30216] kmem_cache_alloc+0x56/0x2e0 [ 473.355092][T30216] __d_alloc+0x2d/0x6e0 [ 473.398600][T30216] ? lockdep_init_map+0x2a/0x680 [ 473.403512][T30216] d_alloc_pseudo+0x1d/0x70 [ 473.407994][T30216] alloc_file_pseudo+0xc3/0x260 [ 473.412825][T30216] __shmem_file_setup+0x1a2/0x280 [ 473.417828][T30216] shmem_file_setup+0x2f/0x40 [ 473.422485][T30216] __se_sys_memfd_create+0x28e/0x4b0 [ 473.427744][T30216] ? do_syscall_64+0x1d/0x140 [ 473.432391][T30216] __x64_sys_memfd_create+0x5b/0x70 [ 473.437568][T30216] do_syscall_64+0xfe/0x140 [ 473.442050][T30216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.447926][T30216] RIP: 0033:0x459879 [ 473.451804][T30216] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.471394][T30216] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 473.479778][T30216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 00:38:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 473.487725][T30216] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 473.495691][T30216] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 473.505460][T30216] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 473.513425][T30216] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 473.549886][T30226] FAULT_INJECTION: forcing a failure. [ 473.549886][T30226] name failslab, interval 1, probability 0, space 0, times 0 [ 473.576672][T30226] CPU: 1 PID: 30226 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 473.584675][T30226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.584680][T30226] Call Trace: [ 473.584695][T30226] dump_stack+0x1d8/0x2f8 [ 473.584713][T30226] should_fail+0x555/0x770 [ 473.606753][T30226] __should_failslab+0x11a/0x160 [ 473.611687][T30226] ? tomoyo_encode2+0x273/0x5a0 [ 473.616528][T30226] should_failslab+0x9/0x20 [ 473.621027][T30226] __kmalloc+0x7a/0x340 [ 473.625179][T30226] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 473.630900][T30226] tomoyo_encode2+0x273/0x5a0 [ 473.635577][T30226] ? dynamic_dname+0xf0/0xf0 [ 473.640163][T30226] tomoyo_realpath_from_path+0x769/0x7c0 [ 473.645779][T30226] tomoyo_path_perm+0x192/0x850 [ 473.650625][T30226] ? trace_lock_release+0x135/0x1a0 [ 473.655832][T30226] tomoyo_path_truncate+0x1c/0x20 [ 473.660850][T30226] security_path_truncate+0xd5/0x150 [ 473.666992][T30226] do_sys_ftruncate+0x493/0x710 [ 473.671844][T30226] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 473.677565][T30226] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 473.683018][T30226] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 473.688734][T30226] ? trace_hardirqs_off_caller+0x58/0x80 [ 473.694367][T30226] ? do_syscall_64+0x1d/0x140 [ 473.699037][T30226] __x64_sys_ftruncate+0x60/0x70 [ 473.703973][T30226] do_syscall_64+0xfe/0x140 [ 473.708471][T30226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.714353][T30226] RIP: 0033:0x459847 [ 473.718242][T30226] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.737846][T30226] RSP: 002b:00007fe56b524a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 00:38:27 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000640)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000}, {0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7fff}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x101ff, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4], 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:38:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3c010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 473.746231][T30226] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 473.754177][T30226] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 473.762124][T30226] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 473.770157][T30226] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 473.778104][T30226] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 473.792133][T30226] ERROR: Out of memory at tomoyo_realpath_from_path. [ 473.827161][T30238] bond0: (slave bond_slave_1): Releasing backup interface 00:38:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3f000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 473.918994][T30250] FAULT_INJECTION: forcing a failure. [ 473.918994][T30250] name failslab, interval 1, probability 0, space 0, times 0 [ 473.955131][T30250] CPU: 0 PID: 30250 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 473.963130][T30250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.973172][T30250] Call Trace: [ 473.976453][T30250] dump_stack+0x1d8/0x2f8 [ 473.980766][T30250] should_fail+0x555/0x770 [ 473.985159][T30250] __should_failslab+0x11a/0x160 [ 473.990071][T30250] ? __alloc_file+0x2c/0x390 [ 473.994637][T30250] should_failslab+0x9/0x20 [ 473.999116][T30250] kmem_cache_alloc+0x56/0x2e0 [ 474.003854][T30250] ? trace_lock_release+0x135/0x1a0 [ 474.009036][T30250] __alloc_file+0x2c/0x390 [ 474.013426][T30250] alloc_empty_file+0xac/0x1b0 [ 474.018160][T30250] alloc_file+0x60/0x4c0 [ 474.022376][T30250] alloc_file_pseudo+0x1d4/0x260 [ 474.027290][T30250] __shmem_file_setup+0x1a2/0x280 [ 474.032287][T30250] shmem_file_setup+0x2f/0x40 [ 474.036936][T30250] __se_sys_memfd_create+0x28e/0x4b0 [ 474.042195][T30250] ? do_syscall_64+0x1d/0x140 [ 474.046846][T30250] __x64_sys_memfd_create+0x5b/0x70 [ 474.052017][T30250] do_syscall_64+0xfe/0x140 [ 474.056497][T30250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.062368][T30250] RIP: 0033:0x459879 [ 474.066238][T30250] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.085814][T30250] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 474.094209][T30250] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 474.102155][T30250] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 474.110117][T30250] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 00:38:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x8}}, 0x1c) 00:38:27 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x40000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 474.118067][T30250] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 474.126009][T30250] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 474.142501][T30247] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:27 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x41000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 474.257940][T30268] FAULT_INJECTION: forcing a failure. [ 474.257940][T30268] name failslab, interval 1, probability 0, space 0, times 0 [ 474.274160][T30267] bond0: (slave bond_slave_1): Releasing backup interface [ 474.316076][T30251] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 474.337129][T30279] FAULT_INJECTION: forcing a failure. [ 474.337129][T30279] name failslab, interval 1, probability 0, space 0, times 0 [ 474.378025][T30279] CPU: 1 PID: 30279 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 474.386034][T30279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.396087][T30279] Call Trace: [ 474.399373][T30279] dump_stack+0x1d8/0x2f8 [ 474.403694][T30279] should_fail+0x555/0x770 [ 474.408111][T30279] __should_failslab+0x11a/0x160 [ 474.413050][T30279] ? security_file_alloc+0x36/0x200 [ 474.418241][T30279] should_failslab+0x9/0x20 [ 474.422735][T30279] kmem_cache_alloc+0x56/0x2e0 [ 474.427491][T30279] security_file_alloc+0x36/0x200 [ 474.432511][T30279] __alloc_file+0xde/0x390 [ 474.436914][T30279] alloc_empty_file+0xac/0x1b0 [ 474.441663][T30279] alloc_file+0x60/0x4c0 [ 474.445906][T30279] alloc_file_pseudo+0x1d4/0x260 [ 474.450844][T30279] __shmem_file_setup+0x1a2/0x280 [ 474.455852][T30279] shmem_file_setup+0x2f/0x40 [ 474.460513][T30279] __se_sys_memfd_create+0x28e/0x4b0 [ 474.465780][T30279] ? do_syscall_64+0x1d/0x140 [ 474.470437][T30279] __x64_sys_memfd_create+0x5b/0x70 [ 474.475661][T30279] do_syscall_64+0xfe/0x140 [ 474.480145][T30279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.486019][T30279] RIP: 0033:0x459879 [ 474.489898][T30279] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.509492][T30279] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 474.517889][T30279] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 00:38:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000000340)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/224, 0xe0}, {&(0x7f00000004c0)=""/222, 0xde}, {&(0x7f00000005c0)=""/177, 0xb1}], 0x3, &(0x7f00000006c0)=""/207, 0xcf}, 0x8}, {{&(0x7f00000007c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000840)=""/133, 0x85}, {&(0x7f0000000900)=""/100, 0x64}, {&(0x7f0000000980)=""/133, 0x85}, {&(0x7f0000000a40)=""/187, 0xbb}, {&(0x7f0000000b00)=""/229, 0xe5}, {&(0x7f0000000c00)=""/87, 0x57}, {&(0x7f0000000c80)=""/147, 0x93}], 0x7}, 0x9}, {{&(0x7f0000000dc0)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000000e40)=""/95, 0x5f}, {&(0x7f0000000ec0)=""/14, 0xe}, {&(0x7f0000000f00)=""/251, 0xfb}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/128, 0x80}, {&(0x7f0000002080)=""/132, 0x84}], 0x6, &(0x7f00000021c0)=""/3, 0x3}, 0x758b}, {{&(0x7f0000002200)=@isdn, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/54, 0x36}, {&(0x7f00000022c0)=""/196, 0xc4}, {&(0x7f00000023c0)=""/66, 0x42}, {&(0x7f0000002440)=""/52, 0x34}, {&(0x7f0000002480)=""/59, 0x3b}, {&(0x7f00000024c0)=""/164, 0xa4}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000003580)=""/150, 0x96}, {&(0x7f0000003640)=""/191, 0xbf}], 0x9, &(0x7f00000037c0)=""/182, 0xb6}, 0x7fff}, {{&(0x7f0000003880)=@nl, 0x80, &(0x7f0000003d40)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000003900)=""/111, 0x6f}, {&(0x7f0000003980)=""/212, 0xd4}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/209, 0xd1}, {&(0x7f0000003b80)=""/190, 0xbe}, {&(0x7f0000003c40)=""/209, 0xd1}], 0x7, &(0x7f0000003dc0)=""/229, 0xe5}, 0x19d0000000000000}, {{&(0x7f0000003ec0)=@alg, 0x80, &(0x7f0000007280)=[{&(0x7f0000003f40)=""/35, 0x23}, {&(0x7f0000006000)=""/229, 0xe5}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/179, 0xb3}, {&(0x7f00000071c0)=""/137, 0x89}], 0x5, &(0x7f0000007300)=""/106, 0x6a}}, {{&(0x7f0000007380)=@sco, 0x80, &(0x7f0000007680)=[{&(0x7f0000007400)=""/241, 0xf1}, {&(0x7f0000007500)=""/69, 0x45}, {&(0x7f0000007580)=""/199, 0xc7}, {&(0x7f0000003f80)=""/3, 0x3}], 0x4, &(0x7f00000076c0)=""/130, 0x82}, 0x1}, {{0x0, 0x0, &(0x7f00000079c0)=[{&(0x7f0000007780)=""/108, 0x6c}, {&(0x7f0000007800)=""/234, 0xea}, {&(0x7f0000007900)=""/133, 0x85}], 0x3, &(0x7f0000007a00)=""/236, 0xec}, 0x8}, {{0x0, 0x0, &(0x7f0000008ec0)=[{&(0x7f0000007b00)=""/4096, 0x1000}, {&(0x7f0000008b00)=""/187, 0xbb}, {&(0x7f0000008bc0)=""/100, 0x64}, {&(0x7f0000008c40)=""/94, 0x5e}, {&(0x7f0000008cc0)=""/253, 0xfd}, {&(0x7f0000008dc0)=""/240, 0xf0}], 0x6, &(0x7f0000008f40)=""/114, 0x72}, 0x4}], 0x9, 0x20, &(0x7f0000009200)={0x77359400}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000009280)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000009340)={&(0x7f0000009240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000009300)={&(0x7f00000092c0)={0x1c, r1, 0x200, 0x70bd28, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40001) 00:38:28 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 474.525840][T30279] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 474.533802][T30279] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 474.541767][T30279] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 474.549728][T30279] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 474.557696][T30268] CPU: 0 PID: 30268 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 474.565676][T30268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.575730][T30268] Call Trace: [ 474.579022][T30268] dump_stack+0x1d8/0x2f8 [ 474.583344][T30268] should_fail+0x555/0x770 [ 474.587746][T30268] __should_failslab+0x11a/0x160 [ 474.587757][T30268] ? tomoyo_encode2+0x273/0x5a0 [ 474.587770][T30268] should_failslab+0x9/0x20 [ 474.597506][T30268] __kmalloc+0x7a/0x340 [ 474.597514][T30268] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 474.597523][T30268] tomoyo_encode2+0x273/0x5a0 [ 474.597533][T30268] ? dynamic_dname+0xf0/0xf0 [ 474.597544][T30268] tomoyo_realpath_from_path+0x769/0x7c0 [ 474.626714][T30268] tomoyo_path_perm+0x192/0x850 [ 474.631567][T30268] ? trace_lock_release+0x135/0x1a0 [ 474.632648][T30286] FAULT_INJECTION: forcing a failure. [ 474.632648][T30286] name failslab, interval 1, probability 0, space 0, times 0 [ 474.636776][T30268] tomoyo_path_truncate+0x1c/0x20 [ 474.636785][T30268] security_path_truncate+0xd5/0x150 [ 474.636800][T30268] do_sys_ftruncate+0x493/0x710 [ 474.664468][T30268] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 474.670178][T30268] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 474.675645][T30268] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 474.681342][T30268] ? trace_hardirqs_off_caller+0x58/0x80 [ 474.686954][T30268] ? do_syscall_64+0x1d/0x140 [ 474.691614][T30268] __x64_sys_ftruncate+0x60/0x70 [ 474.696535][T30268] do_syscall_64+0xfe/0x140 [ 474.701018][T30268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.706890][T30268] RIP: 0033:0x459847 [ 474.710765][T30268] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.730345][T30268] RSP: 002b:00007fe56b524a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 474.738734][T30268] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 474.746686][T30268] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 474.754636][T30268] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 474.762589][T30268] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 474.770540][T30268] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 474.778517][T30286] CPU: 1 PID: 30286 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 474.786489][T30286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.790695][T30268] ERROR: Out of memory at tomoyo_realpath_from_path. [ 474.796556][T30286] Call Trace: [ 474.796573][T30286] dump_stack+0x1d8/0x2f8 [ 474.796585][T30286] should_fail+0x555/0x770 [ 474.796599][T30286] __should_failslab+0x11a/0x160 [ 474.810828][T30286] ? security_file_alloc+0x36/0x200 [ 474.810839][T30286] should_failslab+0x9/0x20 [ 474.810850][T30286] kmem_cache_alloc+0x56/0x2e0 [ 474.810859][T30286] security_file_alloc+0x36/0x200 [ 474.810870][T30286] __alloc_file+0xde/0x390 [ 474.810882][T30286] alloc_empty_file+0xac/0x1b0 [ 474.820184][T30286] alloc_file+0x60/0x4c0 [ 474.820197][T30286] alloc_file_pseudo+0x1d4/0x260 [ 474.820211][T30286] __shmem_file_setup+0x1a2/0x280 [ 474.820221][T30286] shmem_file_setup+0x2f/0x40 [ 474.820229][T30286] __se_sys_memfd_create+0x28e/0x4b0 [ 474.820238][T30286] ? do_syscall_64+0x1d/0x140 [ 474.820247][T30286] __x64_sys_memfd_create+0x5b/0x70 [ 474.820256][T30286] do_syscall_64+0xfe/0x140 [ 474.820268][T30286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.820278][T30286] RIP: 0033:0x459879 [ 474.896877][T30286] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.916480][T30286] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:38:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x10, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:28 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x44030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 474.924885][T30286] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 474.932846][T30286] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 474.940798][T30286] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 474.948835][T30286] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f06bf5ee6d4 [ 474.956788][T30286] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:28 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4c01, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:28 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x50030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x9}}, 0x1c) 00:38:28 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") capset(&(0x7f0000000000)={0x24020019980330}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100}) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xcedd7677670ef1ee) [ 475.119863][T30312] FAULT_INJECTION: forcing a failure. [ 475.119863][T30312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.180237][T30320] FAULT_INJECTION: forcing a failure. [ 475.180237][T30320] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.193478][T30320] CPU: 0 PID: 30320 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 475.201452][T30320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.211505][T30320] Call Trace: [ 475.214806][T30320] dump_stack+0x1d8/0x2f8 [ 475.219151][T30320] should_fail+0x555/0x770 [ 475.223570][T30320] should_fail_alloc_page+0x55/0x60 [ 475.228767][T30320] prepare_alloc_pages+0x283/0x470 [ 475.233861][T30320] __alloc_pages_nodemask+0xb2/0x5d0 [ 475.239148][T30320] kmem_getpages+0x56/0xa20 [ 475.243641][T30320] cache_grow_begin+0x7e/0x2c0 [ 475.248397][T30320] cache_alloc_refill+0x311/0x3f0 [ 475.253420][T30320] ? check_preemption_disabled+0xb7/0x2a0 [ 475.259147][T30320] __kmalloc+0x318/0x340 [ 475.263386][T30320] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 475.269107][T30320] tomoyo_realpath_from_path+0xdc/0x7c0 [ 475.274655][T30320] tomoyo_path_perm+0x192/0x850 [ 475.279504][T30320] ? trace_lock_release+0x135/0x1a0 [ 475.284701][T30320] tomoyo_path_truncate+0x1c/0x20 [ 475.289708][T30320] security_path_truncate+0xd5/0x150 [ 475.294977][T30320] do_sys_ftruncate+0x493/0x710 [ 475.299809][T30320] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 475.305510][T30320] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 475.310947][T30320] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 475.316646][T30320] ? trace_hardirqs_off_caller+0x58/0x80 [ 475.322256][T30320] ? do_syscall_64+0x1d/0x140 [ 475.326913][T30320] __x64_sys_ftruncate+0x60/0x70 [ 475.331832][T30320] do_syscall_64+0xfe/0x140 [ 475.336319][T30320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.342189][T30320] RIP: 0033:0x459847 [ 475.346065][T30320] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.367902][T30320] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 475.376290][T30320] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 475.384240][T30320] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 475.392213][T30320] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 475.400165][T30320] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 475.408115][T30320] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 475.416104][T30312] CPU: 1 PID: 30312 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 00:38:29 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x66030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:29 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) r1 = shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmdt(r1) r2 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000ffb000/0x2000)=nil, 0x6000) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@null, @bcast, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default]}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) [ 475.424080][T30312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.434123][T30312] Call Trace: [ 475.434139][T30312] dump_stack+0x1d8/0x2f8 [ 475.434152][T30312] should_fail+0x555/0x770 [ 475.434166][T30312] should_fail_alloc_page+0x55/0x60 [ 475.441735][T30312] prepare_alloc_pages+0x283/0x470 [ 475.441747][T30312] __alloc_pages_nodemask+0xb2/0x5d0 [ 475.441760][T30312] ? percpu_counter_add_batch+0x153/0x170 [ 475.467397][T30312] alloc_pages_vma+0x4e7/0x8b0 [ 475.472163][T30312] shmem_alloc_and_acct_page+0x429/0xbb0 [ 475.477800][T30312] shmem_getpage_gfp+0x1270/0x2c00 [ 475.482915][T30312] shmem_write_begin+0xcb/0x1b0 [ 475.487757][T30312] generic_perform_write+0x25d/0x4e0 [ 475.493047][T30312] __generic_file_write_iter+0x24b/0x520 [ 475.498683][T30312] generic_file_write_iter+0x445/0x5d0 [ 475.504181][T30312] __vfs_write+0x5a1/0x740 [ 475.508608][T30312] vfs_write+0x275/0x590 [ 475.512848][T30312] __x64_sys_pwrite64+0x162/0x1d0 [ 475.517852][T30312] do_syscall_64+0xfe/0x140 [ 475.522331][T30312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.528200][T30312] RIP: 0033:0x4137c7 [ 475.532075][T30312] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 475.552959][T30312] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 475.561342][T30312] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 475.569298][T30312] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 00:38:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4c06, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 475.577253][T30312] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 475.585206][T30312] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 475.593162][T30312] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:29 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x19ab) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x800, 0x0) r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) r3 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000040)={'veth0_to_bond\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r1, 0xf6a}) 00:38:29 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x68000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:29 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 475.777870][T30356] FAULT_INJECTION: forcing a failure. [ 475.777870][T30356] name failslab, interval 1, probability 0, space 0, times 0 [ 475.797679][T30356] CPU: 1 PID: 30356 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 475.805689][T30356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.815741][T30356] Call Trace: [ 475.819034][T30356] dump_stack+0x1d8/0x2f8 [ 475.823359][T30356] should_fail+0x555/0x770 00:38:29 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5421, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:29 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x71010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 475.827770][T30356] __should_failslab+0x11a/0x160 [ 475.834185][T30356] ? tomoyo_encode2+0x273/0x5a0 [ 475.839044][T30356] should_failslab+0x9/0x20 [ 475.843547][T30356] __kmalloc+0x7a/0x340 [ 475.847702][T30356] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 475.853423][T30356] tomoyo_encode2+0x273/0x5a0 [ 475.858103][T30356] ? dynamic_dname+0xf0/0xf0 [ 475.862687][T30356] tomoyo_realpath_from_path+0x769/0x7c0 [ 475.868316][T30356] tomoyo_path_perm+0x192/0x850 [ 475.873154][T30356] ? trace_lock_release+0x135/0x1a0 [ 475.878335][T30356] tomoyo_path_truncate+0x1c/0x20 [ 475.883349][T30356] security_path_truncate+0xd5/0x150 [ 475.888620][T30356] do_sys_ftruncate+0x493/0x710 [ 475.893455][T30356] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 475.899151][T30356] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 475.904603][T30356] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 475.910312][T30356] ? trace_hardirqs_off_caller+0x58/0x80 [ 475.915916][T30356] ? do_syscall_64+0x1d/0x140 [ 475.920651][T30356] __x64_sys_ftruncate+0x60/0x70 [ 475.925577][T30356] do_syscall_64+0xfe/0x140 [ 475.930056][T30356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.935932][T30356] RIP: 0033:0x459847 [ 475.939799][T30356] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.959379][T30356] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 475.967773][T30356] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 475.975729][T30356] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 475.983675][T30356] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 475.991621][T30356] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 475.999567][T30356] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 476.008005][T30356] ERROR: Out of memory at tomoyo_realpath_from_path. [ 476.099110][T30379] FAULT_INJECTION: forcing a failure. [ 476.099110][T30379] name failslab, interval 1, probability 0, space 0, times 0 [ 476.126097][T30379] CPU: 1 PID: 30379 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 476.134103][T30379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.144154][T30379] Call Trace: [ 476.147436][T30379] dump_stack+0x1d8/0x2f8 [ 476.151761][T30379] should_fail+0x555/0x770 [ 476.156173][T30379] __should_failslab+0x11a/0x160 [ 476.161110][T30379] ? getname_flags+0xba/0x640 [ 476.165764][T30379] should_failslab+0x9/0x20 [ 476.170247][T30379] kmem_cache_alloc+0x56/0x2e0 [ 476.174983][T30379] ? check_preemption_disabled+0xb7/0x2a0 [ 476.180677][T30379] getname_flags+0xba/0x640 [ 476.185156][T30379] getname+0x19/0x20 [ 476.189032][T30379] do_sys_open+0x261/0x560 [ 476.193430][T30379] __x64_sys_open+0x87/0x90 [ 476.197904][T30379] do_syscall_64+0xfe/0x140 [ 476.202381][T30379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.208250][T30379] RIP: 0033:0x413761 [ 476.212127][T30379] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 476.231704][T30379] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 476.240087][T30379] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 476.248036][T30379] RDX: 00007fe56b524b0a RSI: 0000000000000002 RDI: 00007fe56b524b00 [ 476.255991][T30379] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.263951][T30379] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 476.271902][T30379] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xa}}, 0x1c) 00:38:30 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x3915865a40ed6205, 0x0) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x9, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000500), &(0x7f0000000540)=0x4) ftruncate(r0, 0x1) fcntl$getflags(r0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0xdbc1ff1d72dc55ab, &(0x7f00000015c0)={@local, 0x0}, &(0x7f0000001600)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000001640)={@empty, 0x0}, &(0x7f0000001680)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'team_slave_0\x00', 0x0}) getpeername$packet(r0, &(0x7f00000017c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001880)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000018c0)={@local, @broadcast, 0x0}, &(0x7f0000001900)=0xc) getpeername$packet(r0, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001a40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001bc0)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001c40)=0x14) accept$packet(r0, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001e40)=0x14) r12 = accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0}, &(0x7f0000001f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002580)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000002680)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000002740)={@empty, @initdev, 0x0}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000027c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000028c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002900)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002a00)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003240)={'lapb0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000005d80)={@ipv4={[], [], @empty}, 0x0}, &(0x7f0000005dc0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000005e00)={0x0, @multicast2}, &(0x7f0000005e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005e80)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000005f80)=0xe8) accept$packet(r0, &(0x7f0000005fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006000)=0x14) accept4(r0, &(0x7f0000006100)=@hci={0x1f, 0x0}, &(0x7f0000006180)=0x80, 0x800) getpeername$packet(r0, &(0x7f000000d500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d540)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000d580)={0x0, @broadcast, @dev}, &(0x7f000000d5c0)=0xc) getpeername(r0, &(0x7f000000d600)=@xdp={0x2c, 0x0, 0x0}, &(0x7f000000d680)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f000000d6c0)={@rand_addr, 0x0}, &(0x7f000000d700)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000dd00)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f000000de00)=0xe8) getpeername$packet(r0, &(0x7f000000de40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de80)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f000000e100)={@multicast2, @rand_addr, 0x0}, &(0x7f000000e140)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000e480)={0x0, @local, @empty}, &(0x7f000000e4c0)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000ee40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f000000ee00)={&(0x7f0000000580)=ANY=[@ANYBLOB="f0080000", @ANYRES16=r1, @ANYBLOB="02002cbd7000fedbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r3, @ANYBLOB="3f00000099ed37f6", @ANYRES32=r4, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003003fa4b1d804000180000008000100", @ANYRES32=r5, @ANYBLOB="bc00020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff00000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000000080007000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008f04000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="f00102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r9, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000500000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r12, @ANYRESOCT=r22], @ANYBLOB="780002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r14, @ANYBLOB="380202003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400050000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000001000008000600", @ANYRES32=r20, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r21, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="8000020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="08000100", @ANYRES32=r26, @ANYBLOB="40020200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004001f00000008000600", @ANYRES32=r27, @ANYBLOB="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", @ANYRES32=r28, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r29, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r31, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400010000000800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000004000008000600", @ANYRES32=r32, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x3f}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r33 = socket(0x10, 0x3, 0x0) write(r33, &(0x7f0000000000)="1c0000005e001f0014584707f9f4ffffff0000000f000000ea5a9471", 0x1c) 00:38:30 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7d000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5429, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:30 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:30 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:30 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x80010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5450, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 476.530221][T30395] FAULT_INJECTION: forcing a failure. [ 476.530221][T30395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.546533][T30394] FAULT_INJECTION: forcing a failure. [ 476.546533][T30394] name failslab, interval 1, probability 0, space 0, times 0 [ 476.561877][T30395] CPU: 1 PID: 30395 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 476.569867][T30395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.579918][T30395] Call Trace: [ 476.583203][T30395] dump_stack+0x1d8/0x2f8 [ 476.587534][T30395] should_fail+0x555/0x770 [ 476.591952][T30395] should_fail_alloc_page+0x55/0x60 [ 476.597138][T30395] prepare_alloc_pages+0x283/0x470 [ 476.602240][T30395] __alloc_pages_nodemask+0xb2/0x5d0 [ 476.607508][T30395] ? percpu_counter_add_batch+0x153/0x170 [ 476.613214][T30395] alloc_pages_vma+0x4e7/0x8b0 [ 476.617969][T30395] shmem_alloc_and_acct_page+0x429/0xbb0 [ 476.623595][T30395] shmem_getpage_gfp+0x1270/0x2c00 [ 476.628699][T30395] shmem_write_begin+0xcb/0x1b0 [ 476.633529][T30395] generic_perform_write+0x25d/0x4e0 [ 476.638808][T30395] __generic_file_write_iter+0x24b/0x520 [ 476.644428][T30395] generic_file_write_iter+0x445/0x5d0 [ 476.649875][T30395] __vfs_write+0x5a1/0x740 [ 476.654278][T30395] vfs_write+0x275/0x590 [ 476.658509][T30395] __x64_sys_pwrite64+0x162/0x1d0 [ 476.663518][T30395] do_syscall_64+0xfe/0x140 [ 476.668005][T30395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.673875][T30395] RIP: 0033:0x4137c7 [ 476.677756][T30395] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 476.697344][T30395] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 476.705745][T30395] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 476.713705][T30395] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 476.721670][T30395] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 476.729629][T30395] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 476.737584][T30395] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 476.745555][T30394] CPU: 0 PID: 30394 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 476.753538][T30394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.763580][T30394] Call Trace: [ 476.763596][T30394] dump_stack+0x1d8/0x2f8 [ 476.763609][T30394] should_fail+0x555/0x770 [ 476.763621][T30394] __should_failslab+0x11a/0x160 [ 476.763631][T30394] ? __alloc_file+0x2c/0x390 [ 476.763642][T30394] should_failslab+0x9/0x20 [ 476.763652][T30394] kmem_cache_alloc+0x56/0x2e0 [ 476.763663][T30394] __alloc_file+0x2c/0x390 [ 476.763673][T30394] alloc_empty_file+0xac/0x1b0 [ 476.763681][T30394] path_openat+0x9e/0x4460 [ 476.763689][T30394] ? __kasan_kmalloc+0x178/0x1b0 [ 476.763697][T30394] ? __kasan_kmalloc+0x11c/0x1b0 [ 476.763704][T30394] ? kasan_slab_alloc+0xf/0x20 [ 476.763711][T30394] ? kmem_cache_alloc+0x1f5/0x2e0 00:38:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) unlink(&(0x7f0000000040)='./file0\x00') r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 00:38:30 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 476.763723][T30394] ? getname+0x19/0x20 [ 476.771300][T30394] ? do_sys_open+0x261/0x560 [ 476.771316][T30394] ? do_syscall_64+0xfe/0x140 [ 476.771327][T30394] ? trace_lock_release+0x135/0x1a0 [ 476.771336][T30394] ? generic_file_write_iter+0x450/0x5d0 [ 476.771352][T30394] ? __kasan_check_write+0x14/0x20 [ 476.771363][T30394] ? trace_lock_release+0x135/0x1a0 [ 476.771372][T30394] ? __alloc_fd+0x58f/0x630 [ 476.771387][T30394] do_filp_open+0x192/0x3d0 [ 476.789755][T30394] ? _raw_spin_unlock+0x2c/0x50 [ 476.789774][T30394] do_sys_open+0x29f/0x560 [ 476.808050][T30394] __x64_sys_open+0x87/0x90 [ 476.808061][T30394] do_syscall_64+0xfe/0x140 [ 476.808074][T30394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.808082][T30394] RIP: 0033:0x413761 [ 476.808092][T30394] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 476.808097][T30394] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 00:38:30 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x80030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 476.808105][T30394] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 476.808110][T30394] RDX: 00007fe56b524b0a RSI: 0000000000000002 RDI: 00007fe56b524b00 [ 476.808115][T30394] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 476.808121][T30394] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 476.808126][T30394] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5451, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 477.071187][T30425] FAULT_INJECTION: forcing a failure. [ 477.071187][T30425] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.084421][T30425] CPU: 0 PID: 30425 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 477.092389][T30425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.102431][T30425] Call Trace: [ 477.102448][T30425] dump_stack+0x1d8/0x2f8 [ 477.102461][T30425] should_fail+0x555/0x770 [ 477.102476][T30425] should_fail_alloc_page+0x55/0x60 [ 477.102487][T30425] prepare_alloc_pages+0x283/0x470 [ 477.102496][T30425] __alloc_pages_nodemask+0xb2/0x5d0 [ 477.102514][T30425] kmem_getpages+0x56/0xa20 [ 477.114495][T30425] ? trace_lock_release+0x135/0x1a0 [ 477.139690][T30425] cache_grow_begin+0x7e/0x2c0 [ 477.144456][T30425] cache_alloc_refill+0x311/0x3f0 [ 477.149483][T30425] ? check_preemption_disabled+0xb7/0x2a0 [ 477.155200][T30425] kmem_cache_alloc+0x2b9/0x2e0 [ 477.155211][T30425] ? getname_flags+0xba/0x640 [ 477.155220][T30425] getname_flags+0xba/0x640 [ 477.155233][T30425] getname+0x19/0x20 [ 477.164716][T30425] do_sys_open+0x261/0x560 [ 477.164729][T30425] __x64_sys_open+0x87/0x90 [ 477.164741][T30425] do_syscall_64+0xfe/0x140 [ 477.164755][T30425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.192331][T30425] RIP: 0033:0x413761 [ 477.196217][T30425] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 477.215816][T30425] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 477.224217][T30425] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 477.232170][T30425] RDX: 00007fe56b524b0a RSI: 0000000000000002 RDI: 00007fe56b524b00 [ 477.240128][T30425] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.248100][T30425] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 477.256060][T30425] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xb}}, 0x1c) 00:38:31 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:31 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8e010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5452, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x800) ioctl$RTC_EPOCH_SET(r0, 0xc1004110, 0x70e005) 00:38:31 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:31 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000340)={0x6, 0x1}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x54, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x5, 0x3, 0x0, 0x3, 0x6, 0x0, &(0x7f0000000780)=""/4096, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000700)='H', 0x1}], 0x1, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000001940)={[], 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, [], 0x101}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000580)=""/85, &(0x7f0000000600)=0x55) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=""/59, &(0x7f0000000540)=0x3b) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 477.450194][T30456] FAULT_INJECTION: forcing a failure. [ 477.450194][T30456] name failslab, interval 1, probability 0, space 0, times 0 [ 477.462818][T30456] CPU: 1 PID: 30456 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 477.470785][T30456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.480837][T30456] Call Trace: [ 477.484129][T30456] dump_stack+0x1d8/0x2f8 [ 477.488465][T30456] should_fail+0x555/0x770 [ 477.492891][T30456] __should_failslab+0x11a/0x160 00:38:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x5460, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 477.497826][T30456] ? xas_create+0x1197/0x1910 [ 477.502514][T30456] should_failslab+0x9/0x20 [ 477.507012][T30456] kmem_cache_alloc+0x56/0x2e0 [ 477.511775][T30456] xas_create+0x1197/0x1910 [ 477.516287][T30456] xas_create_range+0x142/0x700 [ 477.521137][T30456] shmem_add_to_page_cache+0x8e1/0x1230 [ 477.526676][T30456] shmem_getpage_gfp+0x184b/0x2c00 [ 477.531776][T30456] shmem_write_begin+0xcb/0x1b0 [ 477.536601][T30456] generic_perform_write+0x25d/0x4e0 [ 477.541872][T30456] __generic_file_write_iter+0x24b/0x520 [ 477.547545][T30456] generic_file_write_iter+0x445/0x5d0 [ 477.552989][T30456] __vfs_write+0x5a1/0x740 [ 477.557380][T30456] vfs_write+0x275/0x590 [ 477.561608][T30456] __x64_sys_pwrite64+0x162/0x1d0 [ 477.566612][T30456] do_syscall_64+0xfe/0x140 [ 477.571100][T30456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.576977][T30456] RIP: 0033:0x4137c7 [ 477.580844][T30456] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 477.600426][T30456] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 477.608819][T30456] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 477.616786][T30456] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 477.624760][T30456] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 477.632708][T30456] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 477.640658][T30456] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:31 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x94010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 477.651356][T30462] FAULT_INJECTION: forcing a failure. [ 477.651356][T30462] name failslab, interval 1, probability 0, space 0, times 0 [ 477.737082][T30462] CPU: 0 PID: 30462 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 477.745086][T30462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.755131][T30462] Call Trace: [ 477.758407][T30462] dump_stack+0x1d8/0x2f8 [ 477.762713][T30462] should_fail+0x555/0x770 [ 477.767114][T30462] __should_failslab+0x11a/0x160 [ 477.772026][T30462] ? __alloc_file+0x2c/0x390 [ 477.776591][T30462] should_failslab+0x9/0x20 [ 477.781087][T30462] kmem_cache_alloc+0x56/0x2e0 [ 477.785838][T30462] __alloc_file+0x2c/0x390 [ 477.790242][T30462] alloc_empty_file+0xac/0x1b0 [ 477.794976][T30462] path_openat+0x9e/0x4460 [ 477.799364][T30462] ? __kasan_kmalloc+0x178/0x1b0 [ 477.804272][T30462] ? __kasan_kmalloc+0x11c/0x1b0 [ 477.809177][T30462] ? kasan_slab_alloc+0xf/0x20 [ 477.813913][T30462] ? kmem_cache_alloc+0x1f5/0x2e0 [ 477.818907][T30462] ? getname+0x19/0x20 [ 477.822943][T30462] ? do_sys_open+0x261/0x560 [ 477.827507][T30462] ? do_syscall_64+0xfe/0x140 [ 477.832160][T30462] ? trace_mm_page_alloc+0x17a/0x1f0 [ 477.838091][T30462] ? cache_grow_end+0x143/0x170 [ 477.842918][T30462] ? trace_lock_release+0x135/0x1a0 [ 477.848086][T30462] ? cache_grow_end+0x143/0x170 [ 477.852912][T30462] ? trace_lock_release+0x135/0x1a0 [ 477.858081][T30462] ? __alloc_fd+0x58f/0x630 [ 477.862557][T30462] do_filp_open+0x192/0x3d0 [ 477.867033][T30462] ? _raw_spin_unlock+0x2c/0x50 [ 477.871862][T30462] do_sys_open+0x29f/0x560 [ 477.876250][T30462] __x64_sys_open+0x87/0x90 [ 477.880727][T30462] do_syscall_64+0xfe/0x140 [ 477.885202][T30462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.891070][T30462] RIP: 0033:0x413761 [ 477.894937][T30462] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 477.914512][T30462] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 477.922894][T30462] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 477.930840][T30462] RDX: 00007fe56b524b0a RSI: 0000000000000002 RDI: 00007fe56b524b00 [ 477.938786][T30462] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.946733][T30462] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 477.954680][T30462] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:31 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:31 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x6364, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 478.061606][T30487] FAULT_INJECTION: forcing a failure. [ 478.061606][T30487] name failslab, interval 1, probability 0, space 0, times 0 [ 478.090778][T30489] FAULT_INJECTION: forcing a failure. [ 478.090778][T30489] name failslab, interval 1, probability 0, space 0, times 0 [ 478.106556][T30487] CPU: 0 PID: 30487 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 478.114564][T30487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.124614][T30487] Call Trace: [ 478.127900][T30487] dump_stack+0x1d8/0x2f8 [ 478.132236][T30487] should_fail+0x555/0x770 [ 478.136650][T30487] __should_failslab+0x11a/0x160 [ 478.141575][T30487] ? getname_flags+0xba/0x640 [ 478.146239][T30487] should_failslab+0x9/0x20 [ 478.150729][T30487] kmem_cache_alloc+0x56/0x2e0 [ 478.155479][T30487] ? check_preemption_disabled+0xb7/0x2a0 [ 478.161181][T30487] getname_flags+0xba/0x640 [ 478.165673][T30487] getname+0x19/0x20 [ 478.169548][T30487] do_sys_open+0x261/0x560 [ 478.173960][T30487] __x64_sys_open+0x87/0x90 [ 478.178452][T30487] do_syscall_64+0xfe/0x140 [ 478.182945][T30487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.188819][T30487] RIP: 0033:0x413761 [ 478.192698][T30487] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 478.212304][T30487] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 478.220702][T30487] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 478.228660][T30487] RDX: 00007f06bf5edb0a RSI: 0000000000000002 RDI: 00007f06bf5edb00 [ 478.236610][T30487] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 478.244562][T30487] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 478.252514][T30487] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 478.260499][T30489] CPU: 1 PID: 30489 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 478.268471][T30489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.278508][T30489] Call Trace: [ 478.281784][T30489] dump_stack+0x1d8/0x2f8 [ 478.286091][T30489] should_fail+0x555/0x770 [ 478.290488][T30489] __should_failslab+0x11a/0x160 [ 478.295397][T30489] ? security_file_alloc+0x36/0x200 [ 478.300566][T30489] should_failslab+0x9/0x20 [ 478.305040][T30489] kmem_cache_alloc+0x56/0x2e0 [ 478.309794][T30489] security_file_alloc+0x36/0x200 [ 478.314792][T30489] __alloc_file+0xde/0x390 [ 478.319180][T30489] alloc_empty_file+0xac/0x1b0 [ 478.323916][T30489] path_openat+0x9e/0x4460 [ 478.328303][T30489] ? __kasan_kmalloc+0x178/0x1b0 [ 478.333209][T30489] ? __kasan_kmalloc+0x11c/0x1b0 [ 478.338116][T30489] ? kasan_slab_alloc+0xf/0x20 [ 478.342849][T30489] ? kmem_cache_alloc+0x1f5/0x2e0 [ 478.347846][T30489] ? getname+0x19/0x20 [ 478.351883][T30489] ? do_sys_open+0x261/0x560 [ 478.356451][T30489] ? do_syscall_64+0xfe/0x140 [ 478.361102][T30489] ? trace_mm_page_alloc+0x17a/0x1f0 [ 478.366355][T30489] ? cache_grow_end+0x143/0x170 [ 478.371177][T30489] ? trace_lock_release+0x135/0x1a0 [ 478.376346][T30489] ? cache_grow_end+0x143/0x170 [ 478.381172][T30489] ? trace_lock_release+0x135/0x1a0 [ 478.386341][T30489] ? __alloc_fd+0x58f/0x630 [ 478.390816][T30489] do_filp_open+0x192/0x3d0 [ 478.395292][T30489] ? _raw_spin_unlock+0x2c/0x50 [ 478.400122][T30489] do_sys_open+0x29f/0x560 [ 478.404514][T30489] __x64_sys_open+0x87/0x90 [ 478.408989][T30489] do_syscall_64+0xfe/0x140 [ 478.413464][T30489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.419330][T30489] RIP: 0033:0x413761 [ 478.423212][T30489] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 478.442799][T30489] RSP: 002b:00007fe56b524a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 478.451181][T30489] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 478.459126][T30489] RDX: 00007fe56b524b0a RSI: 0000000000000002 RDI: 00007fe56b524b00 [ 478.467070][T30489] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 478.475014][T30489] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 478.482959][T30489] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xc}}, 0x1c) 00:38:32 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd4030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8901, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x28000, 0x8e4b9109a38cab7d) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@null=' \x00', 0x3, 'bridge_slave_0\x00'}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) write$sndseq(r2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfffffffffffffffe, 0x10000000}, {}, @raw8={"901d4fd834fced85cc688af7"}}], 0x30) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) 00:38:32 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:32 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:32 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xde010000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8902, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 478.646686][T30519] FAULT_INJECTION: forcing a failure. [ 478.646686][T30519] name failslab, interval 1, probability 0, space 0, times 0 [ 478.667177][T30514] FAULT_INJECTION: forcing a failure. [ 478.667177][T30514] name failslab, interval 1, probability 0, space 0, times 0 [ 478.697879][T30519] CPU: 0 PID: 30519 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 478.705888][T30519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.715936][T30519] Call Trace: [ 478.719230][T30519] dump_stack+0x1d8/0x2f8 [ 478.723575][T30519] should_fail+0x555/0x770 [ 478.727987][T30519] __should_failslab+0x11a/0x160 [ 478.727999][T30519] ? security_file_alloc+0x36/0x200 [ 478.728010][T30519] should_failslab+0x9/0x20 [ 478.728024][T30519] kmem_cache_alloc+0x56/0x2e0 [ 478.738111][T30519] security_file_alloc+0x36/0x200 [ 478.738124][T30519] __alloc_file+0xde/0x390 [ 478.738133][T30519] alloc_empty_file+0xac/0x1b0 [ 478.738140][T30519] path_openat+0x9e/0x4460 [ 478.738155][T30519] ? __kasan_kmalloc+0x178/0x1b0 [ 478.770838][T30519] ? __kasan_kmalloc+0x11c/0x1b0 [ 478.775767][T30519] ? kasan_slab_alloc+0xf/0x20 [ 478.780524][T30519] ? kmem_cache_alloc+0x1f5/0x2e0 [ 478.785545][T30519] ? getname+0x19/0x20 [ 478.789604][T30519] ? do_sys_open+0x261/0x560 [ 478.794179][T30519] ? do_syscall_64+0xfe/0x140 [ 478.794189][T30519] ? trace_lock_release+0x135/0x1a0 [ 478.794198][T30519] ? generic_file_write_iter+0x450/0x5d0 [ 478.794213][T30519] ? __kasan_check_write+0x14/0x20 [ 478.814750][T30519] ? trace_lock_release+0x135/0x1a0 [ 478.814761][T30519] ? __alloc_fd+0x58f/0x630 [ 478.814770][T30519] do_filp_open+0x192/0x3d0 [ 478.814783][T30519] ? _raw_spin_unlock+0x2c/0x50 [ 478.814804][T30519] do_sys_open+0x29f/0x560 [ 478.838187][T30519] __x64_sys_open+0x87/0x90 [ 478.842692][T30519] do_syscall_64+0xfe/0x140 [ 478.847202][T30519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.853093][T30519] RIP: 0033:0x413761 [ 478.856982][T30519] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 478.876610][T30519] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 478.885018][T30519] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 00:38:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8903, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:32 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe4030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8904, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 478.892989][T30519] RDX: 00007f06bf5edb0a RSI: 0000000000000002 RDI: 00007f06bf5edb00 [ 478.900951][T30519] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 478.900956][T30519] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 478.900961][T30519] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 478.935197][T30514] CPU: 0 PID: 30514 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 478.943213][T30514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.953252][T30514] Call Trace: [ 478.953268][T30514] dump_stack+0x1d8/0x2f8 [ 478.953282][T30514] should_fail+0x555/0x770 [ 478.953294][T30514] __should_failslab+0x11a/0x160 [ 478.953306][T30514] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 478.953315][T30514] should_failslab+0x9/0x20 [ 478.953323][T30514] __kmalloc+0x7a/0x340 [ 478.953331][T30514] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 478.953341][T30514] tomoyo_realpath_from_path+0xdc/0x7c0 00:38:32 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xed020000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 478.953353][T30514] tomoyo_path_number_perm+0x166/0x640 [ 478.953375][T30514] ? smack_file_ioctl+0x226/0x2e0 [ 479.006313][T30514] ? __fget+0x4a1/0x510 [ 479.010467][T30514] tomoyo_file_ioctl+0x23/0x30 [ 479.015228][T30514] security_file_ioctl+0x6d/0xd0 [ 479.020188][T30514] __x64_sys_ioctl+0xa3/0x120 [ 479.024861][T30514] do_syscall_64+0xfe/0x140 [ 479.024878][T30514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.035216][T30514] RIP: 0033:0x4596e7 [ 479.035226][T30514] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.035231][T30514] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 479.058687][T30514] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 479.058692][T30514] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 479.058697][T30514] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.058702][T30514] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 479.058707][T30514] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 479.063873][T30514] ERROR: Out of memory at tomoyo_realpath_from_path. 00:38:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xd}}, 0x1c) 00:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8906, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:33 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf2030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000280)=0x100000001, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000740)={{0x0, 0x0, 0x0, 0xf464, 'syz1\x00'}}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2d2, &(0x7f0000000440)=[{&(0x7f00000000c0), 0x0, 0x40}, {&(0x7f0000000300)="7a3d815a7b8aaecc1e04ed261cdd7447a8609f669f38c020694060eae9b4138fc04ad9553fa7bc93a9cf2be40bfd7d8cacbd8ad11f99a2e7035b29bab27c61f18b772efc242290aaa19f17c239b0bec6ad2f8f54c42f1eb3a8789bfe39cc4c70a5c2a85f0994e63b9d1fbf4b7dc666800363ed3f2e4c82f5169ed07aea6ae0378c547a5e", 0x84, 0x100000001}, {&(0x7f00000004c0)="4dec5bcd0449d25186baf4957e49001a57179674012231269487d2f296ed11ba87d44a52c14f6d45f9634894f38b516301878864653f179d38f07be373defb5d7e3a9db2b1b718bee6cd9703b9c54f99ceb862afb65005cfcae581bfb085f1f618", 0x61, 0x1}], 0x3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x2) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000c40)="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", 0x1000) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @rand_addr=0x400}}, 0xfffffffffffffffc, 0x1, 0x6, 0x6, 0x1}, 0x98) 00:38:33 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf8030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8907, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 479.555110][T30566] FAULT_INJECTION: forcing a failure. [ 479.555110][T30566] name failslab, interval 1, probability 0, space 0, times 0 [ 479.580403][T30572] FAULT_INJECTION: forcing a failure. [ 479.580403][T30572] name failslab, interval 1, probability 0, space 0, times 0 [ 479.613612][T30572] CPU: 0 PID: 30572 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 479.621638][T30572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.631711][T30572] Call Trace: [ 479.631730][T30572] dump_stack+0x1d8/0x2f8 [ 479.631742][T30572] should_fail+0x555/0x770 [ 479.631755][T30572] __should_failslab+0x11a/0x160 [ 479.631766][T30572] ? __alloc_file+0x2c/0x390 [ 479.631776][T30572] should_failslab+0x9/0x20 [ 479.631785][T30572] kmem_cache_alloc+0x56/0x2e0 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xfe030000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 479.631795][T30572] __alloc_file+0x2c/0x390 [ 479.631804][T30572] alloc_empty_file+0xac/0x1b0 [ 479.631817][T30572] path_openat+0x9e/0x4460 [ 479.668477][T30572] ? __kasan_kmalloc+0x178/0x1b0 [ 479.668485][T30572] ? __kasan_kmalloc+0x11c/0x1b0 [ 479.668492][T30572] ? kasan_slab_alloc+0xf/0x20 [ 479.668501][T30572] ? kmem_cache_alloc+0x1f5/0x2e0 [ 479.668509][T30572] ? getname+0x19/0x20 [ 479.668516][T30572] ? do_sys_open+0x261/0x560 [ 479.668525][T30572] ? do_syscall_64+0xfe/0x140 [ 479.668535][T30572] ? trace_mm_page_alloc+0x17a/0x1f0 [ 479.668549][T30572] ? cache_grow_end+0x143/0x170 [ 479.697294][T30572] ? trace_lock_release+0x135/0x1a0 [ 479.697305][T30572] ? cache_grow_end+0x143/0x170 [ 479.697316][T30572] ? trace_lock_release+0x135/0x1a0 [ 479.697324][T30572] ? __alloc_fd+0x58f/0x630 [ 479.697334][T30572] do_filp_open+0x192/0x3d0 [ 479.697345][T30572] ? _raw_spin_unlock+0x2c/0x50 [ 479.697359][T30572] do_sys_open+0x29f/0x560 [ 479.697371][T30572] __x64_sys_open+0x87/0x90 [ 479.726073][T30572] do_syscall_64+0xfe/0x140 [ 479.726086][T30572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.726097][T30572] RIP: 0033:0x413761 [ 479.758852][T30572] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 479.758858][T30572] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 479.758866][T30572] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 00:38:33 executing program 2: r0 = socket$kcm(0x10, 0xca5a0d28c49ee3b, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed0080648c6394f20531d200100010402c00000001000080000000011400f88000f01700d0bd", 0x2e}], 0x1}, 0x0) fsync(r0) 00:38:33 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 479.758870][T30572] RDX: 00007f06bf5edb0a RSI: 0000000000000002 RDI: 00007f06bf5edb00 [ 479.758874][T30572] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.758878][T30572] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 479.758882][T30572] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 479.820288][T30566] CPU: 0 PID: 30566 Comm: syz-executor.0 Not tainted 5.3.0-rc6+ #94 [ 479.850248][T30566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.850252][T30566] Call Trace: [ 479.850266][T30566] dump_stack+0x1d8/0x2f8 [ 479.850278][T30566] should_fail+0x555/0x770 [ 479.850291][T30566] __should_failslab+0x11a/0x160 [ 479.850303][T30566] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 479.850312][T30566] should_failslab+0x9/0x20 [ 479.850321][T30566] __kmalloc+0x7a/0x340 [ 479.850333][T30566] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 479.883141][T30566] tomoyo_realpath_from_path+0xdc/0x7c0 [ 479.903015][T30566] tomoyo_path_number_perm+0x166/0x640 [ 479.908492][T30566] ? smack_file_ioctl+0x226/0x2e0 [ 479.913518][T30566] ? __fget+0x4a1/0x510 [ 479.917682][T30566] tomoyo_file_ioctl+0x23/0x30 [ 479.922440][T30566] security_file_ioctl+0x6d/0xd0 [ 479.922451][T30566] __x64_sys_ioctl+0xa3/0x120 [ 479.922464][T30566] do_syscall_64+0xfe/0x140 [ 479.932172][T30566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.932181][T30566] RIP: 0033:0x4596e7 [ 479.932189][T30566] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.932193][T30566] RSP: 002b:00007fe56b524a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 479.932200][T30566] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 479.932205][T30566] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 479.932208][T30566] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 479.932212][T30566] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 479.932216][T30566] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000200)=@in={0x2, 0x4e20}, 0x64) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000080)=0x100000000) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="726573697a653d3078303030303030303030303030303062652c696f636861727365743d69736f383835392d392c6e6f696e746567726974792c646973636172649be7d4846a1c680dbb1a87e4b940ce2214b3dd99052057a0143e1335f850783d0df737480764cf64bf79c1cb09cf9d7c1d5f0d4cddc9a4041f8e6d5fd3420d07946dbe9d33b3f9bd"]) setsockopt$inet6_int(r3, 0x29, 0x1a, &(0x7f00000001c0)=0x6, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) 00:38:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xe}}, 0x1c) 00:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8910, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xfffdbc1c, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 479.975311][T30566] ERROR: Out of memory at tomoyo_realpath_from_path. [ 480.022430][T30603] FAULT_INJECTION: forcing a failure. [ 480.022430][T30603] name failslab, interval 1, probability 0, space 0, times 0 [ 480.045872][T30603] CPU: 0 PID: 30603 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 480.053878][T30603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.053883][T30603] Call Trace: [ 480.053899][T30603] dump_stack+0x1d8/0x2f8 [ 480.053916][T30603] should_fail+0x555/0x770 [ 480.053931][T30603] __should_failslab+0x11a/0x160 [ 480.053942][T30603] ? security_file_alloc+0x36/0x200 [ 480.053958][T30603] should_failslab+0x9/0x20 [ 480.090666][T30603] kmem_cache_alloc+0x56/0x2e0 [ 480.095445][T30603] security_file_alloc+0x36/0x200 [ 480.100570][T30603] __alloc_file+0xde/0x390 [ 480.105001][T30603] alloc_empty_file+0xac/0x1b0 [ 480.109902][T30603] path_openat+0x9e/0x4460 00:38:33 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2080) setsockopt$inet_dccp_buf(r0, 0x21, 0x8d, &(0x7f00000000c0)="e3bd77832436126b9b2eba813323112c4f9e7e9c4ef3e37cb1a1b181fdc73177267ca8e23277af18964dd4d267e2f5e85c13a5b6726c585a3a66b17772b252024f32f49505074352", 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x180, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/29) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b2b, &(0x7f0000000240)='wlan1\x00\xe6\x80\x96\xb2\r\x04b}\xca{\xc2:\x8c\x84\xab\xb4M\xd4;8w<+') 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xfffe4802, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 480.114332][T30603] ? __kasan_kmalloc+0x178/0x1b0 [ 480.119272][T30603] ? __kasan_kmalloc+0x11c/0x1b0 [ 480.119280][T30603] ? kasan_slab_alloc+0xf/0x20 [ 480.119290][T30603] ? kmem_cache_alloc+0x1f5/0x2e0 [ 480.119297][T30603] ? getname+0x19/0x20 [ 480.119305][T30603] ? do_sys_open+0x261/0x560 [ 480.119314][T30603] ? do_syscall_64+0xfe/0x140 [ 480.119325][T30603] ? trace_mm_page_alloc+0x17a/0x1f0 [ 480.119333][T30603] ? cache_grow_end+0x143/0x170 [ 480.119343][T30603] ? trace_lock_release+0x135/0x1a0 [ 480.119351][T30603] ? cache_grow_end+0x143/0x170 [ 480.119362][T30603] ? trace_lock_release+0x135/0x1a0 [ 480.119374][T30603] ? __alloc_fd+0x58f/0x630 [ 480.177480][T30603] do_filp_open+0x192/0x3d0 [ 480.177494][T30603] ? _raw_spin_unlock+0x2c/0x50 [ 480.177510][T30603] do_sys_open+0x29f/0x560 [ 480.177522][T30603] __x64_sys_open+0x87/0x90 [ 480.177532][T30603] do_syscall_64+0xfe/0x140 [ 480.177542][T30603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.177550][T30603] RIP: 0033:0x413761 [ 480.177558][T30603] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 480.177563][T30603] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 480.187107][T30603] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 480.187112][T30603] RDX: 00007f06bf5edb0a RSI: 0000000000000002 RDI: 00007f06bf5edb00 [ 480.187117][T30603] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 480.187122][T30603] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 480.187127][T30603] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:33 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8911, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:33 executing program 2: r0 = socket(0x10, 0x2, 0xc) r1 = semget(0x3, 0x0, 0x20) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x10000) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/213, 0xd5}], 0x1, &(0x7f0000000240)=""/160, 0xa0}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x208001, 0x0) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000380)=0x3) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b000007110000f30501000b000100050423ca0000cf", 0x1f) 00:38:34 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x40000000000003f, 0x0) 00:38:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8912, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 480.499571][T30635] FAULT_INJECTION: forcing a failure. [ 480.499571][T30635] name failslab, interval 1, probability 0, space 0, times 0 [ 480.534086][T30635] CPU: 1 PID: 30635 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 480.542101][T30635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.552488][T30635] Call Trace: [ 480.555789][T30635] dump_stack+0x1d8/0x2f8 [ 480.560274][T30635] should_fail+0x555/0x770 [ 480.564686][T30635] __should_failslab+0x11a/0x160 [ 480.569767][T30635] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 480.575474][T30635] should_failslab+0x9/0x20 [ 480.580227][T30635] __kmalloc+0x7a/0x340 [ 480.584461][T30635] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 480.590175][T30635] tomoyo_realpath_from_path+0xdc/0x7c0 [ 480.595810][T30635] tomoyo_path_number_perm+0x166/0x640 [ 480.601260][T30635] ? smack_file_ioctl+0x226/0x2e0 [ 480.606480][T30635] ? __fget+0x4a1/0x510 [ 480.611116][T30635] tomoyo_file_ioctl+0x23/0x30 [ 480.616479][T30635] security_file_ioctl+0x6d/0xd0 [ 480.621403][T30635] __x64_sys_ioctl+0xa3/0x120 [ 480.626133][T30635] do_syscall_64+0xfe/0x140 [ 480.630626][T30635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.636512][T30635] RIP: 0033:0x4596e7 [ 480.640387][T30635] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.660081][T30635] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.668482][T30635] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 480.676448][T30635] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 480.684515][T30635] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 480.692567][T30635] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 480.700614][T30635] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 480.710378][T30635] ERROR: Out of memory at tomoyo_realpath_from_path. 00:38:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x96, &(0x7f0000000180), &(0x7f0000000100)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) 00:38:34 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xf}}, 0x1c) 00:38:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8913, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:34 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='\\trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 481.272203][T30684] FAULT_INJECTION: forcing a failure. [ 481.272203][T30684] name failslab, interval 1, probability 0, space 0, times 0 [ 481.301419][T30684] CPU: 0 PID: 30684 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 481.309559][T30684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.319616][T30684] Call Trace: [ 481.322916][T30684] dump_stack+0x1d8/0x2f8 [ 481.327255][T30684] should_fail+0x555/0x770 [ 481.331833][T30684] __should_failslab+0x11a/0x160 [ 481.336769][T30684] ? tomoyo_encode2+0x273/0x5a0 [ 481.341609][T30684] should_failslab+0x9/0x20 [ 481.346210][T30684] __kmalloc+0x7a/0x340 [ 481.350358][T30684] tomoyo_encode2+0x273/0x5a0 [ 481.355298][T30684] tomoyo_realpath_from_path+0x769/0x7c0 [ 481.360952][T30684] tomoyo_path_number_perm+0x166/0x640 [ 481.366656][T30684] ? smack_file_ioctl+0x226/0x2e0 [ 481.371792][T30684] ? __fget+0x4a1/0x510 [ 481.376094][T30684] tomoyo_file_ioctl+0x23/0x30 [ 481.380851][T30684] security_file_ioctl+0x6d/0xd0 [ 481.386020][T30684] __x64_sys_ioctl+0xa3/0x120 [ 481.390689][T30684] do_syscall_64+0xfe/0x140 [ 481.395186][T30684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.401067][T30684] RIP: 0033:0x4596e7 [ 481.404950][T30684] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.424543][T30684] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 481.433076][T30684] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 481.441039][T30684] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 481.449300][T30684] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 481.457343][T30684] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 481.465301][T30684] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:35 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 481.474422][T30684] ERROR: Out of memory at tomoyo_realpath_from_path. [ 481.483950][T30690] device bond0 entered promiscuous mode [ 481.495142][T30690] device bond_slave_0 entered promiscuous mode 00:38:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x891d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:35 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 481.757322][T30717] FAULT_INJECTION: forcing a failure. [ 481.757322][T30717] name failslab, interval 1, probability 0, space 0, times 0 [ 481.770646][T30717] CPU: 1 PID: 30717 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 481.778641][T30717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.788701][T30717] Call Trace: [ 481.792008][T30717] dump_stack+0x1d8/0x2f8 [ 481.796353][T30717] should_fail+0x555/0x770 [ 481.800775][T30717] __should_failslab+0x11a/0x160 [ 481.805718][T30717] ? tomoyo_encode2+0x273/0x5a0 [ 481.810833][T30717] should_failslab+0x9/0x20 [ 481.815328][T30717] __kmalloc+0x7a/0x340 [ 481.819473][T30717] tomoyo_encode2+0x273/0x5a0 [ 481.824138][T30717] tomoyo_realpath_from_path+0x769/0x7c0 [ 481.829907][T30717] tomoyo_check_open_permission+0x1ce/0x9d0 [ 481.835795][T30717] tomoyo_file_open+0x141/0x190 [ 481.840757][T30717] security_file_open+0x65/0x2f0 [ 481.845692][T30717] do_dentry_open+0x34e/0xf90 [ 481.850546][T30717] vfs_open+0x73/0x80 [ 481.854532][T30717] path_openat+0x1397/0x4460 [ 481.859108][T30717] ? getname+0x19/0x20 [ 481.863165][T30717] ? cache_grow_end+0x143/0x170 [ 481.868024][T30717] ? trace_lock_release+0x135/0x1a0 [ 481.873235][T30717] ? __alloc_fd+0x58f/0x630 [ 481.878187][T30717] do_filp_open+0x192/0x3d0 [ 481.882707][T30717] do_sys_open+0x29f/0x560 [ 481.887130][T30717] __x64_sys_open+0x87/0x90 [ 481.891636][T30717] do_syscall_64+0xfe/0x140 [ 481.896145][T30717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.902243][T30717] RIP: 0033:0x413761 [ 481.906242][T30717] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 481.926008][T30717] RSP: 002b:00007f06bf5eda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 481.934686][T30717] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 481.942647][T30717] RDX: 00007f06bf5edb0a RSI: 0000000000000002 RDI: 00007f06bf5edb00 [ 481.950604][T30717] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 481.958561][T30717] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 481.966673][T30717] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 481.975360][T30717] ERROR: Out of memory at tomoyo_realpath_from_path. 00:38:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x404080) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/252) ioctl(r0, 0xc1004111, &(0x7f0000000000)) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 00:38:35 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x891f, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x10}}, 0x1c) 00:38:35 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8920, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 482.236638][T30750] FAULT_INJECTION: forcing a failure. [ 482.236638][T30750] name failslab, interval 1, probability 0, space 0, times 0 [ 482.257439][T30750] CPU: 0 PID: 30750 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 482.265455][T30750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.275642][T30750] Call Trace: [ 482.279087][T30750] dump_stack+0x1d8/0x2f8 00:38:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8921, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 482.283428][T30750] should_fail+0x555/0x770 [ 482.288025][T30750] __should_failslab+0x11a/0x160 [ 482.293125][T30750] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 482.298851][T30750] should_failslab+0x9/0x20 [ 482.303346][T30750] __kmalloc+0x7a/0x340 [ 482.307634][T30750] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 482.313466][T30750] tomoyo_realpath_from_path+0xdc/0x7c0 [ 482.319136][T30750] tomoyo_path_number_perm+0x166/0x640 [ 482.324615][T30750] ? smack_file_ioctl+0x226/0x2e0 [ 482.329706][T30750] ? __fget+0x4a1/0x510 [ 482.333846][T30750] tomoyo_file_ioctl+0x23/0x30 [ 482.338721][T30750] security_file_ioctl+0x6d/0xd0 [ 482.343642][T30750] __x64_sys_ioctl+0xa3/0x120 [ 482.348306][T30750] do_syscall_64+0xfe/0x140 [ 482.352896][T30750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.358937][T30750] RIP: 0033:0x4596e7 [ 482.362815][T30750] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:36 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='part=0x00000000k=00000000000000000\x0000000,\x00'/55]) [ 482.382733][T30750] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.391129][T30750] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 482.399112][T30750] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 482.407155][T30750] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 482.415110][T30750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 482.423509][T30750] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:36 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x201000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 482.432889][T30750] ERROR: Out of memory at tomoyo_realpath_from_path. 00:38:36 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000062d7206903d64063b78f2f2f960ac76c63ec7064d43aa3c6451500000000000088a03f72afb0da83b0ed4987270096386dc665ae21c3f3f202cbb74757f77ef854b1c46c76c2a5a56f3bd8e2a591aa281a9cd2cc2357481bd438107c16a90ea803d33e1d127e40bd47d0aef215b96a828631f46709ad786c9b748fa0b1"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x40, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='yeah\x00', 0x5) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000c00)={@mcast2, 0x0}, &(0x7f0000000c40)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x10, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x1, 0x0, 0x0, 0xa, 0x8, 0x4, 0xfffffffffffffffc}, @exit, @map={0x18, 0x4, 0x1, 0x0, r2}]}, &(0x7f0000000140)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x7, [], r3, 0x2a98c0630b357bc1, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x0, 0xd, 0x0, 0x6}, 0x10}, 0x70) ioctl$RTC_PIE_OFF(r2, 0x7006) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x38, 0x0, &(0x7f0000000240)="f460cdfbef24080000000a9386dd6a00000000072beb3014cd3ec8a755c1e1380081ffad0c0000e8d5000000019a0f000000000500240609", 0x0}, 0x28) 00:38:36 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x248feff00000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 482.629817][T30784] bond0: mtu greater than device maximum [ 482.635765][T30782] FAULT_INJECTION: forcing a failure. [ 482.635765][T30782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.641822][T30786] bond0: mtu greater than device maximum [ 482.649099][T30782] CPU: 0 PID: 30782 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 482.649106][T30782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.649110][T30782] Call Trace: [ 482.649127][T30782] dump_stack+0x1d8/0x2f8 [ 482.649141][T30782] should_fail+0x555/0x770 [ 482.649153][T30782] should_fail_alloc_page+0x55/0x60 [ 482.649163][T30782] prepare_alloc_pages+0x283/0x470 [ 482.649175][T30782] __alloc_pages_nodemask+0xb2/0x5d0 [ 482.649184][T30782] ? stack_trace_save+0x150/0x150 [ 482.649197][T30782] kmem_getpages+0x56/0xa20 [ 482.649207][T30782] cache_grow_begin+0x7e/0x2c0 [ 482.649218][T30782] cache_alloc_refill+0x311/0x3f0 [ 482.649227][T30782] ? check_preemption_disabled+0xb7/0x2a0 [ 482.649240][T30782] __kmalloc+0x318/0x340 [ 482.715023][T30782] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 482.715035][T30782] tomoyo_realpath_from_path+0xdc/0x7c0 [ 482.715048][T30782] tomoyo_path_number_perm+0x166/0x640 [ 482.741417][T30782] ? smack_file_ioctl+0x226/0x2e0 [ 482.741431][T30782] ? __fget+0x4a1/0x510 [ 482.756162][T30782] tomoyo_file_ioctl+0x23/0x30 [ 482.760937][T30782] security_file_ioctl+0x6d/0xd0 [ 482.765949][T30782] __x64_sys_ioctl+0xa3/0x120 [ 482.770641][T30782] do_syscall_64+0xfe/0x140 [ 482.775148][T30782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.775157][T30782] RIP: 0033:0x4596e7 [ 482.775168][T30782] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.775172][T30782] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.775180][T30782] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 482.775184][T30782] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 482.775189][T30782] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 482.775194][T30782] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 482.775199][T30782] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='bt\\fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x11}}, 0x1c) 00:38:36 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="00042bbd7000fcdbdf25060000000c00060004000200040002009c0005000c00020008000200e30600001c00020008000200000000000800030006000000080002000200000008000100696200000800010065746800080001006962000008000100696200000c00020008000200040000003c00020008000300060000000800030005000000080002000500000008000400050000000800030004000000080004000000008008000000000000000800010075647000b400050008000100759096253200020008000300fdffffff080003000900000008004b92bc02ffef15e50200f7ffffff08000100010000000800040054000000080002002b9f00001c00020008000100030000000800025f2110000008000100180000001c00020008000200060000000800c0859db70000080001000e00000034000200080002000400000008000200000001000800040004000037523b32201e84fbea172e4a0008000200000000000800040007000000080001000500000010000600040002000800010008000000ad2beb0a82292e7dc9a0d2f3190c3840299a6484d759afce600700d7c46c4a2ee0eb4bcfebad626b15003e4b7146f7f9058f82398b103852bf3fbeac1ad9b5b71056cd376b965311e7f5167c308ae90010000000000000b71162291035501b549c06d2f28e91d48fdaf13916077df00d01dfbbe931a412060000008052d67b321aa703a555a8ddfe2203c0fb6ff9754f5b052be92fec530106bbe40906ac3b417c8ccb183676a5de49e391dceabb763321a0bf0fd37f7aad562201a2a6634743f4c516d98d758f8f3214aa006ad3ed62277707e48d7dd582acc872a9ea84e5151333dde8b02e3f025c25dbbd8ac2808d1bfa929ae32d77b8330c2957c85cdfe981310c299dfc45efe523e039f9ec4576b91803bc7798e808420c1eeb7f51996b0d6f6ecaf30aa3e6412737c71a98c671aa7e6a99a464f55feb48a3c4a93d3c1c28d7a0bba8602a70a9af64bb710ac057ef0a570f97688c16e707deaeb99722272fa90bc6cd19c35e678f2847e9e42403676523da633ba7880a6d46399bf70c2e569ed88a99fd9f2871b07db2ddac27916a1d1228b64e4a1f382c5422feec98e0b5d2a348f62ac387faaa8fb2b6beb3db0221ba5200000000000000"], 0x1}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xa2762718ec785d0, 0x0, 0x0, 0x342) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000008c0)="67eda5337b2b10bd62804119bc34ede03b0855b3b09ea48322621bf176dfcefdaa13c3916380386001d72a2807b571de6463", 0x32, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40, 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f0000000140)='/dev/kvm\x00', &(0x7f0000000400)="4ce6b590ab3be3ad56683177f3a6e7c31c0944a0ff1e8b2ec4af9160a57dc6ff6aff516f4651121e1886017c9ea6e4dd8de9fdecab7fb6e65a9f202efdd492dc3200a280873db7d3debd2e9106569e16a165fe5e7acbcd2fd7f8d4e12ef176cd66e54eb0c0c29f0308af01dd5e6b5466fbb9584ecc0e5941ffc1b763fc6ea551423884a358cb3af215ce13dd4a85fb4abb1ec0d4a08ba911d5f2e91787dd4bae113b4b3da2704cf04dc763f356e908f26eb4c5ad6439053c99d072ea4faf6b2260b72d54c60ca38a3bd27cbe22", 0xcd) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:38:36 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8927, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:36 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 483.153930][T30828] FAULT_INJECTION: forcing a failure. [ 483.153930][T30828] name failslab, interval 1, probability 0, space 0, times 0 [ 483.176079][T30828] CPU: 0 PID: 30828 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 483.184095][T30828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.194161][T30828] Call Trace: [ 483.197465][T30828] dump_stack+0x1d8/0x2f8 [ 483.201816][T30828] should_fail+0x555/0x770 [ 483.206378][T30828] __should_failslab+0x11a/0x160 [ 483.211330][T30828] ? __kernfs_new_node+0x97/0x6b0 [ 483.216503][T30828] should_failslab+0x9/0x20 [ 483.216516][T30828] kmem_cache_alloc+0x56/0x2e0 [ 483.216530][T30828] __kernfs_new_node+0x97/0x6b0 [ 483.225914][T30828] ? __kasan_check_write+0x14/0x20 [ 483.225925][T30828] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 483.225936][T30828] ? mutex_unlock+0xd/0x10 [ 483.225943][T30828] ? kernfs_activate+0x213/0x230 [ 483.225955][T30828] kernfs_new_node+0x97/0x180 [ 483.255587][T30828] __kernfs_create_file+0x4a/0x2f0 [ 483.260680][T30828] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 483.266086][T30828] internal_create_group+0x4be/0xd90 [ 483.271397][T30828] sysfs_create_group+0x1f/0x30 [ 483.276234][T30828] loop_set_fd+0xcb2/0x1180 [ 483.280722][T30828] lo_ioctl+0xd5/0x2200 [ 483.284875][T30828] ? __kasan_slab_free+0x12a/0x1e0 [ 483.289965][T30828] ? kasan_slab_free+0xe/0x10 [ 483.294623][T30828] ? kfree+0x115/0x200 [ 483.298675][T30828] ? tomoyo_path_number_perm+0x4e1/0x640 [ 483.304289][T30828] ? tomoyo_file_ioctl+0x23/0x30 [ 483.309208][T30828] ? security_file_ioctl+0x6d/0xd0 [ 483.314359][T30828] ? __x64_sys_ioctl+0xa3/0x120 [ 483.319192][T30828] ? do_syscall_64+0xfe/0x140 [ 483.323911][T30828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.329963][T30828] ? debug_check_no_obj_freed+0x505/0x5b0 [ 483.335665][T30828] ? trace_lock_release+0x135/0x1a0 [ 483.340847][T30828] ? debug_check_no_obj_freed+0x505/0x5b0 [ 483.346553][T30828] ? rcu_lock_release+0x9/0x30 [ 483.351301][T30828] ? trace_lock_release+0x135/0x1a0 [ 483.356546][T30828] ? rcu_lock_release+0x9/0x30 [ 483.361292][T30828] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 483.366908][T30828] ? lo_release+0x1f0/0x1f0 [ 483.371392][T30828] blkdev_ioctl+0x807/0x2990 [ 483.375966][T30828] ? tomoyo_path_number_perm+0x53e/0x640 [ 483.381645][T30828] block_ioctl+0xbd/0x100 [ 483.385958][T30828] ? blkdev_iopoll+0x100/0x100 [ 483.390720][T30828] do_vfs_ioctl+0x744/0x1730 [ 483.395374][T30828] ? __fget+0x4a1/0x510 [ 483.399515][T30828] ? tomoyo_file_ioctl+0x23/0x30 [ 483.404433][T30828] ? security_file_ioctl+0xa1/0xd0 [ 483.409593][T30828] __x64_sys_ioctl+0xe3/0x120 [ 483.414253][T30828] do_syscall_64+0xfe/0x140 [ 483.418785][T30828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.424753][T30828] RIP: 0033:0x4596e7 [ 483.428634][T30828] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.448397][T30828] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.456791][T30828] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 483.464747][T30828] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 483.473052][T30828] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 483.481010][T30828] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 483.488967][T30828] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 483.505277][T30831] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 483.531393][ T2510] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.542349][ T2510] Buffer I/O error on dev loop0, logical block 0, async page read 00:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8929, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 483.554614][ T2511] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.566171][ T2511] Buffer I/O error on dev loop0, logical block 0, async page read [ 483.575842][ T2510] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.587096][ T2510] Buffer I/O error on dev loop0, logical block 0, async page read [ 483.595388][ T2511] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 00:38:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4b, &(0x7f0000000000)="7400b79d8574554869cd0808b579f57f42dac4b13497") ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x20400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @loopback}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x14, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) 00:38:37 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 483.607052][ T2511] Buffer I/O error on dev loop0, logical block 0, async page read [ 483.615770][ T2510] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.627122][ T2510] Buffer I/O error on dev loop0, logical block 0, async page read [ 483.681562][ T2510] blk_update_request: I/O error, dev loop0, sector 24 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 483.693314][ T2510] Buffer I/O error on dev loop0, logical block 3, async page read 00:38:37 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8930, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:37 executing program 2: [ 483.888676][T30871] FAULT_INJECTION: forcing a failure. [ 483.888676][T30871] name failslab, interval 1, probability 0, space 0, times 0 [ 483.920677][T30871] CPU: 0 PID: 30871 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 483.928825][T30871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.938879][T30871] Call Trace: [ 483.942161][T30871] dump_stack+0x1d8/0x2f8 [ 483.946623][T30871] should_fail+0x555/0x770 [ 483.951176][T30871] __should_failslab+0x11a/0x160 [ 483.956105][T30871] ? loop_set_fd+0x1180/0x1180 [ 483.960860][T30871] should_failslab+0x9/0x20 [ 483.965367][T30871] kmem_cache_alloc_trace+0x5d/0x2f0 [ 483.970771][T30871] ? __kthread_create_on_node+0xb2/0x3b0 [ 483.976392][T30871] ? loop_set_fd+0x1180/0x1180 [ 483.981318][T30871] __kthread_create_on_node+0xb2/0x3b0 [ 483.986769][T30871] ? loop_set_fd+0x1180/0x1180 [ 483.991659][T30871] kthread_create_on_node+0x72/0xa0 [ 483.996843][T30871] ? lockdep_init_map+0x2a/0x680 [ 484.001765][T30871] ? __kthread_init_worker+0x5a/0xe0 [ 484.007253][T30871] loop_set_fd+0x6a8/0x1180 [ 484.011758][T30871] ? check_preemption_disabled+0xb7/0x2a0 [ 484.017475][T30871] ? tomoyo_path_number_perm+0x4e1/0x640 [ 484.023098][T30871] lo_ioctl+0xd5/0x2200 [ 484.027901][T30871] ? __kasan_slab_free+0x12a/0x1e0 [ 484.033097][T30871] ? kasan_slab_free+0xe/0x10 [ 484.037756][T30871] ? kfree+0x115/0x200 [ 484.041805][T30871] ? tomoyo_path_number_perm+0x4e1/0x640 [ 484.047599][T30871] ? tomoyo_file_ioctl+0x23/0x30 [ 484.052531][T30871] ? security_file_ioctl+0x6d/0xd0 [ 484.057630][T30871] ? __x64_sys_ioctl+0xa3/0x120 [ 484.062591][T30871] ? do_syscall_64+0xfe/0x140 [ 484.067260][T30871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.073314][T30871] ? debug_check_no_obj_freed+0x505/0x5b0 [ 484.079016][T30871] ? trace_lock_release+0x135/0x1a0 [ 484.084195][T30871] ? debug_check_no_obj_freed+0x505/0x5b0 [ 484.089915][T30871] ? rcu_lock_release+0x9/0x30 [ 484.094751][T30871] ? trace_lock_release+0x135/0x1a0 [ 484.100153][T30871] ? rcu_lock_release+0x9/0x30 [ 484.104956][T30871] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 484.110590][T30871] ? lo_release+0x1f0/0x1f0 [ 484.115087][T30871] blkdev_ioctl+0x807/0x2990 [ 484.119771][T30871] ? tomoyo_path_number_perm+0x53e/0x640 [ 484.125390][T30871] block_ioctl+0xbd/0x100 [ 484.129703][T30871] ? blkdev_iopoll+0x100/0x100 [ 484.134451][T30871] do_vfs_ioctl+0x744/0x1730 [ 484.139020][T30871] ? __fget+0x4a1/0x510 [ 484.143162][T30871] ? tomoyo_file_ioctl+0x23/0x30 [ 484.148084][T30871] ? security_file_ioctl+0xa1/0xd0 [ 484.153241][T30871] __x64_sys_ioctl+0xe3/0x120 [ 484.157903][T30871] do_syscall_64+0xfe/0x140 [ 484.162387][T30871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.168260][T30871] RIP: 0033:0x4596e7 00:38:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x12}}, 0x1c) 00:38:37 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x44287, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x1) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10004, 0x1, 0x4000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl(r0, 0x78bb8783, &(0x7f0000000100)) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) 00:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8931, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 484.172134][T30871] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.191725][T30871] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.200208][T30871] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 484.208275][T30871] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 484.216229][T30871] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 484.224187][T30871] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 484.232144][T30871] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:37 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, r0, 0x0, 0x241, 0x0}, 0x30) 00:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8933, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:38 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 484.480154][T30910] FAULT_INJECTION: forcing a failure. [ 484.480154][T30910] name failslab, interval 1, probability 0, space 0, times 0 [ 484.493147][T30910] CPU: 1 PID: 30910 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 484.501124][T30910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.511390][T30910] Call Trace: [ 484.514689][T30910] dump_stack+0x1d8/0x2f8 [ 484.519029][T30910] should_fail+0x555/0x770 [ 484.523449][T30910] __should_failslab+0x11a/0x160 [ 484.528376][T30910] ? radix_tree_node_alloc+0x1a1/0x370 [ 484.533835][T30910] should_failslab+0x9/0x20 [ 484.538334][T30910] kmem_cache_alloc+0x56/0x2e0 [ 484.543090][T30910] ? rcu_lock_release+0x4/0x20 [ 484.548016][T30910] radix_tree_node_alloc+0x1a1/0x370 [ 484.553288][T30910] ? __cgroup_account_cputime+0x335/0x350 [ 484.559200][T30910] idr_get_free+0x2b8/0x890 [ 484.563692][T30910] idr_alloc_cyclic+0x18b/0x550 [ 484.568534][T30910] __kernfs_new_node+0x124/0x6b0 [ 484.573470][T30910] ? _raw_spin_unlock_irq+0x69/0x80 [ 484.578657][T30910] ? __schedule+0x998/0xc50 [ 484.583295][T30910] kernfs_new_node+0x97/0x180 [ 484.588080][T30910] kernfs_create_dir_ns+0x44/0x130 [ 484.593300][T30910] internal_create_group+0x207/0xd90 [ 484.598576][T30910] sysfs_create_group+0x1f/0x30 [ 484.603545][T30910] loop_set_fd+0xcb2/0x1180 [ 484.608134][T30910] lo_ioctl+0xd5/0x2200 [ 484.612278][T30910] ? __kasan_slab_free+0x12a/0x1e0 [ 484.617511][T30910] ? kasan_slab_free+0xe/0x10 [ 484.622186][T30910] ? kfree+0x115/0x200 [ 484.626265][T30910] ? tomoyo_path_number_perm+0x4e1/0x640 [ 484.631886][T30910] ? tomoyo_file_ioctl+0x23/0x30 [ 484.636936][T30910] ? security_file_ioctl+0x6d/0xd0 [ 484.642032][T30910] ? __x64_sys_ioctl+0xa3/0x120 [ 484.647063][T30910] ? do_syscall_64+0xfe/0x140 [ 484.651736][T30910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.657799][T30910] ? debug_check_no_obj_freed+0x505/0x5b0 [ 484.663662][T30910] ? trace_lock_release+0x135/0x1a0 [ 484.668861][T30910] ? debug_check_no_obj_freed+0x505/0x5b0 [ 484.674574][T30910] ? rcu_lock_release+0x9/0x30 [ 484.679325][T30910] ? trace_lock_release+0x135/0x1a0 [ 484.684514][T30910] ? rcu_lock_release+0x9/0x30 [ 484.689269][T30910] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 484.694891][T30910] ? lo_release+0x1f0/0x1f0 [ 484.699383][T30910] blkdev_ioctl+0x807/0x2990 [ 484.703960][T30910] ? tomoyo_path_number_perm+0x53e/0x640 [ 484.709702][T30910] block_ioctl+0xbd/0x100 [ 484.714017][T30910] ? blkdev_iopoll+0x100/0x100 [ 484.718861][T30910] do_vfs_ioctl+0x744/0x1730 [ 484.723520][T30910] ? __fget+0x4a1/0x510 [ 484.727669][T30910] ? tomoyo_file_ioctl+0x23/0x30 [ 484.732751][T30910] ? security_file_ioctl+0xa1/0xd0 [ 484.737850][T30910] __x64_sys_ioctl+0xe3/0x120 [ 484.742515][T30910] do_syscall_64+0xfe/0x140 [ 484.747008][T30910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.752884][T30910] RIP: 0033:0x4596e7 [ 484.756765][T30910] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.776464][T30910] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.784864][T30910] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 484.792838][T30910] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 484.800970][T30910] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 484.809159][T30910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 484.817115][T30910] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:38 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000380)={0x1d, r1}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101002, 0x0) r3 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000004) inotify_rm_watch(r2, r3) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 00:38:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x25}}, 0x1c) 00:38:38 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x702000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:38 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6f0bcf6c7bf070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x87eefc7d4eaf0200) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8002020}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_deladdr={0x40, 0x15, 0x0, 0x70bd29, 0x25dfdbff, {0xa, 0x80, 0x20, 0xff, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x6, 0x0, 0x2, 0x5}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8080) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) 00:38:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8940, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 485.249223][T30958] FAULT_INJECTION: forcing a failure. [ 485.249223][T30958] name failslab, interval 1, probability 0, space 0, times 0 [ 485.261972][T30958] CPU: 0 PID: 30958 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 485.270114][T30958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.280166][T30958] Call Trace: [ 485.283446][T30958] dump_stack+0x1d8/0x2f8 [ 485.288064][T30958] should_fail+0x555/0x770 [ 485.292488][T30958] __should_failslab+0x11a/0x160 [ 485.297551][T30958] ? radix_tree_node_alloc+0x1a1/0x370 [ 485.303001][T30958] should_failslab+0x9/0x20 [ 485.307496][T30958] kmem_cache_alloc+0x56/0x2e0 [ 485.312407][T30958] ? rcu_lock_release+0x4/0x20 [ 485.317338][T30958] radix_tree_node_alloc+0x1a1/0x370 [ 485.322607][T30958] ? __cgroup_account_cputime+0x335/0x350 [ 485.328324][T30958] idr_get_free+0x2b8/0x890 [ 485.333044][T30958] idr_alloc_cyclic+0x18b/0x550 [ 485.337886][T30958] __kernfs_new_node+0x124/0x6b0 [ 485.342809][T30958] ? _raw_spin_unlock_irq+0x69/0x80 [ 485.347996][T30958] ? __schedule+0x998/0xc50 [ 485.352489][T30958] kernfs_new_node+0x97/0x180 [ 485.357149][T30958] kernfs_create_dir_ns+0x44/0x130 [ 485.362240][T30958] internal_create_group+0x207/0xd90 [ 485.367632][T30958] sysfs_create_group+0x1f/0x30 [ 485.372628][T30958] loop_set_fd+0xcb2/0x1180 [ 485.377120][T30958] lo_ioctl+0xd5/0x2200 [ 485.381266][T30958] ? __kasan_slab_free+0x12a/0x1e0 [ 485.386583][T30958] ? kasan_slab_free+0xe/0x10 [ 485.391251][T30958] ? kfree+0x115/0x200 [ 485.395509][T30958] ? tomoyo_path_number_perm+0x4e1/0x640 [ 485.401300][T30958] ? tomoyo_file_ioctl+0x23/0x30 [ 485.406229][T30958] ? security_file_ioctl+0x6d/0xd0 [ 485.411328][T30958] ? __x64_sys_ioctl+0xa3/0x120 [ 485.416160][T30958] ? do_syscall_64+0xfe/0x140 [ 485.420917][T30958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.427100][T30958] ? debug_check_no_obj_freed+0x505/0x5b0 [ 485.432808][T30958] ? trace_lock_release+0x135/0x1a0 [ 485.437987][T30958] ? debug_check_no_obj_freed+0x505/0x5b0 [ 485.443881][T30958] ? rcu_lock_release+0x9/0x30 [ 485.448657][T30958] ? trace_lock_release+0x135/0x1a0 [ 485.453918][T30958] ? rcu_lock_release+0x9/0x30 [ 485.458719][T30958] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 485.464414][T30958] ? lo_release+0x1f0/0x1f0 [ 485.468907][T30958] blkdev_ioctl+0x807/0x2990 [ 485.473590][T30958] ? tomoyo_path_number_perm+0x53e/0x640 [ 485.479216][T30958] block_ioctl+0xbd/0x100 [ 485.483534][T30958] ? blkdev_iopoll+0x100/0x100 [ 485.488284][T30958] do_vfs_ioctl+0x744/0x1730 [ 485.492856][T30958] ? __fget+0x4a1/0x510 [ 485.496997][T30958] ? tomoyo_file_ioctl+0x23/0x30 [ 485.502027][T30958] ? security_file_ioctl+0xa1/0xd0 [ 485.507124][T30958] __x64_sys_ioctl+0xe3/0x120 [ 485.511790][T30958] do_syscall_64+0xfe/0x140 [ 485.516293][T30958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.522167][T30958] RIP: 0033:0x4596e7 [ 485.526127][T30958] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8941, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0xfffffffffffffffe, &(0x7f0000000040)=""/247, 0x2e3, 0xffffffffffffff75, 0x1}, 0x20) [ 485.546411][T30958] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.554818][T30958] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 485.562782][T30958] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 485.570738][T30958] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 485.578866][T30958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 485.586834][T30958] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:39 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:39 executing program 2: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x5, 0xffff}, 0x8) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000280000000000069078ac14ffaae000000100004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="50100000907800007269b38f176c38c5ddd287735c4500ecc62f2ea962f10e5f7165bbd9ebcdc433cff61b562168f931ba540d154db4b0e886b6faf722ccb7b7121efcca07aec2d1157bcf022d6b2dc41b623613e5ec530d38ceb155f98facbeb7e4a3eeb298c760e2eba522cbedfe704819c47ba66541754fcac7e1a49d67a8433cd0bdc24e"], 0x0) 00:38:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8942, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x44}}, 0x1c) 00:38:40 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:40 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'proc\x00'}, {0x20, '\xb3'}, {0x20, '$[(^'}, {}, {0x20, 'proc\x00'}, {0x20, 'em0'}], 0xa, "25b5c1358d4d6c5c1552e2bcfbc9000e8f995ac2a71f776d1fd6199803864d2be6d4"}, 0x45) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000300)="defaadec6be8172c2f107d52e18635b2b9daf9ac6dd0fde4f319bd97d69cc6452054d6d01e9590ad96ea2a407e1e65fee10a8d4bdd57578c6ec89f123f5f2e5165b9766e8b28") r2 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f00000002c0), &(0x7f0000000280)=0x4) fchdir(r2) r3 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000080)=ANY=[], 0x3) ioctl$TCFLSH(r1, 0x540b, 0x9) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r3, 0x0) getdents(r1, &(0x7f0000000200)=""/18, 0x12) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x548) 00:38:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8943, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8946, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 486.565109][T31030] FAULT_INJECTION: forcing a failure. [ 486.565109][T31030] name failslab, interval 1, probability 0, space 0, times 0 [ 486.584474][T31030] CPU: 1 PID: 31030 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 486.592679][T31030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.602736][T31030] Call Trace: [ 486.606177][T31030] dump_stack+0x1d8/0x2f8 [ 486.610504][T31030] should_fail+0x555/0x770 [ 486.615055][T31030] __should_failslab+0x11a/0x160 [ 486.620333][T31030] ? __kernfs_new_node+0x97/0x6b0 [ 486.625389][T31030] should_failslab+0x9/0x20 [ 486.629879][T31030] kmem_cache_alloc+0x56/0x2e0 [ 486.634632][T31030] __kernfs_new_node+0x97/0x6b0 [ 486.639464][T31030] ? __kasan_check_write+0x14/0x20 [ 486.644562][T31030] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 486.650191][T31030] ? mutex_unlock+0xd/0x10 [ 486.654588][T31030] ? kernfs_activate+0x213/0x230 [ 486.659507][T31030] kernfs_new_node+0x97/0x180 [ 486.664274][T31030] __kernfs_create_file+0x4a/0x2f0 [ 486.669371][T31030] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 486.674727][T31030] internal_create_group+0x4be/0xd90 [ 486.679996][T31030] sysfs_create_group+0x1f/0x30 [ 486.684830][T31030] loop_set_fd+0xcb2/0x1180 [ 486.689321][T31030] lo_ioctl+0xd5/0x2200 [ 486.693459][T31030] ? __kasan_slab_free+0x12a/0x1e0 [ 486.698549][T31030] ? kasan_slab_free+0xe/0x10 [ 486.703332][T31030] ? kfree+0x115/0x200 [ 486.707394][T31030] ? tomoyo_path_number_perm+0x4e1/0x640 [ 486.713011][T31030] ? tomoyo_file_ioctl+0x23/0x30 [ 486.717927][T31030] ? security_file_ioctl+0x6d/0xd0 [ 486.723030][T31030] ? __x64_sys_ioctl+0xa3/0x120 [ 486.727863][T31030] ? do_syscall_64+0xfe/0x140 [ 486.732522][T31030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.738583][T31030] ? debug_check_no_obj_freed+0x505/0x5b0 [ 486.744283][T31030] ? trace_lock_release+0x135/0x1a0 [ 486.749579][T31030] ? debug_check_no_obj_freed+0x505/0x5b0 [ 486.755290][T31030] ? rcu_lock_release+0x9/0x30 [ 486.760036][T31030] ? trace_lock_release+0x135/0x1a0 [ 486.765212][T31030] ? rcu_lock_release+0x9/0x30 [ 486.769964][T31030] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 486.775585][T31030] ? lo_release+0x1f0/0x1f0 [ 486.780162][T31030] blkdev_ioctl+0x807/0x2990 [ 486.784733][T31030] ? tomoyo_path_number_perm+0x53e/0x640 [ 486.790355][T31030] block_ioctl+0xbd/0x100 [ 486.794665][T31030] ? blkdev_iopoll+0x100/0x100 [ 486.799455][T31030] do_vfs_ioctl+0x744/0x1730 [ 486.804027][T31030] ? __fget+0x4a1/0x510 [ 486.808171][T31030] ? tomoyo_file_ioctl+0x23/0x30 [ 486.813090][T31030] ? security_file_ioctl+0xa1/0xd0 [ 486.818181][T31030] __x64_sys_ioctl+0xe3/0x120 [ 486.822842][T31030] do_syscall_64+0xfe/0x140 [ 486.827330][T31030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.833205][T31030] RIP: 0033:0x4596e7 [ 486.837085][T31030] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.856719][T31030] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:38:40 executing program 2: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000100)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x3e}, [@ldst={0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 486.865160][T31030] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 486.873117][T31030] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 486.881142][T31030] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 486.889097][T31030] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 486.897105][T31030] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8947, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:40 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:40 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000018912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070d575ae15a399407f919cd375764a69b4a06a73f8c2cd1efec334e3523f99214fe870fa1c1663467c00006b485d1549e278ef6ed3f7bfe65b97dde99e789e3dca77d0028daf41ca48002d2e05000000b756fd2201ebc70cd6dbcf4f260455ca03e661f0e71c568040636f99510ff855572adb5f6d3d1d04487b53a9c0f82d0a913782522f25238d88c4da08c3c2c5a030f41c9db20b50837f3210a3ef1ffba6042c4be399ced826") r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x7f, 0x101000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000400)={r2, 0x1, 0x6, @local}, 0x10) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) r5 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x802) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = fanotify_init(0x0, 0x0) r8 = dup3(r6, r7, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r8, &(0x7f0000000100)="494e99484d4a188f7e486275e9d2b700fa1216bee6d61b3d53eb94d59d3d66fbcb47f466d5b50a57f36c6f0f8570cbfcabdbe12013f9379c3581ce954654d58b9d19d6b021ac7beac0d539", &(0x7f0000000200)=""/69}, 0x18) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r5, 0xc018620c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 487.084975][T31060] binder: 31053:31060 ioctl c018620c 20000000 returned -22 [ 487.149983][T31057] FAULT_INJECTION: forcing a failure. [ 487.149983][T31057] name failslab, interval 1, probability 0, space 0, times 0 [ 487.162937][T31057] CPU: 1 PID: 31057 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 487.171044][T31057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.181210][T31057] Call Trace: [ 487.184493][T31057] dump_stack+0x1d8/0x2f8 [ 487.188815][T31057] should_fail+0x555/0x770 [ 487.193234][T31057] __should_failslab+0x11a/0x160 [ 487.198168][T31057] ? __kernfs_new_node+0x97/0x6b0 [ 487.203185][T31057] should_failslab+0x9/0x20 [ 487.207823][T31057] kmem_cache_alloc+0x56/0x2e0 [ 487.212667][T31057] __kernfs_new_node+0x97/0x6b0 [ 487.217504][T31057] ? __kasan_check_write+0x14/0x20 [ 487.222608][T31057] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 487.228337][T31057] ? mutex_unlock+0xd/0x10 [ 487.232748][T31057] ? kernfs_activate+0x213/0x230 [ 487.237677][T31057] kernfs_new_node+0x97/0x180 [ 487.242488][T31057] __kernfs_create_file+0x4a/0x2f0 [ 487.247596][T31057] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 487.252962][T31057] internal_create_group+0x4be/0xd90 [ 487.258246][T31057] sysfs_create_group+0x1f/0x30 [ 487.263089][T31057] loop_set_fd+0xcb2/0x1180 [ 487.267594][T31057] lo_ioctl+0xd5/0x2200 [ 487.271739][T31057] ? __kasan_slab_free+0x12a/0x1e0 [ 487.276967][T31057] ? kasan_slab_free+0xe/0x10 [ 487.281628][T31057] ? kfree+0x115/0x200 [ 487.285805][T31057] ? tomoyo_path_number_perm+0x4e1/0x640 [ 487.291421][T31057] ? tomoyo_file_ioctl+0x23/0x30 [ 487.296340][T31057] ? security_file_ioctl+0x6d/0xd0 [ 487.301437][T31057] ? __x64_sys_ioctl+0xa3/0x120 [ 487.306275][T31057] ? do_syscall_64+0xfe/0x140 [ 487.310943][T31057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.317003][T31057] ? debug_check_no_obj_freed+0x505/0x5b0 [ 487.322880][T31057] ? trace_lock_release+0x135/0x1a0 [ 487.328067][T31057] ? debug_check_no_obj_freed+0x505/0x5b0 [ 487.333775][T31057] ? rcu_lock_release+0x9/0x30 [ 487.338532][T31057] ? trace_lock_release+0x135/0x1a0 [ 487.343724][T31057] ? rcu_lock_release+0x9/0x30 [ 487.348584][T31057] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 487.354333][T31057] ? lo_release+0x1f0/0x1f0 [ 487.358944][T31057] blkdev_ioctl+0x807/0x2990 [ 487.363677][T31057] ? tomoyo_path_number_perm+0x53e/0x640 [ 487.369304][T31057] block_ioctl+0xbd/0x100 [ 487.373749][T31057] ? blkdev_iopoll+0x100/0x100 [ 487.378504][T31057] do_vfs_ioctl+0x744/0x1730 [ 487.383197][T31057] ? __fget+0x4a1/0x510 [ 487.387343][T31057] ? tomoyo_file_ioctl+0x23/0x30 [ 487.392263][T31057] ? security_file_ioctl+0xa1/0xd0 00:38:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x48}}, 0x1c) 00:38:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8948, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:41 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000040)={0x2, 0x0, [{0x2, 0xff, 0x2, 0x71, 0x800, 0x30f00d48, 0x7fffffff}, {0x6, 0x40, 0x2, 0x465, 0x1ff, 0xffffffffffff8001, 0xe0f}]}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x100000, 0x0, 0x0) 00:38:41 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 487.397361][T31057] __x64_sys_ioctl+0xe3/0x120 [ 487.402025][T31057] do_syscall_64+0xfe/0x140 [ 487.406624][T31057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.412510][T31057] RIP: 0033:0x4596e7 [ 487.416408][T31057] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.436159][T31057] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 487.444558][T31057] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 487.452677][T31057] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 487.460655][T31057] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 487.468611][T31057] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 487.476567][T31057] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:41 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8949, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 487.679213][T31090] FAULT_INJECTION: forcing a failure. [ 487.679213][T31090] name failslab, interval 1, probability 0, space 0, times 0 [ 487.692611][T31090] CPU: 1 PID: 31090 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 487.700604][T31090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.710773][T31090] Call Trace: [ 487.714076][T31090] dump_stack+0x1d8/0x2f8 [ 487.718409][T31090] should_fail+0x555/0x770 [ 487.722819][T31090] __should_failslab+0x11a/0x160 [ 487.727926][T31090] ? __kernfs_new_node+0x97/0x6b0 [ 487.732954][T31090] should_failslab+0x9/0x20 [ 487.737444][T31090] kmem_cache_alloc+0x56/0x2e0 [ 487.742319][T31090] __kernfs_new_node+0x97/0x6b0 [ 487.747156][T31090] ? __kasan_check_write+0x14/0x20 [ 487.752436][T31090] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 487.758054][T31090] ? mutex_unlock+0xd/0x10 [ 487.762581][T31090] ? kernfs_activate+0x213/0x230 [ 487.767511][T31090] kernfs_new_node+0x97/0x180 [ 487.772323][T31090] __kernfs_create_file+0x4a/0x2f0 [ 487.777424][T31090] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 487.782889][T31090] internal_create_group+0x4be/0xd90 [ 487.788310][T31090] sysfs_create_group+0x1f/0x30 [ 487.793157][T31090] loop_set_fd+0xcb2/0x1180 [ 487.797808][T31090] lo_ioctl+0xd5/0x2200 [ 487.801949][T31090] ? __kasan_slab_free+0x12a/0x1e0 [ 487.807163][T31090] ? kasan_slab_free+0xe/0x10 [ 487.811823][T31090] ? kfree+0x115/0x200 [ 487.816018][T31090] ? tomoyo_path_number_perm+0x4e1/0x640 [ 487.821635][T31090] ? tomoyo_file_ioctl+0x23/0x30 [ 487.826645][T31090] ? security_file_ioctl+0x6d/0xd0 [ 487.831748][T31090] ? __x64_sys_ioctl+0xa3/0x120 [ 487.836582][T31090] ? do_syscall_64+0xfe/0x140 [ 487.841256][T31090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.847576][T31090] ? debug_check_no_obj_freed+0x505/0x5b0 [ 487.853291][T31090] ? trace_lock_release+0x135/0x1a0 [ 487.858562][T31090] ? debug_check_no_obj_freed+0x505/0x5b0 [ 487.864666][T31090] ? rcu_lock_release+0x9/0x30 [ 487.869431][T31090] ? trace_lock_release+0x135/0x1a0 [ 487.874724][T31090] ? rcu_lock_release+0x9/0x30 [ 487.879478][T31090] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 487.885290][T31090] ? lo_release+0x1f0/0x1f0 [ 487.889865][T31090] blkdev_ioctl+0x807/0x2990 [ 487.894445][T31090] ? tomoyo_path_number_perm+0x53e/0x640 [ 487.900070][T31090] block_ioctl+0xbd/0x100 [ 487.904383][T31090] ? blkdev_iopoll+0x100/0x100 [ 487.909141][T31090] do_vfs_ioctl+0x744/0x1730 [ 487.913814][T31090] ? __fget+0x4a1/0x510 [ 487.917961][T31090] ? tomoyo_file_ioctl+0x23/0x30 [ 487.923016][T31090] ? security_file_ioctl+0xa1/0xd0 [ 487.928124][T31090] __x64_sys_ioctl+0xe3/0x120 [ 487.932902][T31090] do_syscall_64+0xfe/0x140 [ 487.937400][T31090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.943380][T31090] RIP: 0033:0x4596e7 [ 487.947262][T31090] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.966996][T31090] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:38:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:41 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 487.975396][T31090] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 487.983508][T31090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 487.991473][T31090] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 487.999447][T31090] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 488.007420][T31090] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x894a, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:41 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:41 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x10000) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x7, 0x4) sendto$netrom(r0, &(0x7f0000000080)="907f4afea668b8bef336a2a0da0710ec5c57efad9ac72f60404228e589a20f5333d861ff3f95db01506fac74ad5a2872adf4c3d08e5a7ae5a5bcb706bb4d7e51e0475c82d08a486ed23626741e070435845f0bc06f40af101b243054c1cc510329383a11c2654f217cd839a4761611953d4e09fdaf4c3202bc3f9073f80f3eca0e67626d023de75ecd5a17e0901a1c99c371cb738fef1c3a12fa3e3584a1b8400b0836423be296e279a99cfb5eb4d7161112fd25886299ea71cbe0f894ddb8eec5", 0xc1, 0x4000000, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000280)={0xb83796c92aa0d140, 0x0, 0x0, 0x1, {0x0, 0x2b0d, 0xa, 0x100}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x10, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x24008084) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000400)) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000440)={0x5, 0x0, 0x5, {0x3, 0x2, 0xa399, 0x2ed0}}) r4 = socket$l2tp(0x18, 0x1, 0x1) write$FUSE_BMAP(r0, &(0x7f0000000480)={0x18, 0x0, 0x2, {0x1}}, 0x18) inotify_add_watch(r0, &(0x7f00000004c0)='./file0\x00', 0x4000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3) bind$rds(r0, &(0x7f0000000500)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$cec(&(0x7f0000000540)='/dev/cec#\x00', 0x0, 0x2) setgid(r2) ioctl$SIOCX25GSUBSCRIP(r5, 0x89e0, &(0x7f0000000580)={'rose0\x00', 0x0, 0x263e}) readahead(r0, 0xffffffffffffff7f, 0x0) ioctl$VT_ACTIVATE(r5, 0x5606, 0x6) fchownat(r5, &(0x7f0000000680)='./file0\x00', r1, r2, 0x1c00) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000700)={0x0, 0x7, 0xffffffffffff2fd4, &(0x7f00000006c0)=0x100000000}) getsockname$unix(r0, &(0x7f0000000740), &(0x7f00000007c0)=0x6e) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000800)={{0x0, @name="fbd644a27d6364c361f326c9bdcc8833bd7911b1014ad3871a62b9b66fd6be12"}, "c4c7b9bb4bb764f410de91f695e74bf88f45b644e35250f1eba6d93d970b628c", 0x1}) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000900)={0x0, 0x3, 0x51, 0x100000000}) write$vnet(r5, &(0x7f0000000b40)={0x1, {&(0x7f0000000940)=""/250, 0xfa, &(0x7f0000000a40)=""/230, 0x1}}, 0x68) eventfd2(0x6, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000bc0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x3) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000c00)={0x3, 0x8, 0xffffffffffff7fff, 'queue0\x00', 0xfff}) [ 488.213114][T31117] FAULT_INJECTION: forcing a failure. [ 488.213114][T31117] name failslab, interval 1, probability 0, space 0, times 0 [ 488.226918][T31117] CPU: 1 PID: 31117 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 488.234929][T31117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.244983][T31117] Call Trace: [ 488.248276][T31117] dump_stack+0x1d8/0x2f8 [ 488.252726][T31117] should_fail+0x555/0x770 [ 488.257159][T31117] __should_failslab+0x11a/0x160 [ 488.262104][T31117] ? __kernfs_new_node+0x97/0x6b0 [ 488.267273][T31117] should_failslab+0x9/0x20 [ 488.272030][T31117] kmem_cache_alloc+0x56/0x2e0 [ 488.276781][T31117] __kernfs_new_node+0x97/0x6b0 [ 488.281615][T31117] ? __kasan_check_write+0x14/0x20 [ 488.286830][T31117] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 488.292451][T31117] ? mutex_unlock+0xd/0x10 [ 488.296850][T31117] ? kernfs_activate+0x213/0x230 [ 488.301928][T31117] kernfs_new_node+0x97/0x180 [ 488.306718][T31117] __kernfs_create_file+0x4a/0x2f0 [ 488.311820][T31117] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 488.317341][T31117] internal_create_group+0x4be/0xd90 [ 488.322618][T31117] sysfs_create_group+0x1f/0x30 [ 488.327457][T31117] loop_set_fd+0xcb2/0x1180 [ 488.331955][T31117] lo_ioctl+0xd5/0x2200 [ 488.336181][T31117] ? __kasan_slab_free+0x12a/0x1e0 [ 488.341287][T31117] ? kasan_slab_free+0xe/0x10 [ 488.345949][T31117] ? kfree+0x115/0x200 [ 488.350002][T31117] ? tomoyo_path_number_perm+0x4e1/0x640 [ 488.355618][T31117] ? tomoyo_file_ioctl+0x23/0x30 [ 488.360652][T31117] ? security_file_ioctl+0x6d/0xd0 [ 488.365747][T31117] ? __x64_sys_ioctl+0xa3/0x120 [ 488.370582][T31117] ? do_syscall_64+0xfe/0x140 [ 488.375362][T31117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.381416][T31117] ? debug_check_no_obj_freed+0x505/0x5b0 [ 488.387180][T31117] ? trace_lock_release+0x135/0x1a0 [ 488.392365][T31117] ? debug_check_no_obj_freed+0x505/0x5b0 [ 488.398083][T31117] ? rcu_lock_release+0x9/0x30 [ 488.402966][T31117] ? trace_lock_release+0x135/0x1a0 [ 488.408155][T31117] ? rcu_lock_release+0x9/0x30 [ 488.412912][T31117] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 488.418633][T31117] ? lo_release+0x1f0/0x1f0 [ 488.423121][T31117] blkdev_ioctl+0x807/0x2990 [ 488.427704][T31117] ? tomoyo_path_number_perm+0x53e/0x640 [ 488.433347][T31117] block_ioctl+0xbd/0x100 [ 488.437666][T31117] ? blkdev_iopoll+0x100/0x100 [ 488.442429][T31117] do_vfs_ioctl+0x744/0x1730 [ 488.447000][T31117] ? __fget+0x4a1/0x510 [ 488.451244][T31117] ? tomoyo_file_ioctl+0x23/0x30 [ 488.456173][T31117] ? security_file_ioctl+0xa1/0xd0 [ 488.461271][T31117] __x64_sys_ioctl+0xe3/0x120 [ 488.465930][T31117] do_syscall_64+0xfe/0x140 [ 488.470419][T31117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.476296][T31117] RIP: 0033:0x4596e7 [ 488.480172][T31117] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.499760][T31117] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 488.508163][T31117] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 488.516130][T31117] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 488.524085][T31117] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 488.532153][T31117] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 488.540108][T31117] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4c}}, 0x1c) 00:38:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x894c, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:42 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:42 executing program 2: r0 = msgget(0x1, 0x80) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/139) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x4, 0x2, 0x0, 0x3, 0xd82e, 0x7}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r2, &(0x7f0000003d40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=[@assoc={0x18, 0x29, 0x3}], 0x18}], 0x3ad, 0x0) 00:38:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8970, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:42 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140), &(0x7f0000000200)=0x8) 00:38:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8971, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:42 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 488.826900][T31162] FAULT_INJECTION: forcing a failure. [ 488.826900][T31162] name failslab, interval 1, probability 0, space 0, times 0 [ 488.839919][T31162] CPU: 0 PID: 31162 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 488.848059][T31162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.858116][T31162] Call Trace: [ 488.861562][T31162] dump_stack+0x1d8/0x2f8 [ 488.865890][T31162] should_fail+0x555/0x770 [ 488.870299][T31162] __should_failslab+0x11a/0x160 [ 488.875225][T31162] ? kzalloc+0x26/0x40 [ 488.879280][T31162] should_failslab+0x9/0x20 [ 488.883767][T31162] __kmalloc+0x7a/0x340 [ 488.888046][T31162] kzalloc+0x26/0x40 [ 488.892041][T31162] kobject_get_path+0xa7/0x1d0 [ 488.896795][T31162] kobject_uevent_env+0x2f2/0x1260 [ 488.902022][T31162] kobject_uevent+0x1f/0x30 [ 488.906661][T31162] loop_set_fd+0xd21/0x1180 [ 488.911246][T31162] lo_ioctl+0xd5/0x2200 [ 488.915388][T31162] ? __kasan_slab_free+0x12a/0x1e0 [ 488.920480][T31162] ? kasan_slab_free+0xe/0x10 [ 488.925139][T31162] ? kfree+0x115/0x200 [ 488.929333][T31162] ? tomoyo_path_number_perm+0x4e1/0x640 [ 488.934950][T31162] ? tomoyo_file_ioctl+0x23/0x30 [ 488.939870][T31162] ? security_file_ioctl+0x6d/0xd0 [ 488.944963][T31162] ? __x64_sys_ioctl+0xa3/0x120 [ 488.949932][T31162] ? do_syscall_64+0xfe/0x140 [ 488.954607][T31162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.960659][T31162] ? debug_check_no_obj_freed+0x505/0x5b0 [ 488.966503][T31162] ? trace_lock_release+0x135/0x1a0 [ 488.971684][T31162] ? debug_check_no_obj_freed+0x505/0x5b0 [ 488.977392][T31162] ? rcu_lock_release+0x9/0x30 [ 488.982141][T31162] ? trace_lock_release+0x135/0x1a0 [ 488.987400][T31162] ? rcu_lock_release+0x9/0x30 [ 488.992158][T31162] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 488.997796][T31162] ? lo_release+0x1f0/0x1f0 [ 489.002436][T31162] blkdev_ioctl+0x807/0x2990 [ 489.007074][T31162] ? tomoyo_path_number_perm+0x53e/0x640 [ 489.012712][T31162] block_ioctl+0xbd/0x100 [ 489.017027][T31162] ? blkdev_iopoll+0x100/0x100 [ 489.021777][T31162] do_vfs_ioctl+0x744/0x1730 [ 489.026415][T31162] ? __fget+0x4a1/0x510 [ 489.030562][T31162] ? tomoyo_file_ioctl+0x23/0x30 [ 489.035486][T31162] ? security_file_ioctl+0xa1/0xd0 [ 489.040581][T31162] __x64_sys_ioctl+0xe3/0x120 [ 489.045248][T31162] do_syscall_64+0xfe/0x140 [ 489.049811][T31162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.055770][T31162] RIP: 0033:0x4596e7 [ 489.059651][T31162] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.079353][T31162] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 489.087756][T31162] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 489.095721][T31162] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 489.103677][T31162] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 489.111636][T31162] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 489.119606][T31162] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8978, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:42 executing program 2: r0 = creat(&(0x7f0000001200)='./file0\x00', 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000001500)) r1 = fanotify_init(0x0, 0x1) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) readv(r1, &(0x7f0000001240)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) 00:38:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x68}}, 0x1c) 00:38:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:43 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:43 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8980, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:43 executing program 2: r0 = creat(&(0x7f0000001200)='./file0\x00', 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000001500)) r1 = fanotify_init(0x0, 0x1) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) readv(r1, &(0x7f0000001240)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) 00:38:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8981, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 489.632554][T31215] FAULT_INJECTION: forcing a failure. [ 489.632554][T31215] name failslab, interval 1, probability 0, space 0, times 0 [ 489.646972][T31215] CPU: 0 PID: 31215 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 489.654969][T31215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.665411][T31215] Call Trace: [ 489.668709][T31215] dump_stack+0x1d8/0x2f8 [ 489.673180][T31215] should_fail+0x555/0x770 [ 489.677611][T31215] __should_failslab+0x11a/0x160 [ 489.682547][T31215] ? __kernfs_new_node+0x97/0x6b0 [ 489.687568][T31215] should_failslab+0x9/0x20 [ 489.692066][T31215] kmem_cache_alloc+0x56/0x2e0 [ 489.696830][T31215] __kernfs_new_node+0x97/0x6b0 [ 489.701807][T31215] ? __kasan_check_write+0x14/0x20 [ 489.706913][T31215] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 489.712539][T31215] ? mutex_unlock+0xd/0x10 [ 489.716956][T31215] ? kernfs_activate+0x213/0x230 [ 489.721884][T31215] kernfs_new_node+0x97/0x180 [ 489.726657][T31215] __kernfs_create_file+0x4a/0x2f0 [ 489.731762][T31215] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 489.737126][T31215] internal_create_group+0x4be/0xd90 [ 489.742584][T31215] sysfs_create_group+0x1f/0x30 [ 489.747567][T31215] loop_set_fd+0xcb2/0x1180 [ 489.752180][T31215] lo_ioctl+0xd5/0x2200 [ 489.756485][T31215] ? __kasan_slab_free+0x12a/0x1e0 [ 489.761593][T31215] ? kasan_slab_free+0xe/0x10 [ 489.766270][T31215] ? kfree+0x115/0x200 [ 489.770333][T31215] ? tomoyo_path_number_perm+0x4e1/0x640 [ 489.775970][T31215] ? tomoyo_file_ioctl+0x23/0x30 [ 489.781111][T31215] ? security_file_ioctl+0x6d/0xd0 [ 489.786335][T31215] ? __x64_sys_ioctl+0xa3/0x120 [ 489.791185][T31215] ? do_syscall_64+0xfe/0x140 [ 489.795858][T31215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.801922][T31215] ? debug_check_no_obj_freed+0x505/0x5b0 [ 489.807638][T31215] ? trace_lock_release+0x135/0x1a0 [ 489.812833][T31215] ? debug_check_no_obj_freed+0x505/0x5b0 [ 489.818553][T31215] ? rcu_lock_release+0x9/0x30 [ 489.823321][T31215] ? trace_lock_release+0x135/0x1a0 [ 489.828669][T31215] ? rcu_lock_release+0x9/0x30 [ 489.834349][T31215] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 489.839986][T31215] ? lo_release+0x1f0/0x1f0 [ 489.844490][T31215] blkdev_ioctl+0x807/0x2990 [ 489.849190][T31215] ? tomoyo_path_number_perm+0x53e/0x640 [ 489.855045][T31215] block_ioctl+0xbd/0x100 [ 489.859373][T31215] ? blkdev_iopoll+0x100/0x100 [ 489.864122][T31215] do_vfs_ioctl+0x744/0x1730 [ 489.868818][T31215] ? __fget+0x4a1/0x510 [ 489.872963][T31215] ? tomoyo_file_ioctl+0x23/0x30 [ 489.877894][T31215] ? security_file_ioctl+0xa1/0xd0 [ 489.882998][T31215] __x64_sys_ioctl+0xe3/0x120 [ 489.887792][T31215] do_syscall_64+0xfe/0x140 [ 489.892290][T31215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.898171][T31215] RIP: 0033:0x4596e7 [ 489.902057][T31215] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.921888][T31215] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 489.930413][T31215] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 489.938384][T31215] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 489.946535][T31215] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 489.954516][T31215] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 489.962488][T31215] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:43 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1000000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8982, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x2cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) 00:38:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8983, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x6c}}, 0x1c) 00:38:44 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:44 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:44 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x200, 0x1e5) r3 = openat$cgroup_ro(r2, &(0x7f0000000480)='Cpuacct.@tE\xae\x00', 0x275a, 0x0) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000002) read$eventfd(r4, &(0x7f00000003c0), 0x8) poll(&(0x7f0000000300)=[{r3, 0x20}, {r3, 0x400}, {r3, 0x4000}, {r3, 0x4000}, {r1, 0x100}, {r1, 0x5000}, {r3, 0x200}, {r0, 0x100}], 0x8, 0x9) fallocate(r1, 0x800000000000002, 0x6, 0xffffffff) r5 = creat(&(0x7f0000001c00)='./bus\x00', 0xa1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) accept4(r5, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f00000002c0)=0x80, 0x80000) r7 = dup(r6) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getgid() sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000640)={{{@in=@rand_addr=0x8001, @in=@broadcast, 0x4e22, 0x8, 0x0, 0x7f, 0x2, 0x0, 0x80, 0x32}, {0x0, 0x1, 0x100, 0x800, 0x8, 0xffff, 0x8, 0xffffffffffffff7f}, {0x0, 0x0, 0x1, 0x2}, 0x5, 0x6e6bb5, 0x2, 0x1, 0x3, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0xc}, 0x0, 0xff}, 0x2, @in=@multicast2, 0x0, 0x1, 0x0, 0x1, 0x3, 0x2}}, 0xe8) ftruncate(r5, 0x800fe) sendfile(r7, r8, 0x0, 0x8000fffffffe) sendmsg$nl_netfilter(r8, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f0000000740)={0x1104, 0x10, 0x8, 0x600, 0x70bd2a, 0x0, {0x3, 0x0, 0x2}, [@typed={0x8, 0x10000, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="2e02a63dba133160d96b894a4eae84fa17fa8c7afd1febeb4404db1729062da5f83d54c9a9ca02407b867aa8c72261c89eb8a92fbd559fb8ae1aa2e142e2614866cc3928590d40a0ce8536aa1508890d26", @nested={0x1094, 0x19, [@generic, @typed={0x18, 0x6a, @binary="805f959abe8b298110177c91e4fa3a2dcfda"}, @generic="83aa392c68dcbc7f71015a6c0c14c921ad39e4a7d43c26334fa5482fb527569c856b02084b41418e86a13d6180709114e03e74fcfaaa6e323bb9b18310f322d00a0623dae4f96310b2004caaa269922a9731da3078eac3afdc5e1b237ac814fe6bdd6f0658f7d479b7c8a9f5", @generic="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", @typed={0xc, 0xa, @u64=0x3b43}]}]}, 0x1104}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 00:38:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 490.907436][T31270] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 490.939493][T31275] FAULT_INJECTION: forcing a failure. [ 490.939493][T31275] name failslab, interval 1, probability 0, space 0, times 0 [ 490.961314][T31275] CPU: 1 PID: 31275 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 490.969320][T31275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.979385][T31275] Call Trace: [ 490.982676][T31275] dump_stack+0x1d8/0x2f8 [ 490.987011][T31275] should_fail+0x555/0x770 [ 490.991429][T31275] __should_failslab+0x11a/0x160 [ 490.996363][T31275] ? skb_clone+0x1cc/0x380 [ 491.000775][T31275] should_failslab+0x9/0x20 [ 491.005273][T31275] kmem_cache_alloc+0x56/0x2e0 [ 491.010037][T31275] skb_clone+0x1cc/0x380 [ 491.014273][T31275] netlink_broadcast_filtered+0x619/0x1090 [ 491.020082][T31275] netlink_broadcast+0x3a/0x50 [ 491.024840][T31275] kobject_uevent_env+0xcf0/0x1260 [ 491.029963][T31275] kobject_uevent+0x1f/0x30 [ 491.034460][T31275] loop_set_fd+0xd21/0x1180 [ 491.038965][T31275] lo_ioctl+0xd5/0x2200 [ 491.043110][T31275] ? __kasan_slab_free+0x12a/0x1e0 [ 491.048214][T31275] ? kasan_slab_free+0xe/0x10 [ 491.052878][T31275] ? kfree+0x115/0x200 [ 491.056937][T31275] ? tomoyo_path_number_perm+0x4e1/0x640 [ 491.062557][T31275] ? tomoyo_file_ioctl+0x23/0x30 [ 491.067487][T31275] ? security_file_ioctl+0x6d/0xd0 [ 491.072590][T31275] ? __x64_sys_ioctl+0xa3/0x120 [ 491.077440][T31275] ? do_syscall_64+0xfe/0x140 [ 491.082109][T31275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.088170][T31275] ? debug_check_no_obj_freed+0x505/0x5b0 [ 491.093880][T31275] ? trace_lock_release+0x135/0x1a0 [ 491.099066][T31275] ? debug_check_no_obj_freed+0x505/0x5b0 [ 491.104782][T31275] ? rcu_lock_release+0x9/0x30 [ 491.109545][T31275] ? trace_lock_release+0x135/0x1a0 [ 491.114735][T31275] ? rcu_lock_release+0x9/0x30 [ 491.119494][T31275] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 491.125131][T31275] ? lo_release+0x1f0/0x1f0 [ 491.129625][T31275] blkdev_ioctl+0x807/0x2990 [ 491.134211][T31275] ? tomoyo_path_number_perm+0x53e/0x640 [ 491.139847][T31275] block_ioctl+0xbd/0x100 [ 491.144170][T31275] ? blkdev_iopoll+0x100/0x100 [ 491.148926][T31275] do_vfs_ioctl+0x744/0x1730 [ 491.153514][T31275] ? __fget+0x4a1/0x510 00:38:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000152b1003b3609e694e9b852ae60000000000000000000000000000000000001f00000006000000800600006001000050020000e8040000b003000000000000d8050000d8050000d8"], 0x1) [ 491.157678][T31275] ? tomoyo_file_ioctl+0x23/0x30 [ 491.162608][T31275] ? security_file_ioctl+0xa1/0xd0 [ 491.167724][T31275] __x64_sys_ioctl+0xe3/0x120 [ 491.172396][T31275] do_syscall_64+0xfe/0x140 [ 491.176893][T31275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.182777][T31275] RIP: 0033:0x4596e7 [ 491.186662][T31275] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8992, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 491.206241][T31275] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 491.214633][T31275] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 491.222597][T31275] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 491.230544][T31275] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 491.238521][T31275] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 491.246474][T31275] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:44 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8993, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:45 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 491.470788][T31303] FAULT_INJECTION: forcing a failure. [ 491.470788][T31303] name failslab, interval 1, probability 0, space 0, times 0 [ 491.499413][T31303] CPU: 1 PID: 31303 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 491.507427][T31303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.517480][T31303] Call Trace: [ 491.520770][T31303] dump_stack+0x1d8/0x2f8 [ 491.525104][T31303] should_fail+0x555/0x770 [ 491.529518][T31303] __should_failslab+0x11a/0x160 [ 491.534450][T31303] ? kzalloc+0x26/0x40 [ 491.538510][T31303] should_failslab+0x9/0x20 [ 491.543007][T31303] __kmalloc+0x7a/0x340 [ 491.547157][T31303] kzalloc+0x26/0x40 [ 491.551046][T31303] kobject_get_path+0xa7/0x1d0 [ 491.555805][T31303] kobject_uevent_env+0x2f2/0x1260 [ 491.560910][T31303] kobject_uevent+0x1f/0x30 [ 491.565406][T31303] loop_set_fd+0xd21/0x1180 [ 491.569907][T31303] lo_ioctl+0xd5/0x2200 [ 491.574053][T31303] ? __kasan_slab_free+0x12a/0x1e0 [ 491.579151][T31303] ? kasan_slab_free+0xe/0x10 [ 491.583814][T31303] ? kfree+0x115/0x200 [ 491.587874][T31303] ? tomoyo_path_number_perm+0x4e1/0x640 [ 491.593491][T31303] ? tomoyo_file_ioctl+0x23/0x30 [ 491.598415][T31303] ? security_file_ioctl+0x6d/0xd0 [ 491.603513][T31303] ? __x64_sys_ioctl+0xa3/0x120 [ 491.608354][T31303] ? do_syscall_64+0xfe/0x140 [ 491.613024][T31303] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.619084][T31303] ? debug_check_no_obj_freed+0x505/0x5b0 [ 491.624795][T31303] ? trace_lock_release+0x135/0x1a0 [ 491.629980][T31303] ? debug_check_no_obj_freed+0x505/0x5b0 [ 491.635699][T31303] ? rcu_lock_release+0x9/0x30 [ 491.640475][T31303] ? trace_lock_release+0x135/0x1a0 [ 491.645662][T31303] ? rcu_lock_release+0x9/0x30 [ 491.650414][T31303] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 491.656039][T31303] ? lo_release+0x1f0/0x1f0 [ 491.660531][T31303] blkdev_ioctl+0x807/0x2990 [ 491.666046][T31303] ? tomoyo_path_number_perm+0x53e/0x640 [ 491.671684][T31303] block_ioctl+0xbd/0x100 [ 491.676002][T31303] ? blkdev_iopoll+0x100/0x100 [ 491.680753][T31303] do_vfs_ioctl+0x744/0x1730 [ 491.685330][T31303] ? __fget+0x4a1/0x510 [ 491.689476][T31303] ? tomoyo_file_ioctl+0x23/0x30 [ 491.694400][T31303] ? security_file_ioctl+0xa1/0xd0 [ 491.699502][T31303] __x64_sys_ioctl+0xe3/0x120 [ 491.704171][T31303] do_syscall_64+0xfe/0x140 [ 491.708670][T31303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.714550][T31303] RIP: 0033:0x4596e7 [ 491.718520][T31303] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.738113][T31303] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 491.746515][T31303] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 491.754473][T31303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 491.762432][T31303] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 491.770392][T31303] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 491.778354][T31303] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x74}}, 0x1c) 00:38:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r1, 0x0, 0x0) 00:38:45 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1300000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8994, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:45 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}) 00:38:45 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:45 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 491.941901][T31323] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 491.974787][T31330] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 491.985917][T31329] FAULT_INJECTION: forcing a failure. 00:38:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89a0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 491.985917][T31329] name failslab, interval 1, probability 0, space 0, times 0 [ 492.016871][T31329] CPU: 1 PID: 31329 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 492.024879][T31329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.034936][T31329] Call Trace: [ 492.038224][T31329] dump_stack+0x1d8/0x2f8 [ 492.042547][T31329] should_fail+0x555/0x770 [ 492.046959][T31329] __should_failslab+0x11a/0x160 [ 492.051889][T31329] should_failslab+0x9/0x20 [ 492.056469][T31329] kmem_cache_alloc_node+0x65/0x280 [ 492.061656][T31329] ? __alloc_skb+0x9f/0x500 [ 492.066150][T31329] __alloc_skb+0x9f/0x500 [ 492.070481][T31329] alloc_uevent_skb+0x7f/0x230 [ 492.075236][T31329] kobject_uevent_env+0xcbb/0x1260 [ 492.080342][T31329] kobject_uevent+0x1f/0x30 [ 492.084839][T31329] loop_set_fd+0xd21/0x1180 [ 492.089339][T31329] lo_ioctl+0xd5/0x2200 [ 492.093481][T31329] ? __kasan_slab_free+0x12a/0x1e0 [ 492.098663][T31329] ? kasan_slab_free+0xe/0x10 [ 492.103327][T31329] ? kfree+0x115/0x200 [ 492.107398][T31329] ? tomoyo_path_number_perm+0x4e1/0x640 [ 492.113017][T31329] ? tomoyo_file_ioctl+0x23/0x30 [ 492.117947][T31329] ? security_file_ioctl+0x6d/0xd0 [ 492.123048][T31329] ? __x64_sys_ioctl+0xa3/0x120 [ 492.127891][T31329] ? do_syscall_64+0xfe/0x140 [ 492.132555][T31329] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.138613][T31329] ? debug_check_no_obj_freed+0x505/0x5b0 [ 492.144321][T31329] ? trace_lock_release+0x135/0x1a0 [ 492.149511][T31329] ? debug_check_no_obj_freed+0x505/0x5b0 [ 492.155222][T31329] ? rcu_lock_release+0x9/0x30 [ 492.159977][T31329] ? trace_lock_release+0x135/0x1a0 [ 492.165163][T31329] ? rcu_lock_release+0x9/0x30 [ 492.169917][T31329] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 492.175541][T31329] ? lo_release+0x1f0/0x1f0 [ 492.180036][T31329] blkdev_ioctl+0x807/0x2990 [ 492.184620][T31329] ? tomoyo_path_number_perm+0x53e/0x640 [ 492.190253][T31329] block_ioctl+0xbd/0x100 [ 492.194574][T31329] ? blkdev_iopoll+0x100/0x100 [ 492.199330][T31329] do_vfs_ioctl+0x744/0x1730 [ 492.203909][T31329] ? __fget+0x4a1/0x510 [ 492.208073][T31329] ? tomoyo_file_ioctl+0x23/0x30 [ 492.213001][T31329] ? security_file_ioctl+0xa1/0xd0 [ 492.218101][T31329] __x64_sys_ioctl+0xe3/0x120 [ 492.222767][T31329] do_syscall_64+0xfe/0x140 [ 492.227265][T31329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.233145][T31329] RIP: 0033:0x4596e7 [ 492.237037][T31329] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.256640][T31329] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 492.265041][T31329] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 492.273002][T31329] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 492.280960][T31329] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 00:38:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89a1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 492.288922][T31329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 492.296879][T31329] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x7a}}, 0x1c) 00:38:46 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:46 executing program 2: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) ioctl$CAPI_GET_PROFILE(0xffffffffffffffff, 0xc0404309, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) 00:38:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:46 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 492.805589][T31366] FAULT_INJECTION: forcing a failure. [ 492.805589][T31366] name failslab, interval 1, probability 0, space 0, times 0 [ 492.836998][T31366] CPU: 0 PID: 31366 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 492.845023][T31366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.855081][T31366] Call Trace: [ 492.858383][T31366] dump_stack+0x1d8/0x2f8 [ 492.862708][T31366] should_fail+0x555/0x770 [ 492.867120][T31366] __should_failslab+0x11a/0x160 [ 492.872052][T31366] should_failslab+0x9/0x20 [ 492.876550][T31366] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 492.882259][T31366] ? __kmalloc_node_track_caller+0x3c/0x60 [ 492.888060][T31366] __kmalloc_node_track_caller+0x3c/0x60 [ 492.893684][T31366] ? alloc_uevent_skb+0x7f/0x230 [ 492.898612][T31366] __alloc_skb+0xe8/0x500 [ 492.902938][T31366] alloc_uevent_skb+0x7f/0x230 [ 492.907695][T31366] kobject_uevent_env+0xcbb/0x1260 [ 492.912805][T31366] kobject_uevent+0x1f/0x30 [ 492.917297][T31366] loop_set_fd+0xd21/0x1180 [ 492.921798][T31366] lo_ioctl+0xd5/0x2200 [ 492.925944][T31366] ? __kasan_slab_free+0x12a/0x1e0 [ 492.931042][T31366] ? kasan_slab_free+0xe/0x10 [ 492.935706][T31366] ? kfree+0x115/0x200 [ 492.939767][T31366] ? tomoyo_path_number_perm+0x4e1/0x640 [ 492.945392][T31366] ? tomoyo_file_ioctl+0x23/0x30 [ 492.950316][T31366] ? security_file_ioctl+0x6d/0xd0 [ 492.955417][T31366] ? __x64_sys_ioctl+0xa3/0x120 [ 492.960254][T31366] ? do_syscall_64+0xfe/0x140 [ 492.964918][T31366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.970991][T31366] ? debug_check_no_obj_freed+0x505/0x5b0 [ 492.976703][T31366] ? trace_lock_release+0x135/0x1a0 [ 492.981894][T31366] ? debug_check_no_obj_freed+0x505/0x5b0 [ 492.987634][T31366] ? rcu_lock_release+0x9/0x30 [ 492.992391][T31366] ? trace_lock_release+0x135/0x1a0 [ 492.997578][T31366] ? rcu_lock_release+0x9/0x30 [ 493.002332][T31366] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 493.007953][T31366] ? lo_release+0x1f0/0x1f0 [ 493.012449][T31366] blkdev_ioctl+0x807/0x2990 [ 493.017039][T31366] ? tomoyo_path_number_perm+0x53e/0x640 [ 493.022676][T31366] block_ioctl+0xbd/0x100 [ 493.026994][T31366] ? blkdev_iopoll+0x100/0x100 [ 493.031749][T31366] do_vfs_ioctl+0x744/0x1730 [ 493.036332][T31366] ? __fget+0x4a1/0x510 [ 493.040480][T31366] ? tomoyo_file_ioctl+0x23/0x30 [ 493.045409][T31366] ? security_file_ioctl+0xa1/0xd0 [ 493.050513][T31366] __x64_sys_ioctl+0xe3/0x120 [ 493.055183][T31366] do_syscall_64+0xfe/0x140 [ 493.059677][T31366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.065559][T31366] RIP: 0033:0x4596e7 [ 493.069447][T31366] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.089043][T31366] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 493.097438][T31366] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 00:38:46 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r0, 0x11, 0x3f, 0x8fffffd) 00:38:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89a3, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:46 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1600000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 493.105399][T31366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 493.113362][T31366] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 493.121323][T31366] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 493.129285][T31366] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:46 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x42021) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) write$sndseq(r0, &(0x7f0000000e50), 0xfffffe41) [ 493.320325][T31390] FAULT_INJECTION: forcing a failure. [ 493.320325][T31390] name failslab, interval 1, probability 0, space 0, times 0 [ 493.342560][T31390] CPU: 0 PID: 31390 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 493.350651][T31390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.360698][T31390] Call Trace: [ 493.363988][T31390] dump_stack+0x1d8/0x2f8 [ 493.368312][T31390] should_fail+0x555/0x770 [ 493.372724][T31390] __should_failslab+0x11a/0x160 [ 493.377736][T31390] ? getname_flags+0xba/0x640 [ 493.382403][T31390] should_failslab+0x9/0x20 [ 493.386893][T31390] kmem_cache_alloc+0x56/0x2e0 [ 493.391646][T31390] ? __kasan_check_write+0x14/0x20 [ 493.397198][T31390] getname_flags+0xba/0x640 [ 493.401696][T31390] do_mkdirat+0x3c/0x320 [ 493.405927][T31390] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 493.411638][T31390] ? trace_hardirqs_off_caller+0x58/0x80 [ 493.417258][T31390] ? do_syscall_64+0x1d/0x140 [ 493.421925][T31390] __x64_sys_mkdir+0x60/0x70 [ 493.426507][T31390] do_syscall_64+0xfe/0x140 [ 493.431006][T31390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.436884][T31390] RIP: 0033:0x458c97 [ 493.440772][T31390] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.460364][T31390] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 493.468762][T31390] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 493.476722][T31390] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 493.484680][T31390] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 493.492640][T31390] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 493.500603][T31390] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xfc}}, 0x1c) 00:38:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89b1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:47 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x1cbcfdff00000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) 00:38:47 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89c4, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 493.712996][T31405] FAULT_INJECTION: forcing a failure. [ 493.712996][T31405] name failslab, interval 1, probability 0, space 0, times 0 [ 493.737581][T31405] CPU: 1 PID: 31405 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 493.745581][T31405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.755622][T31405] Call Trace: [ 493.758897][T31405] dump_stack+0x1d8/0x2f8 [ 493.763205][T31405] should_fail+0x555/0x770 [ 493.767597][T31405] __should_failslab+0x11a/0x160 [ 493.772508][T31405] should_failslab+0x9/0x20 [ 493.776988][T31405] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 493.782679][T31405] ? __kmalloc_node_track_caller+0x3c/0x60 [ 493.788457][T31405] __kmalloc_node_track_caller+0x3c/0x60 [ 493.794061][T31405] ? alloc_uevent_skb+0x7f/0x230 [ 493.798980][T31405] __alloc_skb+0xe8/0x500 [ 493.803283][T31405] alloc_uevent_skb+0x7f/0x230 [ 493.808018][T31405] kobject_uevent_env+0xcbb/0x1260 [ 493.813117][T31405] kobject_uevent+0x1f/0x30 [ 493.817595][T31405] loop_set_fd+0xd21/0x1180 [ 493.822075][T31405] lo_ioctl+0xd5/0x2200 [ 493.826206][T31405] ? __kasan_slab_free+0x12a/0x1e0 [ 493.832807][T31405] ? kasan_slab_free+0xe/0x10 [ 493.837458][T31405] ? kfree+0x115/0x200 [ 493.841501][T31405] ? tomoyo_path_number_perm+0x4e1/0x640 [ 493.847106][T31405] ? tomoyo_file_ioctl+0x23/0x30 [ 493.852013][T31405] ? security_file_ioctl+0x6d/0xd0 [ 493.857095][T31405] ? __x64_sys_ioctl+0xa3/0x120 [ 493.861921][T31405] ? do_syscall_64+0xfe/0x140 [ 493.866572][T31405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.872610][T31405] ? debug_check_no_obj_freed+0x505/0x5b0 [ 493.878303][T31405] ? trace_lock_release+0x135/0x1a0 [ 493.883474][T31405] ? debug_check_no_obj_freed+0x505/0x5b0 [ 493.889169][T31405] ? rcu_lock_release+0x9/0x30 [ 493.893903][T31405] ? trace_lock_release+0x135/0x1a0 [ 493.899075][T31405] ? rcu_lock_release+0x9/0x30 [ 493.903811][T31405] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 493.909415][T31405] ? lo_release+0x1f0/0x1f0 [ 493.913894][T31405] blkdev_ioctl+0x807/0x2990 [ 493.918461][T31405] ? tomoyo_path_number_perm+0x53e/0x640 [ 493.924073][T31405] block_ioctl+0xbd/0x100 [ 493.928371][T31405] ? blkdev_iopoll+0x100/0x100 [ 493.933107][T31405] do_vfs_ioctl+0x744/0x1730 [ 493.937668][T31405] ? __fget+0x4a1/0x510 [ 493.941796][T31405] ? tomoyo_file_ioctl+0x23/0x30 [ 493.946705][T31405] ? security_file_ioctl+0xa1/0xd0 [ 493.951788][T31405] __x64_sys_ioctl+0xe3/0x120 [ 493.956438][T31405] do_syscall_64+0xfe/0x140 [ 493.960918][T31405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.966779][T31405] RIP: 0033:0x4596e7 [ 493.970647][T31405] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.990224][T31405] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 493.998605][T31405] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 494.006550][T31405] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:38:47 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x2503000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 494.014494][T31405] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 494.022438][T31405] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 494.030382][T31405] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89e0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:47 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3c01000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) sync_file_range(r0, 0x0, 0x0, 0x0) [ 494.242943][T31432] device bond_slave_1 entered promiscuous mode [ 494.260051][T31432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 494.288623][T31432] bond0: (slave bond_slave_1): Releasing backup interface [ 494.305706][T31432] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 494.331054][T31432] device bond_slave_1 left promiscuous mode [ 494.457901][T31437] device bond_slave_1 entered promiscuous mode [ 494.464367][T31437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:38:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x12c}}, 0x1c) 00:38:48 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x3f00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:48 executing program 2: 00:38:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:48 executing program 2: [ 494.938576][T31451] bond0: (slave bond_slave_1): Releasing backup interface [ 494.945767][T31451] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 494.969313][T31456] FAULT_INJECTION: forcing a failure. [ 494.969313][T31456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.982535][T31456] CPU: 1 PID: 31456 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 494.990507][T31456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.000562][T31456] Call Trace: [ 495.003854][T31456] dump_stack+0x1d8/0x2f8 [ 495.008183][T31456] should_fail+0x555/0x770 [ 495.012592][T31456] should_fail_alloc_page+0x55/0x60 [ 495.017783][T31456] prepare_alloc_pages+0x283/0x470 [ 495.022886][T31456] __alloc_pages_nodemask+0xb2/0x5d0 [ 495.028167][T31456] ? lo_release+0x1f0/0x1f0 [ 495.032662][T31456] ? blkdev_ioctl+0x807/0x2990 [ 495.037420][T31456] kmem_getpages+0x56/0xa20 [ 495.041915][T31456] ? trace_lock_release+0x135/0x1a0 [ 495.047106][T31456] cache_grow_begin+0x7e/0x2c0 [ 495.051862][T31456] cache_alloc_refill+0x311/0x3f0 [ 495.056872][T31456] ? check_preemption_disabled+0xb7/0x2a0 [ 495.062585][T31456] kmem_cache_alloc+0x2b9/0x2e0 [ 495.067425][T31456] ? getname_flags+0xba/0x640 [ 495.072090][T31456] getname_flags+0xba/0x640 [ 495.076584][T31456] do_mkdirat+0x3c/0x320 [ 495.080813][T31456] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 495.086519][T31456] ? trace_hardirqs_off_caller+0x58/0x80 [ 495.092137][T31456] ? do_syscall_64+0x1d/0x140 [ 495.096806][T31456] __x64_sys_mkdir+0x60/0x70 [ 495.101383][T31456] do_syscall_64+0xfe/0x140 [ 495.105879][T31456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.111757][T31456] RIP: 0033:0x458c97 [ 495.115638][T31456] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.135230][T31456] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.143626][T31456] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 495.151587][T31456] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 495.159563][T31456] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.167522][T31456] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 495.175479][T31456] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4000000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 495.184905][T31451] device bond_slave_1 left promiscuous mode 00:38:48 executing program 2: 00:38:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:48 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 495.434632][T31476] FAULT_INJECTION: forcing a failure. [ 495.434632][T31476] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.448386][T31476] CPU: 0 PID: 31476 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 495.456350][T31476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.466400][T31476] Call Trace: [ 495.469687][T31476] dump_stack+0x1d8/0x2f8 [ 495.474010][T31476] should_fail+0x555/0x770 [ 495.478417][T31476] should_fail_alloc_page+0x55/0x60 [ 495.483605][T31476] prepare_alloc_pages+0x283/0x470 [ 495.488721][T31476] __alloc_pages_nodemask+0xb2/0x5d0 [ 495.494000][T31476] ? lo_release+0x1f0/0x1f0 [ 495.498497][T31476] ? blkdev_ioctl+0x807/0x2990 [ 495.503255][T31476] kmem_getpages+0x56/0xa20 [ 495.507752][T31476] ? trace_lock_release+0x135/0x1a0 [ 495.512945][T31476] cache_grow_begin+0x7e/0x2c0 [ 495.517700][T31476] cache_alloc_refill+0x311/0x3f0 [ 495.522711][T31476] ? check_preemption_disabled+0xb7/0x2a0 [ 495.528422][T31476] kmem_cache_alloc+0x2b9/0x2e0 [ 495.533266][T31476] ? getname_flags+0xba/0x640 [ 495.537933][T31476] getname_flags+0xba/0x640 [ 495.542429][T31476] do_mkdirat+0x3c/0x320 [ 495.546661][T31476] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 495.552370][T31476] ? trace_hardirqs_off_caller+0x58/0x80 [ 495.557990][T31476] ? do_syscall_64+0x1d/0x140 [ 495.562659][T31476] __x64_sys_mkdir+0x60/0x70 [ 495.567241][T31476] do_syscall_64+0xfe/0x140 [ 495.571735][T31476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.577611][T31476] RIP: 0033:0x458c97 [ 495.581498][T31476] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.601090][T31476] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.609524][T31476] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 495.617660][T31476] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 495.625619][T31476] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.633580][T31476] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 495.641540][T31476] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1f4}}, 0x1c) 00:38:49 executing program 2: 00:38:49 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4100000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89fb, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:49 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:49 executing program 2: 00:38:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89fc, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 496.103704][T31499] FAULT_INJECTION: forcing a failure. [ 496.103704][T31499] name failslab, interval 1, probability 0, space 0, times 0 00:38:49 executing program 2: [ 496.145457][T31499] CPU: 0 PID: 31499 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 496.153466][T31499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.163622][T31499] Call Trace: [ 496.166896][T31499] dump_stack+0x1d8/0x2f8 [ 496.171204][T31499] should_fail+0x555/0x770 [ 496.175599][T31499] __should_failslab+0x11a/0x160 [ 496.180513][T31499] ? __d_alloc+0x2d/0x6e0 [ 496.184817][T31499] should_failslab+0x9/0x20 [ 496.189301][T31499] kmem_cache_alloc+0x56/0x2e0 [ 496.194040][T31499] __d_alloc+0x2d/0x6e0 [ 496.198195][T31499] d_alloc+0x4e/0x1d0 [ 496.202165][T31499] __lookup_hash+0xe5/0x290 [ 496.206662][T31499] filename_create+0x14f/0x670 [ 496.211398][T31499] ? getname_flags+0x214/0x640 [ 496.216144][T31499] do_mkdirat+0x5a/0x320 [ 496.220366][T31499] ? trace_hardirqs_off_caller+0x58/0x80 [ 496.225982][T31499] __x64_sys_mkdir+0x60/0x70 [ 496.230555][T31499] do_syscall_64+0xfe/0x140 [ 496.235035][T31499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.240903][T31499] RIP: 0033:0x458c97 [ 496.244781][T31499] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.264401][T31499] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 496.272810][T31499] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 496.280769][T31499] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 00:38:49 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x4403000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 496.288732][T31499] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.296693][T31499] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 496.304655][T31499] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:49 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 496.432367][T31516] FAULT_INJECTION: forcing a failure. [ 496.432367][T31516] name failslab, interval 1, probability 0, space 0, times 0 [ 496.453397][T31516] CPU: 1 PID: 31516 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 496.461406][T31516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.471453][T31516] Call Trace: [ 496.474745][T31516] dump_stack+0x1d8/0x2f8 [ 496.479068][T31516] should_fail+0x555/0x770 [ 496.483479][T31516] __should_failslab+0x11a/0x160 [ 496.488408][T31516] ? security_inode_alloc+0x36/0x1e0 [ 496.493685][T31516] should_failslab+0x9/0x20 [ 496.498182][T31516] kmem_cache_alloc+0x56/0x2e0 [ 496.502943][T31516] security_inode_alloc+0x36/0x1e0 [ 496.508047][T31516] inode_init_always+0x3b5/0x8d0 [ 496.512972][T31516] ? set_qf_name+0x3c0/0x3c0 [ 496.517551][T31516] new_inode_pseudo+0x7f/0x240 [ 496.522302][T31516] new_inode+0x28/0x1c0 [ 496.526456][T31516] ? trace_ext4_request_inode+0x28b/0x2d0 [ 496.532173][T31516] __ext4_new_inode+0x43d/0x5650 [ 496.537106][T31516] ? memset+0x31/0x40 [ 496.541083][T31516] ? smk_curacc+0xa3/0xe0 [ 496.545403][T31516] ext4_mkdir+0x3f5/0x1450 [ 496.549818][T31516] ? security_inode_permission+0xdd/0x120 [ 496.555530][T31516] vfs_mkdir+0x43f/0x610 [ 496.559763][T31516] do_mkdirat+0x1d7/0x320 [ 496.564082][T31516] __x64_sys_mkdir+0x60/0x70 [ 496.568659][T31516] do_syscall_64+0xfe/0x140 [ 496.573151][T31516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.579029][T31516] RIP: 0033:0x458c97 [ 496.582914][T31516] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.602503][T31516] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 496.610905][T31516] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 496.618866][T31516] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 496.626824][T31516] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.634784][T31516] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 496.642747][T31516] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x300}}, 0x1c) 00:38:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x89fd, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:50 executing program 2: 00:38:50 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x5003000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:50 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:50 executing program 2: [ 497.011683][T31535] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 497.032249][T31537] FAULT_INJECTION: forcing a failure. [ 497.032249][T31537] name failslab, interval 1, probability 0, space 0, times 0 [ 497.052494][T31541] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 497.052851][T31537] CPU: 1 PID: 31537 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 497.070383][T31537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.080447][T31537] Call Trace: [ 497.083735][T31537] dump_stack+0x1d8/0x2f8 [ 497.088063][T31537] should_fail+0x555/0x770 [ 497.092658][T31537] __should_failslab+0x11a/0x160 [ 497.097596][T31537] ? tomoyo_encode2+0x273/0x5a0 [ 497.102437][T31537] should_failslab+0x9/0x20 [ 497.106941][T31537] __kmalloc+0x7a/0x340 [ 497.111088][T31537] tomoyo_encode2+0x273/0x5a0 [ 497.115756][T31537] tomoyo_realpath_from_path+0x769/0x7c0 [ 497.121381][T31537] tomoyo_path_number_perm+0x166/0x640 [ 497.126844][T31537] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 497.132468][T31537] ? trace_kmem_cache_free+0xa0/0x110 [ 497.137832][T31537] tomoyo_path_mkdir+0x9c/0xc0 [ 497.142585][T31537] security_path_mkdir+0xed/0x170 [ 497.147600][T31537] do_mkdirat+0x15c/0x320 [ 497.151921][T31537] __x64_sys_mkdir+0x60/0x70 [ 497.156529][T31537] do_syscall_64+0xfe/0x140 [ 497.161025][T31537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.166906][T31537] RIP: 0033:0x458c97 [ 497.170791][T31537] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.190384][T31537] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 497.198783][T31537] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 00:38:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xae01, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:50 executing program 2: [ 497.206748][T31537] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 497.214714][T31537] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 497.222695][T31537] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 497.230675][T31537] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 497.248302][T31537] ERROR: Out of memory at tomoyo_realpath_from_path. 00:38:50 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x6603000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xae41, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:50 executing program 2: 00:38:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x3e8}}, 0x1c) 00:38:51 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:51 executing program 2: 00:38:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xae80, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:51 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x6800000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:51 executing program 2: 00:38:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x40044581, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 498.167674][T31574] FAULT_INJECTION: forcing a failure. [ 498.167674][T31574] name failslab, interval 1, probability 0, space 0, times 0 [ 498.191221][T31574] CPU: 1 PID: 31574 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 498.199236][T31574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.209281][T31574] Call Trace: [ 498.212606][T31574] dump_stack+0x1d8/0x2f8 [ 498.216931][T31574] should_fail+0x555/0x770 [ 498.221347][T31574] __should_failslab+0x11a/0x160 [ 498.226279][T31574] ? ext4_alloc_inode+0x1f/0x560 [ 498.231209][T31574] should_failslab+0x9/0x20 [ 498.235703][T31574] kmem_cache_alloc+0x56/0x2e0 [ 498.240459][T31574] ? set_qf_name+0x3c0/0x3c0 [ 498.245042][T31574] ext4_alloc_inode+0x1f/0x560 [ 498.249796][T31574] ? set_qf_name+0x3c0/0x3c0 [ 498.254374][T31574] new_inode_pseudo+0x68/0x240 [ 498.259127][T31574] new_inode+0x28/0x1c0 [ 498.263272][T31574] ? trace_ext4_request_inode+0x28b/0x2d0 [ 498.268985][T31574] __ext4_new_inode+0x43d/0x5650 [ 498.273916][T31574] ? memset+0x31/0x40 [ 498.277896][T31574] ? smk_curacc+0xa3/0xe0 [ 498.282218][T31574] ext4_mkdir+0x3f5/0x1450 [ 498.286634][T31574] ? security_inode_permission+0xdd/0x120 [ 498.292344][T31574] vfs_mkdir+0x43f/0x610 [ 498.296584][T31574] do_mkdirat+0x1d7/0x320 [ 498.300906][T31574] __x64_sys_mkdir+0x60/0x70 [ 498.305489][T31574] do_syscall_64+0xfe/0x140 [ 498.309983][T31574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.315859][T31574] RIP: 0033:0x458c97 [ 498.319751][T31574] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.339344][T31574] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 498.347748][T31574] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 498.355709][T31574] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 00:38:51 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7101000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 498.363668][T31574] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 498.371625][T31574] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 498.379589][T31574] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:52 executing program 2: 00:38:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x400454ca, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x500}}, 0x1c) 00:38:52 executing program 2: 00:38:52 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x400454d0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:52 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x7d00000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:52 executing program 2: [ 499.081493][T31611] FAULT_INJECTION: forcing a failure. [ 499.081493][T31611] name failslab, interval 1, probability 0, space 0, times 0 [ 499.101353][T31611] CPU: 1 PID: 31611 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 499.101365][T31611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.119405][T31611] Call Trace: [ 499.122686][T31611] dump_stack+0x1d8/0x2f8 [ 499.127026][T31611] should_fail+0x555/0x770 [ 499.131431][T31611] __should_failslab+0x11a/0x160 [ 499.136341][T31611] ? ext4_alloc_inode+0x1f/0x560 [ 499.141273][T31611] should_failslab+0x9/0x20 [ 499.145749][T31611] kmem_cache_alloc+0x56/0x2e0 [ 499.150502][T31611] ? set_qf_name+0x3c0/0x3c0 [ 499.155064][T31611] ext4_alloc_inode+0x1f/0x560 [ 499.159802][T31611] ? set_qf_name+0x3c0/0x3c0 [ 499.164363][T31611] new_inode_pseudo+0x68/0x240 [ 499.169100][T31611] new_inode+0x28/0x1c0 [ 499.173244][T31611] ? trace_ext4_request_inode+0x28b/0x2d0 [ 499.178947][T31611] __ext4_new_inode+0x43d/0x5650 [ 499.183857][T31611] ? memset+0x31/0x40 [ 499.187818][T31611] ? smk_curacc+0xa3/0xe0 [ 499.192117][T31611] ext4_mkdir+0x3f5/0x1450 [ 499.196513][T31611] ? security_inode_permission+0xdd/0x120 [ 499.202209][T31611] vfs_mkdir+0x43f/0x610 [ 499.206425][T31611] do_mkdirat+0x1d7/0x320 [ 499.210744][T31611] __x64_sys_mkdir+0x60/0x70 [ 499.215321][T31611] do_syscall_64+0xfe/0x140 [ 499.219814][T31611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.225691][T31611] RIP: 0033:0x458c97 [ 499.229584][T31611] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.249162][T31611] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 499.257542][T31611] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 499.265500][T31611] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 499.273459][T31611] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 00:38:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x40049409, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:52 executing program 2: [ 499.281403][T31611] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 499.289361][T31611] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x400c55cb, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:52 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8001000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:52 executing program 2: 00:38:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x600}}, 0x1c) 00:38:53 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:53 executing program 2: 00:38:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4020940d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8003000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x8e01000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:53 executing program 2: 00:38:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4020ae46, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:53 executing program 2: [ 500.248356][T31651] FAULT_INJECTION: forcing a failure. [ 500.248356][T31651] name failslab, interval 1, probability 0, space 0, times 0 [ 500.287590][T31651] CPU: 1 PID: 31651 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 500.295600][T31651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.305643][T31651] Call Trace: [ 500.308962][T31651] dump_stack+0x1d8/0x2f8 [ 500.313284][T31651] should_fail+0x555/0x770 [ 500.317690][T31651] __should_failslab+0x11a/0x160 [ 500.322616][T31651] ? smack_inode_init_security+0x3cf/0x490 [ 500.328411][T31651] should_failslab+0x9/0x20 [ 500.332905][T31651] __kmalloc_track_caller+0x79/0x340 [ 500.338184][T31651] kstrdup+0x34/0x70 [ 500.342072][T31651] smack_inode_init_security+0x3cf/0x490 [ 500.347694][T31651] security_inode_init_security+0xfe/0x310 [ 500.353493][T31651] ? ext4_init_security+0x40/0x40 [ 500.358509][T31651] ext4_init_security+0x34/0x40 [ 500.363355][T31651] __ext4_new_inode+0x446c/0x5650 [ 500.368464][T31651] ? smk_curacc+0xa3/0xe0 [ 500.372782][T31651] ext4_mkdir+0x3f5/0x1450 [ 500.377193][T31651] ? security_inode_permission+0xdd/0x120 [ 500.382909][T31651] vfs_mkdir+0x43f/0x610 [ 500.387139][T31651] do_mkdirat+0x1d7/0x320 [ 500.391456][T31651] __x64_sys_mkdir+0x60/0x70 [ 500.396032][T31651] do_syscall_64+0xfe/0x140 [ 500.400531][T31651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.406405][T31651] RIP: 0033:0x458c97 [ 500.410286][T31651] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.429872][T31651] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 500.438279][T31651] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 500.446237][T31651] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 500.454193][T31651] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 500.462153][T31651] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 500.470108][T31651] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:54 executing program 2: 00:38:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4090ae82, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x618}}, 0x1c) 00:38:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:54 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x4188aea7, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:54 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x9401000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:54 executing program 2: 00:38:54 executing program 2: [ 501.154440][T31686] FAULT_INJECTION: forcing a failure. [ 501.154440][T31686] name failslab, interval 1, probability 0, space 0, times 0 [ 501.169624][T31686] CPU: 1 PID: 31686 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 501.177621][T31686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.187672][T31686] Call Trace: [ 501.190967][T31686] dump_stack+0x1d8/0x2f8 [ 501.195294][T31686] should_fail+0x555/0x770 [ 501.199702][T31686] __should_failslab+0x11a/0x160 [ 501.204634][T31686] ? kcalloc+0x2f/0x50 [ 501.208696][T31686] should_failslab+0x9/0x20 [ 501.213190][T31686] __kmalloc+0x7a/0x340 [ 501.217336][T31686] kcalloc+0x2f/0x50 [ 501.221219][T31686] ext4_find_extent+0x216/0xaa0 [ 501.226057][T31686] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 501.232374][T31686] ext4_ext_map_blocks+0x170/0x7180 [ 501.237566][T31686] ? __kasan_check_read+0x11/0x20 [ 501.242576][T31686] ? mark_buffer_dirty+0x280/0x2e0 [ 501.247679][T31686] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 501.253128][T31686] ? trace_lock_release+0x135/0x1a0 [ 501.258317][T31686] ? __kasan_check_write+0x14/0x20 [ 501.263413][T31686] ? __down_read+0x14b/0x330 [ 501.267991][T31686] ext4_map_blocks+0x422/0x1e50 [ 501.272834][T31686] ? ext4_mark_inode_dirty+0x216/0x700 [ 501.278283][T31686] ? __kasan_check_write+0x14/0x20 [ 501.283385][T31686] ext4_getblk+0xae/0x460 [ 501.287712][T31686] ext4_bread+0x4a/0x240 [ 501.291947][T31686] ext4_append+0x175/0x310 [ 501.296353][T31686] ext4_mkdir+0x7ad/0x1450 [ 501.300766][T31686] vfs_mkdir+0x43f/0x610 [ 501.305001][T31686] do_mkdirat+0x1d7/0x320 [ 501.309321][T31686] __x64_sys_mkdir+0x60/0x70 [ 501.313903][T31686] do_syscall_64+0xfe/0x140 [ 501.318397][T31686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.324297][T31686] RIP: 0033:0x458c97 [ 501.328180][T31686] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x800454d2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 501.347775][T31686] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 501.356175][T31686] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 501.364135][T31686] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 501.372095][T31686] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 501.380054][T31686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 501.388017][T31686] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:55 executing program 2: 00:38:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xd403000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8004ae98, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:55 executing program 2: 00:38:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x628}}, 0x1c) 00:38:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x80086301, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xde01000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:55 executing program 2: 00:38:55 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:55 executing program 2: 00:38:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x80108906, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 502.305180][T31726] FAULT_INJECTION: forcing a failure. [ 502.305180][T31726] name failslab, interval 1, probability 0, space 0, times 0 [ 502.328542][T31726] CPU: 0 PID: 31726 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 502.336549][T31726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.346602][T31726] Call Trace: [ 502.349891][T31726] dump_stack+0x1d8/0x2f8 00:38:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x80108907, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:55 executing program 2: [ 502.354222][T31726] should_fail+0x555/0x770 [ 502.358651][T31726] __should_failslab+0x11a/0x160 [ 502.363587][T31726] ? kcalloc+0x2f/0x50 [ 502.367657][T31726] should_failslab+0x9/0x20 [ 502.372160][T31726] __kmalloc+0x7a/0x340 [ 502.376316][T31726] kcalloc+0x2f/0x50 [ 502.380201][T31726] ext4_find_extent+0x216/0xaa0 [ 502.380211][T31726] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 502.380221][T31726] ext4_ext_map_blocks+0x170/0x7180 [ 502.380236][T31726] ? __kasan_check_read+0x11/0x20 [ 502.380244][T31726] ? mark_buffer_dirty+0x280/0x2e0 [ 502.380253][T31726] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 502.380263][T31726] ? trace_lock_release+0x135/0x1a0 [ 502.380277][T31726] ? __kasan_check_write+0x14/0x20 [ 502.380283][T31726] ? __down_read+0x14b/0x330 [ 502.380294][T31726] ext4_map_blocks+0x422/0x1e50 [ 502.380306][T31726] ? ext4_mark_inode_dirty+0x216/0x700 [ 502.391445][T31726] ? __kasan_check_write+0x14/0x20 [ 502.391457][T31726] ext4_getblk+0xae/0x460 [ 502.391468][T31726] ext4_bread+0x4a/0x240 [ 502.391478][T31726] ext4_append+0x175/0x310 [ 502.391487][T31726] ext4_mkdir+0x7ad/0x1450 [ 502.391503][T31726] vfs_mkdir+0x43f/0x610 [ 502.391515][T31726] do_mkdirat+0x1d7/0x320 [ 502.391525][T31726] __x64_sys_mkdir+0x60/0x70 [ 502.391535][T31726] do_syscall_64+0xfe/0x140 [ 502.391546][T31726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.391555][T31726] RIP: 0033:0x458c97 00:38:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xe403000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:56 executing program 2: [ 502.391564][T31726] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.391568][T31726] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 502.391577][T31726] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 502.391583][T31726] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 502.391588][T31726] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 502.391592][T31726] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 502.391597][T31726] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x660}}, 0x1c) 00:38:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x80885659, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:56 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:56 executing program 2: 00:38:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xed02000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:56 executing program 2: 00:38:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8208ae63, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf203000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 503.206160][T31761] FAULT_INJECTION: forcing a failure. [ 503.206160][T31761] name failslab, interval 1, probability 0, space 0, times 0 [ 503.246571][T31761] CPU: 0 PID: 31761 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 503.254567][T31761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.254571][T31761] Call Trace: [ 503.254588][T31761] dump_stack+0x1d8/0x2f8 [ 503.254601][T31761] should_fail+0x555/0x770 [ 503.254615][T31761] __should_failslab+0x11a/0x160 [ 503.254626][T31761] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 503.254637][T31761] should_failslab+0x9/0x20 [ 503.254647][T31761] kmem_cache_alloc+0x56/0x2e0 [ 503.254656][T31761] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 503.254664][T31761] ? trace_kmalloc+0xbb/0x130 [ 503.254673][T31761] ? kcalloc+0x2f/0x50 [ 503.254681][T31761] ? __kmalloc+0x26c/0x340 [ 503.254688][T31761] ? kcalloc+0x2f/0x50 [ 503.254697][T31761] ? ext4_ext_search_right+0x4cb/0x940 [ 503.254705][T31761] ? ext4_find_extent+0x8e0/0xaa0 [ 503.254714][T31761] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 503.254723][T31761] ext4_ext_map_blocks+0x4b9a/0x7180 [ 503.254732][T31761] ? __kasan_check_read+0x11/0x20 [ 503.254740][T31761] ? mark_buffer_dirty+0x280/0x2e0 [ 503.254753][T31761] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 503.268094][T31761] ext4_map_blocks+0x8f2/0x1e50 [ 503.268111][T31761] ? __kasan_check_write+0x14/0x20 [ 503.268121][T31761] ext4_getblk+0xae/0x460 [ 503.268132][T31761] ext4_bread+0x4a/0x240 [ 503.268143][T31761] ext4_append+0x175/0x310 [ 503.378223][T31761] ext4_mkdir+0x7ad/0x1450 [ 503.382636][T31761] vfs_mkdir+0x43f/0x610 [ 503.386870][T31761] do_mkdirat+0x1d7/0x320 [ 503.391196][T31761] __x64_sys_mkdir+0x60/0x70 [ 503.395774][T31761] do_syscall_64+0xfe/0x140 [ 503.400267][T31761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.406143][T31761] RIP: 0033:0x458c97 [ 503.410032][T31761] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.429628][T31761] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 503.438036][T31761] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 00:38:57 executing program 2: 00:38:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc0045878, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 503.445996][T31761] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 503.453955][T31761] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 503.461922][T31761] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 503.469881][T31761] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:57 executing program 2: 00:38:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x700}}, 0x1c) 00:38:57 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc0045878, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:57 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xf803000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:57 executing program 2: 00:38:57 executing program 2: [ 504.116855][T31800] FAULT_INJECTION: forcing a failure. [ 504.116855][T31800] name failslab, interval 1, probability 0, space 0, times 0 [ 504.133396][T31800] CPU: 0 PID: 31800 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 504.141394][T31800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.151446][T31800] Call Trace: [ 504.154738][T31800] dump_stack+0x1d8/0x2f8 [ 504.159066][T31800] should_fail+0x555/0x770 [ 504.163482][T31800] __should_failslab+0x11a/0x160 [ 504.168414][T31800] ? kzalloc+0x1f/0x40 [ 504.172478][T31800] should_failslab+0x9/0x20 [ 504.176971][T31800] __kmalloc+0x7a/0x340 [ 504.181120][T31800] kzalloc+0x1f/0x40 [ 504.185006][T31800] smk_parse_smack+0x197/0x230 [ 504.189764][T31800] smk_import_entry+0x27/0x590 [ 504.194518][T31800] smack_d_instantiate+0x78f/0xd70 [ 504.199620][T31800] ? lockdep_init_map+0x2a/0x680 [ 504.204551][T31800] security_d_instantiate+0xa5/0x100 [ 504.209826][T31800] d_instantiate_new+0x65/0x130 [ 504.214672][T31800] ext4_mkdir+0xfa9/0x1450 [ 504.219092][T31800] vfs_mkdir+0x43f/0x610 [ 504.223326][T31800] do_mkdirat+0x1d7/0x320 [ 504.227645][T31800] __x64_sys_mkdir+0x60/0x70 [ 504.232223][T31800] do_syscall_64+0xfe/0x140 [ 504.236717][T31800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.242594][T31800] RIP: 0033:0x458c97 [ 504.246479][T31800] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:38:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc01456b8, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:57 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xfe03000000000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 504.266073][T31800] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 504.274479][T31800] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 504.282442][T31800] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 504.290399][T31800] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 504.298359][T31800] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 504.306316][T31800] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:57 executing program 2: 00:38:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc0189436, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:58 executing program 2: 00:38:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x900}}, 0x1c) 00:38:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:58 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:58 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc020660b, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:58 executing program 2: 00:38:58 executing program 2: 00:38:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0xc0286405, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 505.011739][T31831] FAULT_INJECTION: forcing a failure. [ 505.011739][T31831] name failslab, interval 1, probability 0, space 0, times 0 [ 505.034839][T31831] CPU: 0 PID: 31831 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 505.042846][T31831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.052893][T31831] Call Trace: [ 505.052910][T31831] dump_stack+0x1d8/0x2f8 00:38:58 executing program 2: [ 505.052928][T31831] should_fail+0x555/0x770 [ 505.064925][T31831] __should_failslab+0x11a/0x160 [ 505.069873][T31831] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 505.075163][T31831] should_failslab+0x9/0x20 [ 505.079663][T31831] kmem_cache_alloc+0x56/0x2e0 [ 505.079677][T31831] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 505.079688][T31831] ? trace_kmalloc+0xbb/0x130 [ 505.094178][T31831] ? kcalloc+0x2f/0x50 [ 505.094190][T31831] ? __kmalloc+0x26c/0x340 [ 505.094202][T31831] ? kcalloc+0x2f/0x50 [ 505.106716][T31831] ? ext4_ext_search_right+0x4cb/0x940 [ 505.112180][T31831] ? ext4_find_extent+0x8e0/0xaa0 [ 505.117209][T31831] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 505.122919][T31831] ext4_ext_map_blocks+0x4b9a/0x7180 [ 505.122932][T31831] ? __kasan_check_read+0x11/0x20 [ 505.122939][T31831] ? mark_buffer_dirty+0x280/0x2e0 [ 505.122951][T31831] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 505.138325][T31831] ext4_map_blocks+0x8f2/0x1e50 [ 505.138343][T31831] ? __kasan_check_write+0x14/0x20 [ 505.138353][T31831] ext4_getblk+0xae/0x460 [ 505.138364][T31831] ext4_bread+0x4a/0x240 00:38:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'\nond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 505.138373][T31831] ext4_append+0x175/0x310 [ 505.138383][T31831] ext4_mkdir+0x7ad/0x1450 [ 505.138398][T31831] vfs_mkdir+0x43f/0x610 [ 505.138408][T31831] do_mkdirat+0x1d7/0x320 [ 505.138416][T31831] __x64_sys_mkdir+0x60/0x70 [ 505.138426][T31831] do_syscall_64+0xfe/0x140 [ 505.138437][T31831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.138445][T31831] RIP: 0033:0x458c97 [ 505.138453][T31831] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.138457][T31831] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 505.138466][T31831] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 505.138470][T31831] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 505.138474][T31831] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 505.138479][T31831] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 00:38:58 executing program 2: 00:38:58 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0x5, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 505.138483][T31831] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xa00}}, 0x1c) 00:38:59 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'%ond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:38:59 executing program 2: 00:38:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0x9, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:59 executing program 2: [ 505.923928][T31872] FAULT_INJECTION: forcing a failure. [ 505.923928][T31872] name failslab, interval 1, probability 0, space 0, times 0 [ 505.936631][T31872] CPU: 1 PID: 31872 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 505.944612][T31872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.954671][T31872] Call Trace: [ 505.957970][T31872] dump_stack+0x1d8/0x2f8 [ 505.962308][T31872] should_fail+0x555/0x770 [ 505.966735][T31872] __should_failslab+0x11a/0x160 00:38:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'b\nnd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 505.971670][T31872] ? __es_insert_extent+0x321/0xd90 [ 505.976866][T31872] should_failslab+0x9/0x20 [ 505.976878][T31872] kmem_cache_alloc+0x56/0x2e0 [ 505.976890][T31872] __es_insert_extent+0x321/0xd90 [ 505.976902][T31872] ext4_es_insert_extent+0x220/0x2fb0 [ 505.986134][T31872] ext4_map_blocks+0xe18/0x1e50 [ 505.986152][T31872] ? __kasan_check_write+0x14/0x20 [ 505.986163][T31872] ext4_getblk+0xae/0x460 [ 506.010758][T31872] ext4_bread+0x4a/0x240 [ 506.014989][T31872] ext4_append+0x175/0x310 [ 506.019398][T31872] ext4_mkdir+0x7ad/0x1450 [ 506.023818][T31872] vfs_mkdir+0x43f/0x610 [ 506.028054][T31872] do_mkdirat+0x1d7/0x320 [ 506.032374][T31872] __x64_sys_mkdir+0x60/0x70 [ 506.036955][T31872] do_syscall_64+0xfe/0x140 [ 506.041451][T31872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.047329][T31872] RIP: 0033:0x458c97 [ 506.051221][T31872] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.070817][T31872] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 506.079217][T31872] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 506.087177][T31872] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 506.095135][T31872] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 506.103188][T31872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 506.111152][T31872] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:38:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xa, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:38:59 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:38:59 executing program 2: [ 506.240049][T31897] FAULT_INJECTION: forcing a failure. [ 506.240049][T31897] name failslab, interval 1, probability 0, space 0, times 0 [ 506.257122][T31897] CPU: 1 PID: 31897 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 506.265131][T31897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.275184][T31897] Call Trace: [ 506.278477][T31897] dump_stack+0x1d8/0x2f8 [ 506.282812][T31897] should_fail+0x555/0x770 [ 506.287222][T31897] __should_failslab+0x11a/0x160 [ 506.292158][T31897] should_failslab+0x9/0x20 [ 506.296657][T31897] kmem_cache_alloc_trace+0x5d/0x2f0 [ 506.301932][T31897] ? smack_d_instantiate+0x732/0xd70 [ 506.307208][T31897] smack_d_instantiate+0x732/0xd70 [ 506.312315][T31897] ? lockdep_init_map+0x2a/0x680 [ 506.317244][T31897] security_d_instantiate+0xa5/0x100 [ 506.322522][T31897] d_instantiate_new+0x65/0x130 [ 506.327362][T31897] ext4_mkdir+0xfa9/0x1450 [ 506.331778][T31897] vfs_mkdir+0x43f/0x610 [ 506.336012][T31897] do_mkdirat+0x1d7/0x320 [ 506.340332][T31897] __x64_sys_mkdir+0x60/0x70 [ 506.344913][T31897] do_syscall_64+0xfe/0x140 [ 506.349408][T31897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.355294][T31897] RIP: 0033:0x458c97 [ 506.359182][T31897] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.378782][T31897] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 00:39:00 executing program 2: [ 506.387181][T31897] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 506.395144][T31897] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 506.403103][T31897] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 506.411064][T31897] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 506.419029][T31897] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xb00}}, 0x1c) 00:39:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'b%nd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0x18, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:00 executing program 2: 00:39:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:00 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x2, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:00 executing program 2: [ 507.027059][T31918] FAULT_INJECTION: forcing a failure. [ 507.027059][T31918] name failslab, interval 1, probability 0, space 0, times 0 [ 507.059299][T31918] CPU: 0 PID: 31918 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 507.067303][T31918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.077357][T31918] Call Trace: [ 507.080652][T31918] dump_stack+0x1d8/0x2f8 [ 507.085007][T31918] should_fail+0x555/0x770 [ 507.089433][T31918] __should_failslab+0x11a/0x160 [ 507.094372][T31918] ? mempool_alloc_slab+0x4d/0x70 [ 507.099403][T31918] should_failslab+0x9/0x20 [ 507.103910][T31918] kmem_cache_alloc+0x56/0x2e0 [ 507.108676][T31918] mempool_alloc_slab+0x4d/0x70 [ 507.113515][T31918] ? mempool_free+0x350/0x350 [ 507.118179][T31918] mempool_alloc+0x104/0x5e0 [ 507.122763][T31918] ? rcu_lock_release+0x4/0x20 [ 507.127519][T31918] ? trace_lock_release+0x135/0x1a0 [ 507.132718][T31918] ? rcu_lock_release+0x4/0x20 [ 507.137474][T31918] bio_alloc_bioset+0x1b0/0x5f0 [ 507.142319][T31918] submit_bh_wbc+0x1d5/0x700 [ 507.146905][T31918] __sync_dirty_buffer+0x1a2/0x2e0 [ 507.152004][T31918] sync_dirty_buffer+0x1a/0x20 [ 507.156760][T31918] __ext4_handle_dirty_metadata+0x154/0x870 [ 507.162648][T31918] ext4_handle_dirty_dirblock+0x32c/0x690 [ 507.168363][T31918] add_dirent_to_buf+0x9d4/0xc50 [ 507.173297][T31918] ext4_add_entry+0x2466/0x3e00 [ 507.178146][T31918] ? __kasan_check_write+0x14/0x20 [ 507.183254][T31918] ? ext4_mark_inode_dirty+0x216/0x700 [ 507.188706][T31918] ext4_mkdir+0xd03/0x1450 [ 507.193123][T31918] vfs_mkdir+0x43f/0x610 [ 507.197359][T31918] do_mkdirat+0x1d7/0x320 [ 507.201684][T31918] __x64_sys_mkdir+0x60/0x70 [ 507.206263][T31918] do_syscall_64+0xfe/0x140 [ 507.210761][T31918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.216645][T31918] RIP: 0033:0x458c97 [ 507.220529][T31918] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.240119][T31918] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 507.248520][T31918] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 507.256480][T31918] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 507.264443][T31918] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 00:39:00 executing program 2: [ 507.272405][T31918] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 507.280458][T31918] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'b\\nd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:00 executing program 2: 00:39:01 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 507.481167][T31942] FAULT_INJECTION: forcing a failure. [ 507.481167][T31942] name failslab, interval 1, probability 0, space 0, times 0 [ 507.494453][T31942] CPU: 1 PID: 31942 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 507.502448][T31942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.512500][T31942] Call Trace: [ 507.515792][T31942] dump_stack+0x1d8/0x2f8 [ 507.520116][T31942] should_fail+0x555/0x770 [ 507.524784][T31942] __should_failslab+0x11a/0x160 [ 507.529718][T31942] should_failslab+0x9/0x20 [ 507.534207][T31942] kmem_cache_alloc_node+0x65/0x280 [ 507.539393][T31942] ? create_task_io_context+0x32/0x3e0 [ 507.544840][T31942] create_task_io_context+0x32/0x3e0 [ 507.550114][T31942] ? generic_make_request_checks+0x1401/0x1a00 [ 507.556255][T31942] generic_make_request_checks+0x1411/0x1a00 [ 507.562232][T31942] generic_make_request+0x33/0x980 [ 507.567341][T31942] submit_bio+0x254/0x540 [ 507.571664][T31942] ? guard_bio_eod+0x2a0/0x640 [ 507.576421][T31942] submit_bh_wbc+0x619/0x700 [ 507.581005][T31942] __sync_dirty_buffer+0x1a2/0x2e0 [ 507.586102][T31942] sync_dirty_buffer+0x1a/0x20 [ 507.590855][T31942] __ext4_handle_dirty_metadata+0x154/0x870 [ 507.596733][T31942] ? __ext4_journal_get_create_access+0x42/0x290 [ 507.603052][T31942] ext4_getblk+0x38d/0x460 [ 507.607457][T31942] ext4_bread+0x4a/0x240 [ 507.611692][T31942] ext4_append+0x175/0x310 [ 507.616099][T31942] ext4_mkdir+0x7ad/0x1450 [ 507.620515][T31942] vfs_mkdir+0x43f/0x610 [ 507.624748][T31942] do_mkdirat+0x1d7/0x320 [ 507.629068][T31942] __x64_sys_mkdir+0x60/0x70 [ 507.633642][T31942] do_syscall_64+0xfe/0x140 [ 507.638134][T31942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.644010][T31942] RIP: 0033:0x458c97 [ 507.647896][T31942] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.668371][T31942] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 507.676776][T31942] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 507.684735][T31942] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 507.692696][T31942] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 507.700658][T31942] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 507.708614][T31942] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xc00}}, 0x1c) 00:39:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x3, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:01 executing program 2: 00:39:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bo\nd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:01 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:01 executing program 2: [ 507.947047][T31958] FAULT_INJECTION: forcing a failure. [ 507.947047][T31958] name failslab, interval 1, probability 0, space 0, times 0 00:39:01 executing program 2: 00:39:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x8, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 508.001765][T31958] CPU: 0 PID: 31958 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 508.009790][T31958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.019844][T31958] Call Trace: [ 508.023134][T31958] dump_stack+0x1d8/0x2f8 [ 508.027465][T31958] should_fail+0x555/0x770 [ 508.031887][T31958] __should_failslab+0x11a/0x160 [ 508.036819][T31958] should_failslab+0x9/0x20 [ 508.036836][T31958] kmem_cache_alloc_trace+0x5d/0x2f0 [ 508.046593][T31958] ? smack_d_instantiate+0xabf/0xd70 00:39:01 executing program 2: 00:39:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bo%d0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 508.051867][T31958] smack_d_instantiate+0xabf/0xd70 [ 508.051882][T31958] ? lockdep_init_map+0x2a/0x680 [ 508.051897][T31958] security_d_instantiate+0xa5/0x100 [ 508.067180][T31958] d_instantiate_new+0x65/0x130 [ 508.067191][T31958] ext4_mkdir+0xfa9/0x1450 [ 508.067208][T31958] vfs_mkdir+0x43f/0x610 [ 508.067220][T31958] do_mkdirat+0x1d7/0x320 [ 508.067230][T31958] __x64_sys_mkdir+0x60/0x70 [ 508.067244][T31958] do_syscall_64+0xfe/0x140 [ 508.076472][T31958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.076481][T31958] RIP: 0033:0x458c97 [ 508.076490][T31958] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.076495][T31958] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 508.076503][T31958] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 508.076508][T31958] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 00:39:01 executing program 2: [ 508.076512][T31958] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 508.076517][T31958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 508.076522][T31958] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xd00}}, 0x1c) 00:39:02 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x2) 00:39:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:02 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xe, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bon\n0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 508.882614][T32004] FAULT_INJECTION: forcing a failure. [ 508.882614][T32004] name failslab, interval 1, probability 0, space 0, times 0 [ 508.898583][T32004] CPU: 1 PID: 32004 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 508.906582][T32004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.916636][T32004] Call Trace: [ 508.919926][T32004] dump_stack+0x1d8/0x2f8 [ 508.924258][T32004] should_fail+0x555/0x770 [ 508.928671][T32004] __should_failslab+0x11a/0x160 [ 508.933602][T32004] ? mempool_alloc_slab+0x4d/0x70 [ 508.938620][T32004] should_failslab+0x9/0x20 [ 508.943121][T32004] kmem_cache_alloc+0x56/0x2e0 [ 508.947880][T32004] mempool_alloc_slab+0x4d/0x70 [ 508.952726][T32004] ? mempool_free+0x350/0x350 [ 508.957395][T32004] mempool_alloc+0x104/0x5e0 [ 508.961978][T32004] ? rcu_lock_release+0x4/0x20 [ 508.966732][T32004] ? trace_lock_release+0x135/0x1a0 [ 508.971916][T32004] ? rcu_lock_release+0x4/0x20 [ 508.976675][T32004] bio_alloc_bioset+0x1b0/0x5f0 [ 508.981516][T32004] submit_bh_wbc+0x1d5/0x700 [ 508.986100][T32004] __sync_dirty_buffer+0x1a2/0x2e0 [ 508.991206][T32004] sync_dirty_buffer+0x1a/0x20 [ 508.995957][T32004] __ext4_handle_dirty_metadata+0x154/0x870 [ 509.001846][T32004] ext4_handle_dirty_dirblock+0x32c/0x690 [ 509.007563][T32004] add_dirent_to_buf+0x9d4/0xc50 [ 509.012495][T32004] ext4_add_entry+0x2466/0x3e00 [ 509.017344][T32004] ? __kasan_check_write+0x14/0x20 [ 509.022455][T32004] ? ext4_mark_inode_dirty+0x216/0x700 [ 509.027908][T32004] ext4_mkdir+0xd03/0x1450 [ 509.032325][T32004] vfs_mkdir+0x43f/0x610 [ 509.036557][T32004] do_mkdirat+0x1d7/0x320 [ 509.040875][T32004] __x64_sys_mkdir+0x60/0x70 [ 509.045457][T32004] do_syscall_64+0xfe/0x140 [ 509.049957][T32004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.055838][T32004] RIP: 0033:0x458c97 [ 509.059725][T32004] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:39:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond\n\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 509.079317][T32004] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 509.087718][T32004] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 509.095679][T32004] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 509.103650][T32004] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 509.111610][T32004] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 509.119572][T32004] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x10, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:02 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 509.374071][T32036] FAULT_INJECTION: forcing a failure. [ 509.374071][T32036] name failslab, interval 1, probability 0, space 0, times 0 [ 509.387472][T32036] CPU: 0 PID: 32036 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 509.395461][T32036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.405511][T32036] Call Trace: [ 509.408804][T32036] dump_stack+0x1d8/0x2f8 [ 509.413392][T32036] should_fail+0x555/0x770 [ 509.417800][T32036] __should_failslab+0x11a/0x160 [ 509.422728][T32036] should_failslab+0x9/0x20 [ 509.427224][T32036] kmem_cache_alloc_trace+0x5d/0x2f0 [ 509.432502][T32036] ? smack_d_instantiate+0x732/0xd70 [ 509.437781][T32036] smack_d_instantiate+0x732/0xd70 [ 509.442888][T32036] ? lockdep_init_map+0x2a/0x680 [ 509.447820][T32036] security_d_instantiate+0xa5/0x100 [ 509.453095][T32036] d_instantiate_new+0x65/0x130 [ 509.457936][T32036] ext4_mkdir+0xfa9/0x1450 [ 509.462354][T32036] vfs_mkdir+0x43f/0x610 [ 509.466591][T32036] do_mkdirat+0x1d7/0x320 [ 509.470911][T32036] __x64_sys_mkdir+0x60/0x70 [ 509.475488][T32036] do_syscall_64+0xfe/0x140 [ 509.479983][T32036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.485862][T32036] RIP: 0033:0x458c97 [ 509.489745][T32036] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.509335][T32036] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 509.517733][T32036] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 509.525692][T32036] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 509.533668][T32036] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 509.541637][T32036] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 509.549604][T32036] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xe00}}, 0x1c) 00:39:03 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x14, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond#\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:03 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 510.075335][T32049] FAULT_INJECTION: forcing a failure. [ 510.075335][T32049] name failslab, interval 1, probability 0, space 0, times 0 [ 510.087954][T32049] CPU: 1 PID: 32049 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 510.096015][T32049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.106067][T32049] Call Trace: [ 510.109359][T32049] dump_stack+0x1d8/0x2f8 [ 510.113690][T32049] should_fail+0x555/0x770 [ 510.118111][T32049] __should_failslab+0x11a/0x160 [ 510.123040][T32049] ? __sigqueue_alloc+0x2ce/0x440 [ 510.128059][T32049] should_failslab+0x9/0x20 [ 510.132553][T32049] kmem_cache_alloc+0x56/0x2e0 [ 510.137576][T32049] __sigqueue_alloc+0x2ce/0x440 [ 510.142418][T32049] __send_signal+0x508/0xcd0 [ 510.147001][T32049] send_signal+0x6e0/0x830 [ 510.151412][T32049] force_sig_info_to_task+0x247/0x2e0 [ 510.156779][T32049] force_sig_fault+0xbf/0x130 [ 510.161454][T32049] __bad_area_nosemaphore+0x307/0x470 [ 510.166823][T32049] bad_area+0x6b/0x80 [ 510.170800][T32049] do_user_addr_fault+0xacc/0xaf0 [ 510.175820][T32049] __do_page_fault+0xd3/0x1f0 [ 510.180486][T32049] do_page_fault+0x99/0xb0 [ 510.184899][T32049] page_fault+0x39/0x40 [ 510.189043][T32049] RIP: 0033:0x45347f [ 510.192928][T32049] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 510.212530][T32049] RSP: 002b:00007f06bf5eda88 EFLAGS: 00010283 00:39:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 510.218585][T32049] RAX: 00007f06bf5edb40 RBX: 0000000020000228 RCX: 0000000000000000 [ 510.226546][T32049] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f06bf5edb40 [ 510.234506][T32049] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 510.242471][T32049] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000004 [ 510.250430][T32049] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond%\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:03 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x104, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:03 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) 00:39:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond+\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 510.432675][T32077] FAULT_INJECTION: forcing a failure. [ 510.432675][T32077] name failslab, interval 1, probability 0, space 0, times 0 [ 510.450340][T32077] CPU: 0 PID: 32077 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 510.458346][T32077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.468391][T32077] Call Trace: [ 510.468408][T32077] dump_stack+0x1d8/0x2f8 [ 510.468424][T32077] should_fail+0x555/0x770 [ 510.468436][T32077] __should_failslab+0x11a/0x160 [ 510.468447][T32077] ? kzalloc+0x1f/0x40 [ 510.468457][T32077] should_failslab+0x9/0x20 [ 510.468465][T32077] __kmalloc+0x7a/0x340 [ 510.468475][T32077] kzalloc+0x1f/0x40 [ 510.468484][T32077] smk_parse_smack+0x197/0x230 [ 510.468494][T32077] smk_import_entry+0x27/0x590 [ 510.468505][T32077] smack_d_instantiate+0x78f/0xd70 [ 510.468523][T32077] ? lockdep_init_map+0x2a/0x680 [ 510.476110][T32077] security_d_instantiate+0xa5/0x100 [ 510.476122][T32077] d_instantiate_new+0x65/0x130 [ 510.476132][T32077] ext4_mkdir+0xfa9/0x1450 [ 510.476148][T32077] vfs_mkdir+0x43f/0x610 [ 510.476160][T32077] do_mkdirat+0x1d7/0x320 [ 510.544538][T32077] __x64_sys_mkdir+0x60/0x70 [ 510.549130][T32077] do_syscall_64+0xfe/0x140 [ 510.553629][T32077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.559509][T32077] RIP: 0033:0x458c97 [ 510.563393][T32077] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.582987][T32077] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 510.591393][T32077] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 510.599358][T32077] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 510.607414][T32077] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 510.615475][T32077] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 510.623449][T32077] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0xf00}}, 0x1c) 00:39:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x2603, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) 00:39:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond-\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:04 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x2703, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) unshare(0x8000400) [ 510.980870][T32114] FAULT_INJECTION: forcing a failure. [ 510.980870][T32114] name failslab, interval 1, probability 0, space 0, times 0 00:39:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x02\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 511.047597][T32114] CPU: 1 PID: 32114 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 511.055606][T32114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.065654][T32114] Call Trace: [ 511.068938][T32114] dump_stack+0x1d8/0x2f8 [ 511.068951][T32114] should_fail+0x555/0x770 [ 511.068962][T32114] __should_failslab+0x11a/0x160 [ 511.068974][T32114] ? ksys_mount+0x38/0x100 [ 511.068983][T32114] should_failslab+0x9/0x20 [ 511.068997][T32114] __kmalloc_track_caller+0x79/0x340 [ 511.096777][T32114] strndup_user+0x76/0x130 [ 511.101198][T32114] ksys_mount+0x38/0x100 [ 511.105436][T32114] __x64_sys_mount+0xbf/0xd0 [ 511.110022][T32114] do_syscall_64+0xfe/0x140 [ 511.114520][T32114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.120408][T32114] RIP: 0033:0x45c2ca [ 511.124295][T32114] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:39:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x2803, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 511.143894][T32114] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 511.152293][T32114] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 511.160251][T32114] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 511.168211][T32114] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 511.176172][T32114] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 511.184133][T32114] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x03\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1100}}, 0x1c) 00:39:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4001, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x04\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:05 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4002, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 511.891639][T32162] FAULT_INJECTION: forcing a failure. [ 511.891639][T32162] name failslab, interval 1, probability 0, space 0, times 0 [ 511.934117][T32162] CPU: 1 PID: 32162 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 511.942122][T32162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.952175][T32162] Call Trace: [ 511.955463][T32162] dump_stack+0x1d8/0x2f8 [ 511.959786][T32162] should_fail+0x555/0x770 [ 511.964201][T32162] __should_failslab+0x11a/0x160 [ 511.969130][T32162] ? ksys_mount+0x6a/0x100 [ 511.973538][T32162] should_failslab+0x9/0x20 [ 511.978045][T32162] __kmalloc_track_caller+0x79/0x340 [ 511.983322][T32162] strndup_user+0x76/0x130 [ 511.987731][T32162] ksys_mount+0x6a/0x100 [ 511.991972][T32162] __x64_sys_mount+0xbf/0xd0 [ 511.996557][T32162] do_syscall_64+0xfe/0x140 [ 512.001053][T32162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.006931][T32162] RIP: 0033:0x45c2ca [ 512.010819][T32162] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:39:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4003, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 512.030414][T32162] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 512.038813][T32162] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 512.046776][T32162] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 512.054738][T32162] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 512.062708][T32162] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 512.070675][T32162] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x05\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x7200, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1200}}, 0x1c) 00:39:06 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x7600, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x06\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 512.835695][T32220] FAULT_INJECTION: forcing a failure. [ 512.835695][T32220] name failslab, interval 1, probability 0, space 0, times 0 [ 512.848320][T32220] CPU: 1 PID: 32220 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 512.856285][T32220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.866336][T32220] Call Trace: [ 512.869626][T32220] dump_stack+0x1d8/0x2f8 [ 512.873952][T32220] should_fail+0x555/0x770 [ 512.878372][T32220] __should_failslab+0x11a/0x160 00:39:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x7800, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 512.883308][T32220] ? __sigqueue_alloc+0x2ce/0x440 [ 512.888344][T32220] should_failslab+0x9/0x20 [ 512.892855][T32220] kmem_cache_alloc+0x56/0x2e0 [ 512.897609][T32220] __sigqueue_alloc+0x2ce/0x440 [ 512.902466][T32220] __send_signal+0x508/0xcd0 [ 512.907055][T32220] send_signal+0x6e0/0x830 [ 512.911465][T32220] force_sig_info_to_task+0x247/0x2e0 [ 512.916833][T32220] force_sig_fault+0xbf/0x130 [ 512.921505][T32220] __bad_area_nosemaphore+0x307/0x470 [ 512.926868][T32220] bad_area+0x6b/0x80 [ 512.930846][T32220] do_user_addr_fault+0xacc/0xaf0 [ 512.935870][T32220] __do_page_fault+0xd3/0x1f0 [ 512.940542][T32220] do_page_fault+0x99/0xb0 [ 512.944953][T32220] page_fault+0x39/0x40 [ 512.949100][T32220] RIP: 0033:0x45347f [ 512.952985][T32220] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 512.972582][T32220] RSP: 002b:00007f06bf5eda88 EFLAGS: 00010283 [ 512.978648][T32220] RAX: 00007f06bf5edb40 RBX: 0000000020000228 RCX: 0000000000000000 00:39:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\a\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x7e00, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 512.986620][T32220] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f06bf5edb40 [ 512.994591][T32220] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 513.002560][T32220] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000004 [ 513.010527][T32220] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:06 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x7f00, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1806}}, 0x1c) 00:39:07 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\b\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x8002, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x8003, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 513.727299][T32265] FAULT_INJECTION: forcing a failure. [ 513.727299][T32265] name failslab, interval 1, probability 0, space 0, times 0 [ 513.766775][T32265] CPU: 1 PID: 32265 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 513.774787][T32265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.784845][T32265] Call Trace: [ 513.788140][T32265] dump_stack+0x1d8/0x2f8 [ 513.792466][T32265] should_fail+0x555/0x770 [ 513.796976][T32265] __should_failslab+0x11a/0x160 [ 513.801905][T32265] ? ksys_mount+0x6a/0x100 [ 513.806315][T32265] should_failslab+0x9/0x20 [ 513.810814][T32265] __kmalloc_track_caller+0x79/0x340 [ 513.816098][T32265] strndup_user+0x76/0x130 [ 513.820509][T32265] ksys_mount+0x6a/0x100 [ 513.824749][T32265] __x64_sys_mount+0xbf/0xd0 [ 513.829868][T32265] do_syscall_64+0xfe/0x140 [ 513.834371][T32265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.840253][T32265] RIP: 0033:0x45c2ca [ 513.844163][T32265] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.863755][T32265] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:39:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\t\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 513.872156][T32265] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 513.880124][T32265] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 513.888091][T32265] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 513.896049][T32265] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 513.904012][T32265] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x8100, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:07 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:07 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 514.060443][T32299] FAULT_INJECTION: forcing a failure. [ 514.060443][T32299] name failslab, interval 1, probability 0, space 0, times 0 [ 514.084926][T32299] CPU: 1 PID: 32299 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 514.092938][T32299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.102999][T32299] Call Trace: [ 514.106294][T32299] dump_stack+0x1d8/0x2f8 [ 514.110620][T32299] should_fail+0x555/0x770 [ 514.115031][T32299] __should_failslab+0x11a/0x160 [ 514.119962][T32299] ? getname_kernel+0x59/0x2f0 [ 514.124716][T32299] should_failslab+0x9/0x20 [ 514.129211][T32299] kmem_cache_alloc+0x56/0x2e0 [ 514.133964][T32299] getname_kernel+0x59/0x2f0 [ 514.138545][T32299] kern_path+0x1f/0x40 [ 514.142607][T32299] tomoyo_mount_permission+0x7f1/0xa30 [ 514.148064][T32299] ? kmem_cache_free+0xd8/0xf0 [ 514.152827][T32299] tomoyo_sb_mount+0x35/0x40 [ 514.157408][T32299] security_sb_mount+0x84/0xe0 [ 514.162162][T32299] do_mount+0x107/0x2490 [ 514.166394][T32299] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 514.171924][T32299] ? copy_mount_options+0x5f/0x3c0 [ 514.177023][T32299] ? copy_mount_options+0x308/0x3c0 [ 514.182221][T32299] ksys_mount+0xcc/0x100 [ 514.186455][T32299] __x64_sys_mount+0xbf/0xd0 [ 514.191043][T32299] do_syscall_64+0xfe/0x140 [ 514.195540][T32299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.201419][T32299] RIP: 0033:0x45c2ca [ 514.205303][T32299] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.224897][T32299] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.233312][T32299] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 514.241271][T32299] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 514.249234][T32299] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 514.257192][T32299] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 514.265151][T32299] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1f00}}, 0x1c) 00:39:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xab02, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\n\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:08 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:08 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xac02, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 514.659157][T32317] FAULT_INJECTION: forcing a failure. [ 514.659157][T32317] name failslab, interval 1, probability 0, space 0, times 0 [ 514.696021][T32317] CPU: 1 PID: 32317 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 514.704026][T32317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.704030][T32317] Call Trace: [ 514.704046][T32317] dump_stack+0x1d8/0x2f8 [ 514.704061][T32317] should_fail+0x555/0x770 [ 514.704075][T32317] __should_failslab+0x11a/0x160 [ 514.704086][T32317] ? tomoyo_encode2+0x273/0x5a0 [ 514.704095][T32317] should_failslab+0x9/0x20 [ 514.704104][T32317] __kmalloc+0x7a/0x340 [ 514.704115][T32317] tomoyo_encode2+0x273/0x5a0 [ 514.704127][T32317] tomoyo_encode+0x29/0x40 [ 514.704136][T32317] tomoyo_mount_permission+0x216/0xa30 [ 514.704144][T32317] ? debug_check_no_obj_freed+0x505/0x5b0 [ 514.704159][T32317] ? kmem_cache_free+0xd8/0xf0 [ 514.704178][T32317] tomoyo_sb_mount+0x35/0x40 [ 514.704187][T32317] security_sb_mount+0x84/0xe0 [ 514.704198][T32317] do_mount+0x107/0x2490 [ 514.704206][T32317] ? copy_mount_options+0x25e/0x3c0 [ 514.704217][T32317] ? copy_mount_options+0x308/0x3c0 [ 514.704226][T32317] ksys_mount+0xcc/0x100 [ 514.704236][T32317] __x64_sys_mount+0xbf/0xd0 [ 514.704251][T32317] do_syscall_64+0xfe/0x140 [ 514.721892][T32317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.721902][T32317] RIP: 0033:0x45c2ca [ 514.721912][T32317] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.721916][T32317] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 514.721929][T32317] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca 00:39:08 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xad02, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 514.853972][T32317] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 514.861936][T32317] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 514.869896][T32317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 514.877857][T32317] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\v\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xc000, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x1fff}}, 0x1c) 00:39:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:09 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xc001, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\f\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xc002, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 515.611846][T32370] FAULT_INJECTION: forcing a failure. [ 515.611846][T32370] name failslab, interval 1, probability 0, space 0, times 0 [ 515.628976][T32370] CPU: 0 PID: 32370 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 515.636971][T32370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.636975][T32370] Call Trace: [ 515.636991][T32370] dump_stack+0x1d8/0x2f8 [ 515.637009][T32370] should_fail+0x555/0x770 [ 515.659036][T32370] __should_failslab+0x11a/0x160 [ 515.665464][T32370] ? getname_kernel+0x59/0x2f0 [ 515.670220][T32370] should_failslab+0x9/0x20 [ 515.674711][T32370] kmem_cache_alloc+0x56/0x2e0 [ 515.679473][T32370] getname_kernel+0x59/0x2f0 [ 515.684069][T32370] kern_path+0x1f/0x40 [ 515.688134][T32370] tomoyo_mount_permission+0x7f1/0xa30 [ 515.693597][T32370] ? kmem_cache_free+0xd8/0xf0 [ 515.698365][T32370] tomoyo_sb_mount+0x35/0x40 [ 515.702946][T32370] security_sb_mount+0x84/0xe0 [ 515.707703][T32370] do_mount+0x107/0x2490 [ 515.711937][T32370] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 515.717467][T32370] ? copy_mount_options+0x5f/0x3c0 [ 515.722568][T32370] ? copy_mount_options+0x308/0x3c0 [ 515.727755][T32370] ksys_mount+0xcc/0x100 [ 515.731987][T32370] __x64_sys_mount+0xbf/0xd0 [ 515.736571][T32370] do_syscall_64+0xfe/0x140 [ 515.741066][T32370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.746954][T32370] RIP: 0033:0x45c2ca [ 515.750836][T32370] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 515.770434][T32370] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 515.778844][T32370] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 515.786804][T32370] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 515.794766][T32370] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 515.802729][T32370] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:39:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\r\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 515.810694][T32370] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xc003, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:09 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 516.010041][T32403] FAULT_INJECTION: forcing a failure. [ 516.010041][T32403] name failslab, interval 1, probability 0, space 0, times 0 [ 516.026034][T32403] CPU: 1 PID: 32403 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 516.034036][T32403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.044086][T32403] Call Trace: [ 516.047375][T32403] dump_stack+0x1d8/0x2f8 [ 516.051697][T32403] should_fail+0x555/0x770 [ 516.056110][T32403] __should_failslab+0x11a/0x160 [ 516.061040][T32403] ? getname_kernel+0x59/0x2f0 [ 516.065798][T32403] should_failslab+0x9/0x20 [ 516.070297][T32403] kmem_cache_alloc+0x56/0x2e0 [ 516.075051][T32403] getname_kernel+0x59/0x2f0 [ 516.079635][T32403] kern_path+0x1f/0x40 [ 516.083695][T32403] tomoyo_mount_permission+0x7f1/0xa30 [ 516.089155][T32403] ? kmem_cache_free+0xd8/0xf0 [ 516.093923][T32403] tomoyo_sb_mount+0x35/0x40 [ 516.098508][T32403] security_sb_mount+0x84/0xe0 [ 516.103266][T32403] do_mount+0x107/0x2490 [ 516.107496][T32403] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 516.113028][T32403] ? copy_mount_options+0x5f/0x3c0 [ 516.118128][T32403] ? copy_mount_options+0x308/0x3c0 [ 516.123316][T32403] ksys_mount+0xcc/0x100 [ 516.127550][T32403] __x64_sys_mount+0xbf/0xd0 [ 516.132130][T32403] do_syscall_64+0xfe/0x140 [ 516.136627][T32403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.142508][T32403] RIP: 0033:0x45c2ca [ 516.146394][T32403] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 516.165985][T32403] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 516.174388][T32403] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 516.182347][T32403] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 516.190311][T32403] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 516.198273][T32403] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 516.206235][T32403] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x2000}}, 0x1c) 00:39:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xe403, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x0e\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:10 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xec02, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xf403, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x10\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 516.792213][T32434] FAULT_INJECTION: forcing a failure. [ 516.792213][T32434] name failslab, interval 1, probability 0, space 0, times 0 [ 516.857682][T32434] CPU: 1 PID: 32434 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 516.865715][T32434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.875771][T32434] Call Trace: [ 516.879054][T32434] dump_stack+0x1d8/0x2f8 [ 516.883385][T32434] should_fail+0x555/0x770 [ 516.887800][T32434] __should_failslab+0x11a/0x160 [ 516.892732][T32434] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 516.898444][T32434] should_failslab+0x9/0x20 [ 516.902941][T32434] __kmalloc+0x7a/0x340 [ 516.907093][T32434] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 516.912805][T32434] tomoyo_realpath_from_path+0xdc/0x7c0 [ 516.918346][T32434] tomoyo_mount_permission+0x294/0xa30 [ 516.923803][T32434] ? kmem_cache_free+0xd8/0xf0 [ 516.928574][T32434] tomoyo_sb_mount+0x35/0x40 [ 516.933157][T32434] security_sb_mount+0x84/0xe0 [ 516.937925][T32434] do_mount+0x107/0x2490 [ 516.942156][T32434] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 516.947688][T32434] ? copy_mount_options+0x5f/0x3c0 [ 516.952788][T32434] ? copy_mount_options+0x308/0x3c0 [ 516.957978][T32434] ksys_mount+0xcc/0x100 [ 516.962212][T32434] __x64_sys_mount+0xbf/0xd0 [ 516.966793][T32434] do_syscall_64+0xfe/0x140 [ 516.971291][T32434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.977170][T32434] RIP: 0033:0x45c2ca [ 516.981055][T32434] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.000647][T32434] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.009043][T32434] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 517.017024][T32434] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 517.024985][T32434] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 517.032947][T32434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.040908][T32434] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 517.052720][T32434] ERROR: Out of memory at tomoyo_realpath_from_path. 00:39:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x214e}}, 0x1c) 00:39:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0xf503, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x11\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:11 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x3ffdcf, 0x4, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 517.509710][T32472] FAULT_INJECTION: forcing a failure. [ 517.509710][T32472] name failslab, interval 1, probability 0, space 0, times 0 [ 517.569028][T32472] CPU: 0 PID: 32472 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 517.577039][T32472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.587090][T32472] Call Trace: [ 517.590384][T32472] dump_stack+0x1d8/0x2f8 [ 517.594709][T32472] should_fail+0x555/0x770 [ 517.599127][T32472] __should_failslab+0x11a/0x160 [ 517.604063][T32472] ? tomoyo_encode2+0x273/0x5a0 [ 517.608909][T32472] should_failslab+0x9/0x20 [ 517.613407][T32472] __kmalloc+0x7a/0x340 [ 517.617559][T32472] tomoyo_encode2+0x273/0x5a0 [ 517.622226][T32472] tomoyo_encode+0x29/0x40 [ 517.626641][T32472] tomoyo_mount_permission+0x216/0xa30 [ 517.632090][T32472] ? debug_check_no_obj_freed+0x505/0x5b0 [ 517.637816][T32472] ? kmem_cache_free+0xd8/0xf0 [ 517.642583][T32472] tomoyo_sb_mount+0x35/0x40 [ 517.647161][T32472] security_sb_mount+0x84/0xe0 [ 517.651916][T32472] do_mount+0x107/0x2490 [ 517.656145][T32472] ? copy_mount_options+0x25e/0x3c0 [ 517.662871][T32472] ? copy_mount_options+0x308/0x3c0 [ 517.668149][T32472] ksys_mount+0xcc/0x100 [ 517.672384][T32472] __x64_sys_mount+0xbf/0xd0 [ 517.676968][T32472] do_syscall_64+0xfe/0x140 [ 517.681466][T32472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.687348][T32472] RIP: 0033:0x45c2ca [ 517.691231][T32472] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.710821][T32472] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:39:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x12\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x2, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 517.719220][T32472] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 517.727183][T32472] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 517.735143][T32472] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 517.743100][T32472] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.751058][T32472] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:11 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 517.935892][T32507] FAULT_INJECTION: forcing a failure. [ 517.935892][T32507] name failslab, interval 1, probability 0, space 0, times 0 [ 517.961138][T32507] CPU: 0 PID: 32507 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 517.969148][T32507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.979193][T32507] Call Trace: [ 517.982476][T32507] dump_stack+0x1d8/0x2f8 [ 517.986801][T32507] should_fail+0x555/0x770 [ 517.991209][T32507] __should_failslab+0x11a/0x160 [ 517.996136][T32507] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 518.001846][T32507] should_failslab+0x9/0x20 [ 518.006338][T32507] __kmalloc+0x7a/0x340 [ 518.010486][T32507] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 518.016199][T32507] tomoyo_realpath_from_path+0xdc/0x7c0 [ 518.021738][T32507] tomoyo_mount_permission+0x294/0xa30 [ 518.027186][T32507] ? path_lookupat+0x474/0xb30 [ 518.031945][T32507] ? kmem_cache_free+0xd8/0xf0 [ 518.036709][T32507] tomoyo_sb_mount+0x35/0x40 [ 518.041287][T32507] security_sb_mount+0x84/0xe0 [ 518.046040][T32507] do_mount+0x107/0x2490 [ 518.050268][T32507] ? copy_mount_options+0x25e/0x3c0 [ 518.055454][T32507] ? copy_mount_options+0x308/0x3c0 [ 518.060641][T32507] ksys_mount+0xcc/0x100 [ 518.064874][T32507] __x64_sys_mount+0xbf/0xd0 [ 518.069454][T32507] do_syscall_64+0xfe/0x140 [ 518.073948][T32507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.079832][T32507] RIP: 0033:0x45c2ca [ 518.083713][T32507] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 518.103411][T32507] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 518.111812][T32507] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 518.119771][T32507] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 518.127728][T32507] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 518.135686][T32507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 518.143644][T32507] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 518.161078][T32507] ERROR: Out of memory at tomoyo_realpath_from_path. 00:39:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x2500}}, 0x1c) 00:39:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x3, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x1c\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:11 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x8, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 518.470171][T32531] FAULT_INJECTION: forcing a failure. [ 518.470171][T32531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 518.483409][T32531] CPU: 1 PID: 32531 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 518.483416][T32531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.483418][T32531] Call Trace: [ 518.483441][T32531] dump_stack+0x1d8/0x2f8 [ 518.483454][T32531] should_fail+0x555/0x770 [ 518.483466][T32531] should_fail_alloc_page+0x55/0x60 [ 518.483479][T32531] prepare_alloc_pages+0x283/0x470 [ 518.504772][T32531] __alloc_pages_nodemask+0xb2/0x5d0 [ 518.504786][T32531] ? debug_check_no_obj_freed+0x505/0x5b0 [ 518.534706][T32531] kmem_getpages+0x56/0xa20 [ 518.539189][T32531] ? trace_lock_release+0x135/0x1a0 [ 518.544361][T32531] cache_grow_begin+0x7e/0x2c0 [ 518.549108][T32531] cache_alloc_refill+0x311/0x3f0 [ 518.554106][T32531] ? check_preemption_disabled+0xb7/0x2a0 [ 518.559819][T32531] kmem_cache_alloc+0x2b9/0x2e0 [ 518.564644][T32531] ? getname_kernel+0x59/0x2f0 [ 518.569378][T32531] getname_kernel+0x59/0x2f0 [ 518.573943][T32531] kern_path+0x1f/0x40 [ 518.577999][T32531] tomoyo_mount_permission+0x7f1/0xa30 [ 518.583447][T32531] ? kmem_cache_free+0xd8/0xf0 [ 518.588194][T32531] tomoyo_sb_mount+0x35/0x40 [ 518.592757][T32531] security_sb_mount+0x84/0xe0 [ 518.597495][T32531] do_mount+0x107/0x2490 [ 518.601717][T32531] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 518.610634][T32531] ? copy_mount_options+0x5f/0x3c0 [ 518.617109][T32531] ? copy_mount_options+0x308/0x3c0 [ 518.622282][T32531] ksys_mount+0xcc/0x100 [ 518.626498][T32531] __x64_sys_mount+0xbf/0xd0 [ 518.631077][T32531] do_syscall_64+0xfe/0x140 [ 518.635554][T32531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.641420][T32531] RIP: 0033:0x45c2ca [ 518.645289][T32531] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:39:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xe, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 518.664863][T32531] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 518.673252][T32531] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 518.681199][T32531] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 518.689154][T32531] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 518.697102][T32531] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 518.705049][T32531] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0%\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x10, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:12 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x14, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x2806}}, 0x1c) 00:39:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0H\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:12 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x104, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 519.371475][T32579] FAULT_INJECTION: forcing a failure. [ 519.371475][T32579] name failslab, interval 1, probability 0, space 0, times 0 [ 519.399530][T32579] CPU: 0 PID: 32579 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 519.407537][T32579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.417592][T32579] Call Trace: [ 519.420880][T32579] dump_stack+0x1d8/0x2f8 [ 519.425203][T32579] should_fail+0x555/0x770 [ 519.429630][T32579] __should_failslab+0x11a/0x160 [ 519.434562][T32579] should_failslab+0x9/0x20 [ 519.439061][T32579] kmem_cache_alloc_trace+0x5d/0x2f0 [ 519.444338][T32579] ? alloc_fs_context+0x65/0x5f0 [ 519.449272][T32579] alloc_fs_context+0x65/0x5f0 [ 519.454027][T32579] ? _raw_read_unlock+0x2c/0x50 [ 519.458878][T32579] ? get_fs_type+0x47f/0x500 [ 519.463466][T32579] fs_context_for_mount+0x24/0x30 [ 519.468481][T32579] do_mount+0x1095/0x2490 [ 519.472801][T32579] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 519.478335][T32579] ? copy_mount_options+0x5f/0x3c0 [ 519.483438][T32579] ? copy_mount_options+0x308/0x3c0 [ 519.488629][T32579] ksys_mount+0xcc/0x100 [ 519.492866][T32579] __x64_sys_mount+0xbf/0xd0 [ 519.497450][T32579] do_syscall_64+0xfe/0x140 [ 519.501948][T32579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.507832][T32579] RIP: 0033:0x45c2ca [ 519.511723][T32579] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 519.531320][T32579] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 519.539723][T32579] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 519.547692][T32579] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 519.555653][T32579] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 519.563618][T32579] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:39:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x0) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0L\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x2603, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 519.571580][T32579] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x2703, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x0) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:13 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x2803, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 519.859518][T32621] FAULT_INJECTION: forcing a failure. [ 519.859518][T32621] name failslab, interval 1, probability 0, space 0, times 0 [ 519.878624][T32621] CPU: 1 PID: 32621 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 519.886631][T32621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.896684][T32621] Call Trace: [ 519.899977][T32621] dump_stack+0x1d8/0x2f8 [ 519.904303][T32621] should_fail+0x555/0x770 [ 519.908720][T32621] __should_failslab+0x11a/0x160 [ 519.913657][T32621] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 519.919371][T32621] should_failslab+0x9/0x20 [ 519.923859][T32621] __kmalloc+0x7a/0x340 [ 519.928005][T32621] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 519.933713][T32621] tomoyo_realpath_from_path+0xdc/0x7c0 [ 519.939253][T32621] tomoyo_mount_permission+0x923/0xa30 [ 519.944710][T32621] ? kmem_cache_free+0xd8/0xf0 [ 519.949479][T32621] tomoyo_sb_mount+0x35/0x40 [ 519.954059][T32621] security_sb_mount+0x84/0xe0 [ 519.958809][T32621] do_mount+0x107/0x2490 [ 519.963046][T32621] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 519.968575][T32621] ? copy_mount_options+0x5f/0x3c0 [ 519.973676][T32621] ? copy_mount_options+0x308/0x3c0 [ 519.978864][T32621] ksys_mount+0xcc/0x100 [ 519.983094][T32621] __x64_sys_mount+0xbf/0xd0 [ 519.987672][T32621] do_syscall_64+0xfe/0x140 [ 519.992166][T32621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.998133][T32621] RIP: 0033:0x45c2ca [ 520.002015][T32621] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.021605][T32621] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.030001][T32621] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 520.037960][T32621] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 520.045918][T32621] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 520.053876][T32621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 520.061836][T32621] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 520.116495][T32621] ERROR: Out of memory at tomoyo_realpath_from_path. 00:39:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x2c01}}, 0x1c) 00:39:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\\\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x0) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4001, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:13 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4002, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0`\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 520.343080][T32645] FAULT_INJECTION: forcing a failure. [ 520.343080][T32645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 520.356305][T32645] CPU: 0 PID: 32645 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 520.364275][T32645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.364280][T32645] Call Trace: [ 520.364297][T32645] dump_stack+0x1d8/0x2f8 [ 520.364313][T32645] should_fail+0x555/0x770 [ 520.364326][T32645] should_fail_alloc_page+0x55/0x60 [ 520.364336][T32645] prepare_alloc_pages+0x283/0x470 [ 520.364348][T32645] __alloc_pages_nodemask+0xb2/0x5d0 [ 520.364357][T32645] ? debug_check_no_obj_freed+0x505/0x5b0 [ 520.364372][T32645] kmem_getpages+0x56/0xa20 [ 520.364380][T32645] ? trace_lock_release+0x135/0x1a0 [ 520.364393][T32645] cache_grow_begin+0x7e/0x2c0 [ 520.377719][T32645] cache_alloc_refill+0x311/0x3f0 [ 520.377730][T32645] ? check_preemption_disabled+0xb7/0x2a0 [ 520.377740][T32645] kmem_cache_alloc+0x2b9/0x2e0 [ 520.377749][T32645] ? getname_kernel+0x59/0x2f0 [ 520.377759][T32645] getname_kernel+0x59/0x2f0 [ 520.377767][T32645] kern_path+0x1f/0x40 [ 520.377786][T32645] tomoyo_mount_permission+0x7f1/0xa30 [ 520.456307][T32645] ? kmem_cache_free+0xd8/0xf0 [ 520.461054][T32645] tomoyo_sb_mount+0x35/0x40 [ 520.465614][T32645] security_sb_mount+0x84/0xe0 [ 520.470352][T32645] do_mount+0x107/0x2490 [ 520.474565][T32645] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 520.480080][T32645] ? copy_mount_options+0x5f/0x3c0 [ 520.485168][T32645] ? copy_mount_options+0x308/0x3c0 [ 520.490338][T32645] ksys_mount+0xcc/0x100 [ 520.494553][T32645] __x64_sys_mount+0xbf/0xd0 [ 520.499118][T32645] do_syscall_64+0xfe/0x140 [ 520.503596][T32645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.509460][T32645] RIP: 0033:0x45c2ca [ 520.513328][T32645] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.532923][T32645] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4003, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 520.541310][T32645] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 520.549256][T32645] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 520.557202][T32645] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 520.565156][T32645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 520.573110][T32645] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x3f00}}, 0x1c) 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x7200, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x7600, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0h\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:14 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x7800, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x7e00, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 520.799704][T32690] FAULT_INJECTION: forcing a failure. [ 520.799704][T32690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 520.812935][T32690] CPU: 0 PID: 32690 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 520.820915][T32690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.831867][T32690] Call Trace: [ 520.835166][T32690] dump_stack+0x1d8/0x2f8 [ 520.839511][T32690] should_fail+0x555/0x770 [ 520.843922][T32690] should_fail_alloc_page+0x55/0x60 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x7f00, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 520.843933][T32690] prepare_alloc_pages+0x283/0x470 [ 520.843945][T32690] __alloc_pages_nodemask+0xb2/0x5d0 [ 520.843958][T32690] ? debug_check_no_obj_freed+0x505/0x5b0 [ 520.859506][T32690] kmem_getpages+0x56/0xa20 [ 520.859515][T32690] ? trace_lock_release+0x135/0x1a0 [ 520.859524][T32690] cache_grow_begin+0x7e/0x2c0 [ 520.859535][T32690] cache_alloc_refill+0x311/0x3f0 [ 520.859543][T32690] ? check_preemption_disabled+0xb7/0x2a0 [ 520.859553][T32690] kmem_cache_alloc+0x2b9/0x2e0 [ 520.859567][T32690] ? getname_kernel+0x59/0x2f0 [ 520.899984][T32690] getname_kernel+0x59/0x2f0 [ 520.904585][T32690] kern_path+0x1f/0x40 [ 520.908653][T32690] tomoyo_mount_permission+0x7f1/0xa30 [ 520.914111][T32690] ? kmem_cache_free+0xd8/0xf0 [ 520.914134][T32690] tomoyo_sb_mount+0x35/0x40 [ 520.923449][T32690] security_sb_mount+0x84/0xe0 [ 520.928212][T32690] do_mount+0x107/0x2490 [ 520.932465][T32690] ? copy_mount_options+0x25e/0x3c0 [ 520.932478][T32690] ? copy_mount_options+0x308/0x3c0 [ 520.932488][T32690] ksys_mount+0xcc/0x100 [ 520.932500][T32690] __x64_sys_mount+0xbf/0xd0 [ 520.951655][T32690] do_syscall_64+0xfe/0x140 [ 520.956162][T32690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.962055][T32690] RIP: 0033:0x45c2ca [ 520.965953][T32690] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.985551][T32690] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:39:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x8002, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 520.993957][T32690] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 521.001929][T32690] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 521.009894][T32690] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 521.017856][T32690] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 521.025817][T32690] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x3fff}}, 0x1c) 00:39:15 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0l\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x0) 00:39:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x8003, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x8100, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x0) [ 521.631487][T32742] FAULT_INJECTION: forcing a failure. [ 521.631487][T32742] name failslab, interval 1, probability 0, space 0, times 0 [ 521.670200][T32742] CPU: 1 PID: 32742 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 521.678216][T32742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.688265][T32742] Call Trace: [ 521.691554][T32742] dump_stack+0x1d8/0x2f8 [ 521.695883][T32742] should_fail+0x555/0x770 [ 521.700293][T32742] __should_failslab+0x11a/0x160 [ 521.705224][T32742] ? vfs_parse_fs_string+0xed/0x1a0 [ 521.710414][T32742] should_failslab+0x9/0x20 [ 521.714918][T32742] __kmalloc_track_caller+0x79/0x340 [ 521.720207][T32742] kmemdup_nul+0x2a/0xa0 [ 521.724446][T32742] vfs_parse_fs_string+0xed/0x1a0 [ 521.729476][T32742] vfs_kern_mount+0x77/0x160 [ 521.734056][T32742] btrfs_mount+0x34f/0x18f0 [ 521.738553][T32742] ? legacy_parse_param+0x37b/0x880 [ 521.743741][T32742] ? cap_capable+0x250/0x290 [ 521.748326][T32742] legacy_get_tree+0xf9/0x1a0 [ 521.753000][T32742] ? btrfs_resize_thread_pool+0x290/0x290 [ 521.758705][T32742] vfs_get_tree+0x8f/0x380 [ 521.763119][T32742] do_mount+0x169d/0x2490 [ 521.767440][T32742] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 521.772989][T32742] ? copy_mount_options+0x5f/0x3c0 [ 521.778095][T32742] ? copy_mount_options+0x308/0x3c0 [ 521.783307][T32742] ksys_mount+0xcc/0x100 [ 521.787551][T32742] __x64_sys_mount+0xbf/0xd0 [ 521.792137][T32742] do_syscall_64+0xfe/0x140 [ 521.796635][T32742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.802513][T32742] RIP: 0033:0x45c2ca [ 521.806398][T32742] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:39:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0t\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 521.825994][T32742] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 521.834855][T32742] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 521.842825][T32742] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 521.850794][T32742] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 521.858763][T32742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 521.866727][T32742] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x0) 00:39:15 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xab02, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:15 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 522.015993][ T305] FAULT_INJECTION: forcing a failure. [ 522.015993][ T305] name failslab, interval 1, probability 0, space 0, times 0 [ 522.047666][ T305] CPU: 0 PID: 305 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 522.055498][ T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.065549][ T305] Call Trace: [ 522.068837][ T305] dump_stack+0x1d8/0x2f8 [ 522.068858][ T305] should_fail+0x555/0x770 [ 522.077563][ T305] __should_failslab+0x11a/0x160 [ 522.077575][ T305] ? vfs_parse_fs_string+0xed/0x1a0 [ 522.077586][ T305] should_failslab+0x9/0x20 [ 522.077596][ T305] __kmalloc_track_caller+0x79/0x340 [ 522.077610][ T305] kmemdup_nul+0x2a/0xa0 [ 522.087731][ T305] vfs_parse_fs_string+0xed/0x1a0 [ 522.087747][ T305] vfs_kern_mount+0x77/0x160 [ 522.087757][ T305] btrfs_mount+0x34f/0x18f0 [ 522.087770][ T305] ? legacy_parse_param+0x37b/0x880 [ 522.087783][ T305] ? cap_capable+0x250/0x290 [ 522.087794][ T305] legacy_get_tree+0xf9/0x1a0 [ 522.087801][ T305] ? btrfs_resize_thread_pool+0x290/0x290 [ 522.087813][ T305] vfs_get_tree+0x8f/0x380 [ 522.097562][ T305] do_mount+0x169d/0x2490 [ 522.097573][ T305] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 522.097581][ T305] ? copy_mount_options+0x5f/0x3c0 [ 522.097591][ T305] ? copy_mount_options+0x308/0x3c0 [ 522.097600][ T305] ksys_mount+0xcc/0x100 [ 522.097610][ T305] __x64_sys_mount+0xbf/0xd0 [ 522.097620][ T305] do_syscall_64+0xfe/0x140 [ 522.097632][ T305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.097646][ T305] RIP: 0033:0x45c2ca [ 522.097655][ T305] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 522.097664][ T305] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 522.211652][ T305] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 522.219615][ T305] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 522.227577][ T305] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 522.235540][ T305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 522.243500][ T305] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4000}}, 0x1c) 00:39:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x11) 00:39:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xac02, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0z\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:16 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 522.550222][ T323] FAULT_INJECTION: forcing a failure. [ 522.550222][ T323] name failslab, interval 1, probability 0, space 0, times 0 [ 522.576392][ T323] CPU: 0 PID: 323 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 522.584224][ T323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.594278][ T323] Call Trace: [ 522.597565][ T323] dump_stack+0x1d8/0x2f8 [ 522.601888][ T323] should_fail+0x555/0x770 [ 522.601903][ T323] __should_failslab+0x11a/0x160 [ 522.611235][ T323] ? vfs_parse_fs_string+0xed/0x1a0 [ 522.616436][ T323] should_failslab+0x9/0x20 [ 522.620941][ T323] __kmalloc_track_caller+0x79/0x340 [ 522.626222][ T323] kmemdup_nul+0x2a/0xa0 [ 522.630448][ T323] vfs_parse_fs_string+0xed/0x1a0 [ 522.635453][ T323] do_mount+0x11a6/0x2490 [ 522.639761][ T323] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 522.645278][ T323] ? copy_mount_options+0x5f/0x3c0 [ 522.650385][ T323] ? copy_mount_options+0x308/0x3c0 [ 522.655558][ T323] ksys_mount+0xcc/0x100 [ 522.659772][ T323] __x64_sys_mount+0xbf/0xd0 [ 522.664801][ T323] do_syscall_64+0xfe/0x140 [ 522.669280][ T323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.675142][ T323] RIP: 0033:0x45c2ca [ 522.679009][ T323] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:39:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xad02, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 522.698595][ T323] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 522.706976][ T323] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 522.714920][ T323] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 522.722866][ T323] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 522.730810][ T323] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 522.738754][ T323] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x02\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xc000, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:16 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x40, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f00000001c0)=""/188, &(0x7f0000000280)=0xbc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000040)=@ethtool_link_settings={0x4d, 0x0, 0x4, 0x4416, 0x400, 0x7fff, 0x9, 0xfffffffffffffffa, 0xfffffffffffffff9, 0x18, [0x1, 0x6, 0xfffffffffffffffd, 0xfffffffffffffff9, 0x8, 0x0, 0x23, 0x9], [0x42]}}) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xb, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 00:39:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xc001, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:16 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 522.851228][ T342] device bond_slave_1 entered promiscuous mode [ 522.876457][ T342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 522.898408][ T342] bond0: (slave bond_slave_1): Releasing backup interface [ 522.907486][ T342] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 522.938714][ T342] device bond_slave_1 left promiscuous mode [ 522.969967][ T358] FAULT_INJECTION: forcing a failure. [ 522.969967][ T358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 522.983198][ T358] CPU: 0 PID: 358 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 522.990993][ T358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.001043][ T358] Call Trace: [ 523.004332][ T358] dump_stack+0x1d8/0x2f8 [ 523.008658][ T358] should_fail+0x555/0x770 [ 523.013069][ T358] should_fail_alloc_page+0x55/0x60 [ 523.018256][ T358] prepare_alloc_pages+0x283/0x470 [ 523.018269][ T358] __alloc_pages_nodemask+0xb2/0x5d0 [ 523.018279][ T358] ? trace_lock_release+0x135/0x1a0 [ 523.018291][ T358] ? cache_grow_end+0x143/0x170 [ 523.018309][ T358] kmem_getpages+0x56/0xa20 [ 523.023870][ T351] device bond_slave_1 entered promiscuous mode [ 523.028672][ T358] ? trace_lock_release+0x135/0x1a0 [ 523.028685][ T358] cache_grow_begin+0x7e/0x2c0 [ 523.028694][ T358] cache_alloc_refill+0x311/0x3f0 [ 523.028703][ T358] ? check_preemption_disabled+0xb7/0x2a0 [ 523.028713][ T358] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 523.028723][ T358] ? btrfs_mount_root+0x1b2/0x1050 [ 523.028733][ T358] btrfs_mount_root+0x1b2/0x1050 [ 523.028747][ T358] ? vfs_parse_fs_string+0x13b/0x1a0 [ 523.028754][ T358] ? trace_kfree+0xa0/0x110 [ 523.028763][ T358] legacy_get_tree+0xf9/0x1a0 [ 523.028775][ T358] ? btrfs_control_open+0x40/0x40 [ 523.036708][ T351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 523.038777][ T358] vfs_get_tree+0x8f/0x380 [ 523.038790][ T358] vfs_kern_mount+0xc2/0x160 [ 523.038800][ T358] btrfs_mount+0x34f/0x18f0 [ 523.038817][ T358] ? legacy_parse_param+0x37b/0x880 [ 523.038828][ T358] ? cap_capable+0x250/0x290 [ 523.038839][ T358] legacy_get_tree+0xf9/0x1a0 [ 523.038846][ T358] ? btrfs_resize_thread_pool+0x290/0x290 [ 523.038854][ T358] vfs_get_tree+0x8f/0x380 [ 523.038868][ T358] do_mount+0x169d/0x2490 [ 523.070119][ T358] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 523.080543][ T358] ? copy_mount_options+0x5f/0x3c0 [ 523.080558][ T358] ? copy_mount_options+0x308/0x3c0 [ 523.080568][ T358] ksys_mount+0xcc/0x100 [ 523.080578][ T358] __x64_sys_mount+0xbf/0xd0 [ 523.080588][ T358] do_syscall_64+0xfe/0x140 [ 523.080601][ T358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.080608][ T358] RIP: 0033:0x45c2ca [ 523.080619][ T358] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.095268][ T358] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 523.095277][ T358] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 523.095282][ T358] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 523.095288][ T358] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 523.095292][ T358] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 523.095297][ T358] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4400}}, 0x1c) 00:39:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x9, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) 00:39:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xc002, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x04\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:17 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xc003, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:17 executing program 2 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 523.682267][ T371] bond0: (slave bond_slave_1): Releasing backup interface [ 523.694950][ T371] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 523.716079][ T371] device bond_slave_1 left promiscuous mode 00:39:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xe403, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 523.746698][ T375] FAULT_INJECTION: forcing a failure. [ 523.746698][ T375] name failslab, interval 1, probability 0, space 0, times 0 [ 523.777672][ T375] CPU: 0 PID: 375 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 523.785516][ T375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.795572][ T375] Call Trace: [ 523.798864][ T375] dump_stack+0x1d8/0x2f8 [ 523.803191][ T375] should_fail+0x555/0x770 [ 523.807601][ T375] __should_failslab+0x11a/0x160 [ 523.812536][ T375] ? vfs_parse_fs_string+0xed/0x1a0 [ 523.812548][ T375] should_failslab+0x9/0x20 [ 523.812560][ T375] __kmalloc_track_caller+0x79/0x340 [ 523.812575][ T375] kmemdup_nul+0x2a/0xa0 [ 523.832694][ T375] vfs_parse_fs_string+0xed/0x1a0 [ 523.837702][ T375] do_mount+0x11a6/0x2490 [ 523.842003][ T375] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 523.847520][ T375] ? copy_mount_options+0x5f/0x3c0 [ 523.852604][ T375] ? copy_mount_options+0x308/0x3c0 [ 523.857775][ T375] ksys_mount+0xcc/0x100 [ 523.861996][ T375] __x64_sys_mount+0xbf/0xd0 [ 523.866560][ T375] do_syscall_64+0xfe/0x140 [ 523.871040][ T375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.876905][ T375] RIP: 0033:0x45c2ca [ 523.880772][ T375] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.900348][ T375] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 523.908729][ T375] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 523.916671][ T375] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 523.924621][ T375] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 523.932563][ T375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 523.940506][ T375] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 523.948786][ T380] device bond_slave_1 entered promiscuous mode [ 523.960342][ T387] FAULT_INJECTION: forcing a failure. [ 523.960342][ T387] name failslab, interval 1, probability 0, space 0, times 0 [ 523.962583][ T380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 523.988087][ T371] bond0: (slave bond_slave_1): Releasing backup interface [ 524.007857][ T387] CPU: 1 PID: 387 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 524.015691][ T387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.025736][ T387] Call Trace: [ 524.029203][ T387] dump_stack+0x1d8/0x2f8 [ 524.033533][ T387] should_fail+0x555/0x770 [ 524.037952][ T387] __should_failslab+0x11a/0x160 [ 524.042883][ T387] ? dup_fd+0x71/0xc90 [ 524.046941][ T387] should_failslab+0x9/0x20 [ 524.051436][ T387] kmem_cache_alloc+0x56/0x2e0 [ 524.056189][ T387] dup_fd+0x71/0xc90 [ 524.060072][ T387] ? check_preemption_disabled+0xb7/0x2a0 [ 524.065786][ T387] ksys_unshare+0x39c/0xa00 [ 524.070277][ T387] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 524.075727][ T387] ? trace_hardirqs_off_caller+0x58/0x80 [ 524.081351][ T387] __x64_sys_unshare+0x38/0x40 [ 524.086103][ T387] do_syscall_64+0xfe/0x140 [ 524.090599][ T387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.096480][ T387] RIP: 0033:0x459879 [ 524.100364][ T387] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.119958][ T387] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 524.128359][ T387] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 524.136317][ T387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 524.144278][ T387] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 00:39:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xec02, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 524.152235][ T387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 524.160195][ T387] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 524.175209][ T371] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 00:39:17 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 524.232769][ T371] device bond_slave_1 left promiscuous mode [ 524.327082][ T380] device bond_slave_1 entered promiscuous mode [ 524.334054][ T380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 524.414584][ T403] FAULT_INJECTION: forcing a failure. [ 524.414584][ T403] name failslab, interval 1, probability 0, space 0, times 0 [ 524.430591][ T403] CPU: 1 PID: 403 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 524.438406][ T403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.448452][ T403] Call Trace: [ 524.451739][ T403] dump_stack+0x1d8/0x2f8 [ 524.456060][ T403] should_fail+0x555/0x770 [ 524.460468][ T403] __should_failslab+0x11a/0x160 [ 524.465398][ T403] ? vfs_parse_fs_string+0xed/0x1a0 [ 524.470585][ T403] should_failslab+0x9/0x20 [ 524.475073][ T403] __kmalloc_track_caller+0x79/0x340 [ 524.480348][ T403] kmemdup_nul+0x2a/0xa0 [ 524.484580][ T403] vfs_parse_fs_string+0xed/0x1a0 [ 524.489602][ T403] vfs_kern_mount+0x77/0x160 [ 524.494185][ T403] btrfs_mount+0x34f/0x18f0 [ 524.498682][ T403] ? legacy_parse_param+0x37b/0x880 [ 524.503866][ T403] ? cap_capable+0x250/0x290 [ 524.508446][ T403] legacy_get_tree+0xf9/0x1a0 [ 524.513110][ T403] ? btrfs_resize_thread_pool+0x290/0x290 [ 524.518821][ T403] vfs_get_tree+0x8f/0x380 [ 524.523230][ T403] do_mount+0x169d/0x2490 [ 524.527546][ T403] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 524.533075][ T403] ? copy_mount_options+0x5f/0x3c0 [ 524.538172][ T403] ? copy_mount_options+0x308/0x3c0 [ 524.543372][ T403] ksys_mount+0xcc/0x100 [ 524.547609][ T403] __x64_sys_mount+0xbf/0xd0 [ 524.552192][ T403] do_syscall_64+0xfe/0x140 [ 524.556688][ T403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.562566][ T403] RIP: 0033:0x45c2ca [ 524.566446][ T403] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 524.586038][ T403] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.594436][ T403] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 524.602405][ T403] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 524.610361][ T403] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 524.618321][ T403] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 524.626277][ T403] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4800}}, 0x1c) 00:39:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xf403, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x05\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:18 executing program 2 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:18 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 524.738309][ T410] bond0: (slave bond_slave_1): Releasing backup interface [ 524.745457][ T410] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 524.749228][ T412] FAULT_INJECTION: forcing a failure. [ 524.749228][ T412] name failslab, interval 1, probability 0, space 0, times 0 00:39:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0xf503, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x3ffdcf, 0x2, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 524.796423][ T410] device bond_slave_1 left promiscuous mode [ 524.845509][ T412] CPU: 0 PID: 412 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 524.853344][ T412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.863392][ T412] Call Trace: [ 524.866675][ T412] dump_stack+0x1d8/0x2f8 [ 524.870996][ T412] should_fail+0x555/0x770 [ 524.875401][ T412] __should_failslab+0x11a/0x160 [ 524.880332][ T412] should_failslab+0x9/0x20 [ 524.884825][ T412] kmem_cache_alloc_trace+0x5d/0x2f0 [ 524.890094][ T412] ? alloc_fdtable+0x98/0x290 [ 524.894763][ T412] alloc_fdtable+0x98/0x290 [ 524.899261][ T412] dup_fd+0x94f/0xc90 [ 524.899277][ T412] ksys_unshare+0x39c/0xa00 [ 524.899289][ T412] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 524.899298][ T412] ? trace_hardirqs_off_caller+0x58/0x80 [ 524.899307][ T412] __x64_sys_unshare+0x38/0x40 [ 524.899315][ T412] do_syscall_64+0xfe/0x140 [ 524.899326][ T412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.899335][ T412] RIP: 0033:0x459879 [ 524.899345][ T412] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.899350][ T412] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 524.899358][ T412] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 [ 524.899363][ T412] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 524.899367][ T412] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:39:18 executing program 2 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 524.899377][ T412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 524.905727][ T420] device bond_slave_1 entered promiscuous mode [ 524.907826][ T412] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 00:39:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x3, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 525.040294][ T424] FAULT_INJECTION: forcing a failure. [ 525.040294][ T424] name failslab, interval 1, probability 0, space 0, times 0 [ 525.061056][ T420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 525.076850][ T424] CPU: 1 PID: 424 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 525.084688][ T424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.094736][ T424] Call Trace: [ 525.098024][ T424] dump_stack+0x1d8/0x2f8 [ 525.102363][ T424] should_fail+0x555/0x770 [ 525.106772][ T424] __should_failslab+0x11a/0x160 [ 525.111704][ T424] ? vfs_parse_fs_string+0xed/0x1a0 [ 525.116899][ T424] should_failslab+0x9/0x20 [ 525.121398][ T424] __kmalloc_track_caller+0x79/0x340 [ 525.126680][ T424] kmemdup_nul+0x2a/0xa0 [ 525.126694][ T424] vfs_parse_fs_string+0xed/0x1a0 [ 525.135929][ T424] vfs_kern_mount+0x77/0x160 [ 525.140513][ T424] btrfs_mount+0x34f/0x18f0 [ 525.145007][ T424] ? legacy_parse_param+0x37b/0x880 [ 525.145020][ T424] ? cap_capable+0x250/0x290 [ 525.154771][ T424] legacy_get_tree+0xf9/0x1a0 [ 525.159437][ T424] ? btrfs_resize_thread_pool+0x290/0x290 [ 525.165152][ T424] vfs_get_tree+0x8f/0x380 [ 525.169559][ T424] do_mount+0x169d/0x2490 [ 525.173876][ T424] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 525.179417][ T424] ? copy_mount_options+0x5f/0x3c0 [ 525.179427][ T424] ? copy_mount_options+0x308/0x3c0 [ 525.179437][ T424] ksys_mount+0xcc/0x100 [ 525.179446][ T424] __x64_sys_mount+0xbf/0xd0 [ 525.179460][ T424] do_syscall_64+0xfe/0x140 [ 525.203001][ T424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.208889][ T424] RIP: 0033:0x45c2ca [ 525.212776][ T424] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 525.232367][ T424] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 525.240767][ T424] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 525.248732][ T424] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 525.256690][ T424] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 525.264648][ T424] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 525.272610][ T424] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 525.280906][ T434] bond0: (slave bond_slave_1): Releasing backup interface 00:39:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 525.289207][ T434] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 00:39:18 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 525.353717][ T434] device bond_slave_1 left promiscuous mode [ 525.381899][ T444] FAULT_INJECTION: forcing a failure. [ 525.381899][ T444] name failslab, interval 1, probability 0, space 0, times 0 [ 525.417792][ T444] CPU: 0 PID: 444 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 525.425701][ T444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.435745][ T444] Call Trace: [ 525.439025][ T444] dump_stack+0x1d8/0x2f8 [ 525.443331][ T444] should_fail+0x555/0x770 [ 525.447722][ T444] __should_failslab+0x11a/0x160 [ 525.452632][ T444] should_failslab+0x9/0x20 [ 525.457139][ T444] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 525.462833][ T444] ? __kmalloc_node+0x3c/0x60 [ 525.467489][ T444] __kmalloc_node+0x3c/0x60 [ 525.471967][ T444] kvmalloc_node+0xcc/0x130 [ 525.476441][ T444] alloc_fdtable+0xe3/0x290 [ 525.480918][ T444] dup_fd+0x94f/0xc90 [ 525.484878][ T444] ksys_unshare+0x39c/0xa00 [ 525.489354][ T444] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 525.494786][ T444] ? trace_hardirqs_off_caller+0x58/0x80 [ 525.500392][ T444] __x64_sys_unshare+0x38/0x40 [ 525.505125][ T444] do_syscall_64+0xfe/0x140 [ 525.509602][ T444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.515464][ T444] RIP: 0033:0x459879 [ 525.519337][ T444] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.538916][ T444] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 525.547299][ T444] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 525.555244][ T444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 525.563186][ T444] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 525.571133][ T444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 525.579077][ T444] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 525.645276][ T451] FAULT_INJECTION: forcing a failure. [ 525.645276][ T451] name failslab, interval 1, probability 0, space 0, times 0 [ 525.658977][ T451] CPU: 0 PID: 451 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 525.668290][ T451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.678355][ T451] Call Trace: [ 525.681655][ T451] dump_stack+0x1d8/0x2f8 [ 525.685981][ T451] should_fail+0x555/0x770 [ 525.690401][ T451] __should_failslab+0x11a/0x160 [ 525.695337][ T451] should_failslab+0x9/0x20 [ 525.699838][ T451] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 525.705553][ T451] ? __kmalloc_node+0x3c/0x60 [ 525.710224][ T451] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 525.715674][ T451] __kmalloc_node+0x3c/0x60 [ 525.720170][ T451] kvmalloc_node+0xcc/0x130 [ 525.724668][ T451] btrfs_mount_root+0xe3/0x1050 [ 525.729521][ T451] ? vfs_parse_fs_string+0x13b/0x1a0 [ 525.734795][ T451] ? trace_kfree+0xa0/0x110 [ 525.739289][ T451] legacy_get_tree+0xf9/0x1a0 [ 525.743954][ T451] ? btrfs_control_open+0x40/0x40 [ 525.748965][ T451] vfs_get_tree+0x8f/0x380 [ 525.753371][ T451] vfs_kern_mount+0xc2/0x160 [ 525.757955][ T451] btrfs_mount+0x34f/0x18f0 [ 525.762454][ T451] ? legacy_parse_param+0x37b/0x880 [ 525.767671][ T451] ? cap_capable+0x250/0x290 [ 525.772255][ T451] legacy_get_tree+0xf9/0x1a0 [ 525.776921][ T451] ? btrfs_resize_thread_pool+0x290/0x290 [ 525.782630][ T451] vfs_get_tree+0x8f/0x380 [ 525.787037][ T451] do_mount+0x169d/0x2490 [ 525.791363][ T451] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 525.796896][ T451] ? copy_mount_options+0x5f/0x3c0 [ 525.802000][ T451] ? copy_mount_options+0x308/0x3c0 [ 525.807278][ T451] ksys_mount+0xcc/0x100 [ 525.811515][ T451] __x64_sys_mount+0xbf/0xd0 [ 525.816097][ T451] do_syscall_64+0xfe/0x140 [ 525.820593][ T451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.826473][ T451] RIP: 0033:0x45c2ca [ 525.830358][ T451] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 525.849953][ T451] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 525.858358][ T451] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 525.866321][ T451] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 525.874287][ T451] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 525.882247][ T451] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:39:19 executing program 2 (fault-call:5 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x4, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4c00}}, 0x1c) 00:39:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x06\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 525.890222][ T451] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 525.934074][ T455] device bond_slave_1 entered promiscuous mode [ 525.944563][ T455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 525.966569][ T461] FAULT_INJECTION: forcing a failure. [ 525.966569][ T461] name failslab, interval 1, probability 0, space 0, times 0 [ 525.979334][ T455] bond0: (slave bond_slave_1): Releasing backup interface [ 525.979783][ T461] CPU: 1 PID: 461 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 525.994235][ T461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.004274][ T461] Call Trace: [ 526.007547][ T461] dump_stack+0x1d8/0x2f8 [ 526.011852][ T461] should_fail+0x555/0x770 [ 526.016264][ T461] __should_failslab+0x11a/0x160 [ 526.021177][ T461] should_failslab+0x9/0x20 [ 526.025651][ T461] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 526.031342][ T461] ? __kmalloc_node+0x3c/0x60 [ 526.035989][ T461] __kmalloc_node+0x3c/0x60 [ 526.040463][ T461] kvmalloc_node+0xcc/0x130 [ 526.044951][ T461] alloc_fdtable+0x16c/0x290 [ 526.049516][ T461] dup_fd+0x94f/0xc90 [ 526.053475][ T461] ksys_unshare+0x39c/0xa00 [ 526.057950][ T461] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 526.063377][ T461] ? trace_hardirqs_off_caller+0x58/0x80 [ 526.068984][ T461] __x64_sys_unshare+0x38/0x40 [ 526.073720][ T461] do_syscall_64+0xfe/0x140 [ 526.078211][ T461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.084075][ T461] RIP: 0033:0x459879 [ 526.087943][ T461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.107520][ T461] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 526.115906][ T461] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 [ 526.123850][ T461] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 00:39:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x10, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 526.131797][ T461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.139742][ T461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 526.147686][ T461] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 526.156909][ T455] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 526.222884][ T455] device bond_slave_1 left promiscuous mode 00:39:19 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x13, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:19 executing program 2 (fault-call:5 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 526.282387][ T464] device bond_slave_1 entered promiscuous mode [ 526.306535][ T464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:39:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\a\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x15, 0x0, r0, 0x0, [0x2]}, 0x3c) [ 526.373351][ T481] FAULT_INJECTION: forcing a failure. [ 526.373351][ T481] name failslab, interval 1, probability 0, space 0, times 0 [ 526.391110][ T481] CPU: 0 PID: 481 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 526.398934][ T481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.398938][ T481] Call Trace: [ 526.398954][ T481] dump_stack+0x1d8/0x2f8 [ 526.398968][ T481] should_fail+0x555/0x770 [ 526.398981][ T481] __should_failslab+0x11a/0x160 [ 526.398991][ T481] ? create_new_namespaces+0x35/0x700 [ 526.399002][ T481] should_failslab+0x9/0x20 [ 526.399012][ T481] kmem_cache_alloc+0x56/0x2e0 [ 526.399019][ T481] ? cap_capable+0x250/0x290 [ 526.399034][ T481] create_new_namespaces+0x35/0x700 [ 526.450334][ T481] ? security_capable+0xa2/0xd0 [ 526.455180][ T481] ? ns_capable+0x91/0xf0 [ 526.459504][ T481] unshare_nsproxy_namespaces+0x12a/0x190 [ 526.465213][ T481] ksys_unshare+0x478/0xa00 [ 526.469725][ T481] __x64_sys_unshare+0x38/0x40 [ 526.474496][ T481] do_syscall_64+0xfe/0x140 [ 526.474508][ T481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.474521][ T481] RIP: 0033:0x459879 [ 526.488752][ T481] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.508350][ T481] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 526.508359][ T481] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 [ 526.508363][ T481] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 526.508366][ T481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.508370][ T481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 526.508374][ T481] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 526.560804][ T488] bond0: (slave bond_slave_1): Releasing backup interface 00:39:20 executing program 2 (fault-call:5 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 526.579746][ T488] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 526.581762][ T489] FAULT_INJECTION: forcing a failure. [ 526.581762][ T489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 526.610243][ T489] CPU: 1 PID: 489 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 526.610249][ T489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.610252][ T489] Call Trace: [ 526.610268][ T489] dump_stack+0x1d8/0x2f8 [ 526.610281][ T489] should_fail+0x555/0x770 [ 526.610293][ T489] should_fail_alloc_page+0x55/0x60 [ 526.610301][ T489] prepare_alloc_pages+0x283/0x470 [ 526.610310][ T489] __alloc_pages_nodemask+0xb2/0x5d0 [ 526.610325][ T489] ? trace_lock_release+0x135/0x1a0 [ 526.628152][ T489] ? cache_grow_end+0x143/0x170 [ 526.628165][ T489] kmem_getpages+0x56/0xa20 [ 526.628175][ T489] ? trace_lock_release+0x135/0x1a0 [ 526.628184][ T489] cache_grow_begin+0x7e/0x2c0 [ 526.628200][ T489] cache_alloc_refill+0x311/0x3f0 [ 526.685022][ T489] ? check_preemption_disabled+0xb7/0x2a0 [ 526.690717][ T489] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 526.696075][ T489] ? btrfs_mount_root+0x1b2/0x1050 [ 526.701158][ T489] btrfs_mount_root+0x1b2/0x1050 [ 526.706071][ T489] ? vfs_parse_fs_string+0x13b/0x1a0 [ 526.711328][ T489] ? trace_kfree+0xa0/0x110 [ 526.715803][ T489] legacy_get_tree+0xf9/0x1a0 [ 526.720450][ T489] ? btrfs_control_open+0x40/0x40 [ 526.725446][ T489] vfs_get_tree+0x8f/0x380 [ 526.729834][ T489] vfs_kern_mount+0xc2/0x160 [ 526.734395][ T489] btrfs_mount+0x34f/0x18f0 [ 526.738874][ T489] ? legacy_parse_param+0x37b/0x880 [ 526.744048][ T489] ? cap_capable+0x250/0x290 [ 526.748610][ T489] legacy_get_tree+0xf9/0x1a0 [ 526.753257][ T489] ? btrfs_resize_thread_pool+0x290/0x290 [ 526.758961][ T489] vfs_get_tree+0x8f/0x380 [ 526.763362][ T489] do_mount+0x169d/0x2490 [ 526.767663][ T489] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 526.773179][ T489] ? copy_mount_options+0x5f/0x3c0 [ 526.778276][ T489] ? copy_mount_options+0x308/0x3c0 [ 526.783448][ T489] ksys_mount+0xcc/0x100 [ 526.787664][ T489] __x64_sys_mount+0xbf/0xd0 [ 526.792226][ T489] do_syscall_64+0xfe/0x140 [ 526.796701][ T489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.802566][ T489] RIP: 0033:0x45c2ca [ 526.806442][ T489] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 526.826028][ T489] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 526.835940][ T489] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 526.843888][ T489] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 526.851832][ T489] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 526.859790][ T489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 526.867734][ T489] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 526.876828][ T488] device bond_slave_1 left promiscuous mode 00:39:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x4e21}}, 0x1c) 00:39:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2e, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:20 executing program 1 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 526.981901][ T501] FAULT_INJECTION: forcing a failure. [ 526.981901][ T501] name failslab, interval 1, probability 0, space 0, times 0 [ 527.000342][ T487] device bond_slave_1 entered promiscuous mode [ 527.010809][ T487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 527.022871][ T501] CPU: 1 PID: 501 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 527.030692][ T501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.040743][ T501] Call Trace: [ 527.040760][ T501] dump_stack+0x1d8/0x2f8 [ 527.040775][ T501] should_fail+0x555/0x770 [ 527.040788][ T501] __should_failslab+0x11a/0x160 [ 527.040805][ T501] should_failslab+0x9/0x20 [ 527.048388][ T501] kmem_cache_alloc_trace+0x5d/0x2f0 [ 527.048398][ T501] ? copy_ipcs+0xf2/0x3d0 [ 527.048409][ T501] copy_ipcs+0xf2/0x3d0 [ 527.048417][ T501] ? copy_utsname+0x4f/0x3f0 [ 527.048428][ T501] create_new_namespaces+0x26e/0x700 [ 527.048441][ T501] ? ns_capable+0x91/0xf0 [ 527.057754][ T501] unshare_nsproxy_namespaces+0x12a/0x190 [ 527.057764][ T501] ksys_unshare+0x478/0xa00 [ 527.057779][ T501] __x64_sys_unshare+0x38/0x40 [ 527.057789][ T501] do_syscall_64+0xfe/0x140 [ 527.057799][ T501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.057807][ T501] RIP: 0033:0x459879 [ 527.057820][ T501] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.067548][ T501] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 527.067557][ T501] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 527.067562][ T501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 527.067567][ T501] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 527.067573][ T501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 527.067578][ T501] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 527.192690][ T488] bond0: (slave bond_slave_1): Releasing backup interface [ 527.200871][ T488] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 527.221647][ T488] device bond_slave_1 left promiscuous mode [ 527.229595][ T512] FAULT_INJECTION: forcing a failure. [ 527.229595][ T512] name failslab, interval 1, probability 0, space 0, times 0 [ 527.256782][ T512] CPU: 0 PID: 512 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 527.264610][ T512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.274661][ T512] Call Trace: [ 527.277950][ T512] dump_stack+0x1d8/0x2f8 [ 527.282296][ T512] should_fail+0x555/0x770 [ 527.286709][ T512] __should_failslab+0x11a/0x160 [ 527.291638][ T512] ? getname_kernel+0x59/0x2f0 [ 527.296394][ T512] should_failslab+0x9/0x20 [ 527.300894][ T512] kmem_cache_alloc+0x56/0x2e0 [ 527.305656][ T512] getname_kernel+0x59/0x2f0 [ 527.310243][ T512] kern_path+0x1f/0x40 [ 527.314301][ T512] blkdev_get_by_path+0x71/0x270 [ 527.319237][ T512] btrfs_scan_one_device+0xbd/0x450 [ 527.324422][ T512] ? btrfs_mount_root+0x477/0x1050 [ 527.329524][ T512] ? trace_hardirqs_on+0x74/0x80 [ 527.334457][ T512] btrfs_mount_root+0x4af/0x1050 [ 527.339392][ T512] ? vfs_parse_fs_string+0x13b/0x1a0 [ 527.344669][ T512] ? trace_kfree+0xa0/0x110 [ 527.349164][ T512] legacy_get_tree+0xf9/0x1a0 [ 527.349216][ T511] device bond_slave_1 entered promiscuous mode [ 527.353830][ T512] ? btrfs_control_open+0x40/0x40 [ 527.364969][ T512] vfs_get_tree+0x8f/0x380 [ 527.369389][ T512] vfs_kern_mount+0xc2/0x160 [ 527.373990][ T512] btrfs_mount+0x34f/0x18f0 [ 527.374437][ T511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 527.378492][ T512] ? legacy_parse_param+0x37b/0x880 [ 527.378505][ T512] ? cap_capable+0x250/0x290 [ 527.378516][ T512] legacy_get_tree+0xf9/0x1a0 [ 527.378526][ T512] ? btrfs_resize_thread_pool+0x290/0x290 [ 527.378534][ T512] vfs_get_tree+0x8f/0x380 [ 527.378545][ T512] do_mount+0x169d/0x2490 [ 527.378556][ T512] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 527.378563][ T512] ? copy_mount_options+0x5f/0x3c0 [ 527.378573][ T512] ? copy_mount_options+0x308/0x3c0 [ 527.378582][ T512] ksys_mount+0xcc/0x100 [ 527.378591][ T512] __x64_sys_mount+0xbf/0xd0 [ 527.378605][ T512] do_syscall_64+0xfe/0x140 [ 527.445504][ T512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.451387][ T512] RIP: 0033:0x45c2ca [ 527.455277][ T512] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 527.474871][ T512] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:39:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x5f, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\b\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:21 executing program 2 (fault-call:5 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 527.483271][ T512] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 527.491237][ T512] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 527.499207][ T512] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 527.507205][ T512] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 527.515176][ T512] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:21 executing program 1 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 527.584327][ T521] bond0: (slave bond_slave_1): Releasing backup interface [ 527.606813][ T521] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 527.626763][ T521] device bond_slave_1 left promiscuous mode 00:39:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2b0, 0x0, r0, 0x0, [0x2]}, 0x3c) 00:39:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 527.651461][ T528] FAULT_INJECTION: forcing a failure. [ 527.651461][ T528] name failslab, interval 1, probability 0, space 0, times 0 [ 527.681700][ T529] FAULT_INJECTION: forcing a failure. [ 527.681700][ T529] name failslab, interval 1, probability 0, space 0, times 0 [ 527.694772][ T528] CPU: 1 PID: 528 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 527.702587][ T528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.712633][ T528] Call Trace: [ 527.715917][ T528] dump_stack+0x1d8/0x2f8 [ 527.720249][ T528] should_fail+0x555/0x770 [ 527.724661][ T528] __should_failslab+0x11a/0x160 [ 527.729601][ T528] ? create_new_namespaces+0x35/0x700 [ 527.734961][ T528] should_failslab+0x9/0x20 [ 527.739447][ T528] kmem_cache_alloc+0x56/0x2e0 [ 527.744189][ T528] ? cap_capable+0x250/0x290 [ 527.748753][ T528] create_new_namespaces+0x35/0x700 [ 527.753922][ T528] ? security_capable+0xa2/0xd0 [ 527.758745][ T528] ? ns_capable+0x91/0xf0 [ 527.763045][ T528] unshare_nsproxy_namespaces+0x12a/0x190 [ 527.768736][ T528] ksys_unshare+0x478/0xa00 [ 527.773217][ T528] __x64_sys_unshare+0x38/0x40 [ 527.777952][ T528] do_syscall_64+0xfe/0x140 [ 527.782429][ T528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.788315][ T528] RIP: 0033:0x459879 [ 527.792276][ T528] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.811938][ T528] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 527.820320][ T528] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 527.828748][ T528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 527.836705][ T528] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 527.844658][ T528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 527.852632][ T528] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 527.860729][ T529] CPU: 0 PID: 529 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 527.868537][ T529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.878590][ T529] Call Trace: [ 527.881887][ T529] dump_stack+0x1d8/0x2f8 [ 527.886226][ T529] should_fail+0x555/0x770 [ 527.886242][ T529] __should_failslab+0x11a/0x160 [ 527.895565][ T529] ? mempool_alloc_slab+0x4d/0x70 [ 527.900584][ T529] should_failslab+0x9/0x20 [ 527.900597][ T529] kmem_cache_alloc+0x56/0x2e0 [ 527.900608][ T529] mempool_alloc_slab+0x4d/0x70 [ 527.900615][ T529] ? mempool_free+0x350/0x350 [ 527.900622][ T529] mempool_alloc+0x104/0x5e0 [ 527.900634][ T529] ? __find_get_block+0xd2f/0x10b0 [ 527.900642][ T529] ? __kasan_check_read+0x11/0x20 [ 527.900650][ T529] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 527.900666][ T529] bio_alloc_bioset+0x1b0/0x5f0 [ 527.909900][ T529] ? __find_get_block+0xf8a/0x10b0 00:39:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x6006}}, 0x1c) [ 527.909914][ T529] submit_bh_wbc+0x1d5/0x700 [ 527.909926][ T529] __bread_gfp+0x1ad/0x360 [ 527.909938][ T529] btrfs_read_dev_super+0x8a/0x220 [ 527.909948][ T529] btrfs_get_bdev_and_sb+0x1ec/0x280 [ 527.909958][ T529] open_fs_devices+0x14d/0xb40 [ 527.909966][ T529] ? list_sort+0x5fc/0x860 [ 527.909974][ T529] ? blkdev_put+0x2c8/0x3b0 [ 527.909981][ T529] ? btrfs_open_devices+0x1c0/0x1c0 [ 527.909991][ T529] btrfs_open_devices+0x11d/0x1c0 [ 527.910003][ T529] btrfs_mount_root+0x6ef/0x1050 [ 527.910017][ T529] ? vfs_parse_fs_string+0x13b/0x1a0 [ 527.910032][ T529] ? trace_kfree+0xa0/0x110 [ 527.919524][ T529] legacy_get_tree+0xf9/0x1a0 [ 527.919534][ T529] ? btrfs_control_open+0x40/0x40 [ 527.919544][ T529] vfs_get_tree+0x8f/0x380 [ 527.919556][ T529] vfs_kern_mount+0xc2/0x160 [ 527.919565][ T529] btrfs_mount+0x34f/0x18f0 [ 527.919579][ T529] ? legacy_parse_param+0x37b/0x880 [ 527.919590][ T529] ? cap_capable+0x250/0x290 [ 527.919604][ T529] legacy_get_tree+0xf9/0x1a0 [ 527.939902][ T529] ? btrfs_resize_thread_pool+0x290/0x290 [ 527.939914][ T529] vfs_get_tree+0x8f/0x380 [ 527.939927][ T529] do_mount+0x169d/0x2490 [ 527.939937][ T529] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 527.939945][ T529] ? copy_mount_options+0x5f/0x3c0 [ 527.939957][ T529] ? copy_mount_options+0x308/0x3c0 [ 527.939967][ T529] ksys_mount+0xcc/0x100 [ 527.939978][ T529] __x64_sys_mount+0xbf/0xd0 [ 527.939996][ T529] do_syscall_64+0xfe/0x140 [ 527.949927][ T529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.949937][ T529] RIP: 0033:0x45c2ca [ 527.949947][ T529] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 527.949957][ T529] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 527.958914][ T529] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 527.958919][ T529] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 527.958923][ T529] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 00:39:21 executing program 2 (fault-call:5 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 527.958927][ T529] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 527.958933][ T529] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 527.987626][ T534] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop0 [ 528.184189][ T526] device bond_slave_1 entered promiscuous mode 00:39:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x2, r0, 0x0, [0x2]}, 0x3c) [ 528.198181][ T526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.222703][ T521] bond0: (slave bond_slave_1): Releasing backup interface [ 528.230395][ T521] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 00:39:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x3, r0, 0x0, [0x2]}, 0x3c) 00:39:21 executing program 1 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 528.256610][ T521] device bond_slave_1 left promiscuous mode [ 528.328531][ T551] FAULT_INJECTION: forcing a failure. [ 528.328531][ T551] name failslab, interval 1, probability 0, space 0, times 0 [ 528.364715][ T551] CPU: 0 PID: 551 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 528.364736][ T556] FAULT_INJECTION: forcing a failure. [ 528.364736][ T556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 528.372547][ T551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.395767][ T551] Call Trace: [ 528.399048][ T551] dump_stack+0x1d8/0x2f8 [ 528.403356][ T551] should_fail+0x555/0x770 [ 528.407751][ T551] __should_failslab+0x11a/0x160 [ 528.412673][ T551] should_failslab+0x9/0x20 [ 528.417155][ T551] kmem_cache_alloc_trace+0x5d/0x2f0 [ 528.422415][ T551] ? mqueue_init_fs_context+0x57/0x260 [ 528.427852][ T551] mqueue_init_fs_context+0x57/0x260 [ 528.433117][ T551] alloc_fs_context+0x4e3/0x5f0 [ 528.437952][ T551] fs_context_for_mount+0x24/0x30 [ 528.442954][ T551] mq_init_ns+0x10d/0x3c0 [ 528.447262][ T551] copy_ipcs+0x27f/0x3d0 [ 528.451484][ T551] create_new_namespaces+0x26e/0x700 [ 528.456749][ T551] ? ns_capable+0x91/0xf0 [ 528.461059][ T551] unshare_nsproxy_namespaces+0x12a/0x190 [ 528.466754][ T551] ksys_unshare+0x478/0xa00 [ 528.471239][ T551] __x64_sys_unshare+0x38/0x40 [ 528.475982][ T551] do_syscall_64+0xfe/0x140 [ 528.480465][ T551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.486333][ T551] RIP: 0033:0x459879 [ 528.490209][ T551] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.509790][ T551] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 528.518178][ T551] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 528.526130][ T551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 528.534083][ T551] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 528.542030][ T551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 528.549985][ T551] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 528.557947][ T556] CPU: 1 PID: 556 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 528.565737][ T556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.575782][ T556] Call Trace: [ 528.579065][ T556] dump_stack+0x1d8/0x2f8 [ 528.583389][ T556] should_fail+0x555/0x770 [ 528.587803][ T556] should_fail_alloc_page+0x55/0x60 [ 528.592989][ T556] prepare_alloc_pages+0x283/0x470 [ 528.598122][ T556] __alloc_pages_nodemask+0xb2/0x5d0 [ 528.603400][ T556] ? trace_lock_release+0x135/0x1a0 [ 528.608590][ T556] ? cache_grow_end+0x143/0x170 [ 528.613438][ T556] kmem_getpages+0x56/0xa20 [ 528.617926][ T556] ? trace_lock_release+0x135/0x1a0 [ 528.623112][ T556] cache_grow_begin+0x7e/0x2c0 [ 528.627868][ T556] cache_alloc_refill+0x311/0x3f0 [ 528.632882][ T556] ? check_preemption_disabled+0xb7/0x2a0 [ 528.638594][ T556] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 528.643956][ T556] ? btrfs_mount_root+0x1b2/0x1050 [ 528.649061][ T556] btrfs_mount_root+0x1b2/0x1050 [ 528.653997][ T556] ? vfs_parse_fs_string+0x13b/0x1a0 [ 528.659270][ T556] ? trace_kfree+0xa0/0x110 [ 528.663767][ T556] legacy_get_tree+0xf9/0x1a0 [ 528.668433][ T556] ? btrfs_control_open+0x40/0x40 [ 528.673444][ T556] vfs_get_tree+0x8f/0x380 [ 528.677855][ T556] vfs_kern_mount+0xc2/0x160 [ 528.682435][ T556] btrfs_mount+0x34f/0x18f0 [ 528.686936][ T556] ? legacy_parse_param+0x37b/0x880 [ 528.692125][ T556] ? cap_capable+0x250/0x290 [ 528.696706][ T556] legacy_get_tree+0xf9/0x1a0 [ 528.701370][ T556] ? btrfs_resize_thread_pool+0x290/0x290 [ 528.707075][ T556] vfs_get_tree+0x8f/0x380 [ 528.711484][ T556] do_mount+0x169d/0x2490 [ 528.715804][ T556] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 528.721335][ T556] ? copy_mount_options+0x5f/0x3c0 [ 528.726438][ T556] ? copy_mount_options+0x308/0x3c0 [ 528.731629][ T556] ksys_mount+0xcc/0x100 [ 528.735865][ T556] __x64_sys_mount+0xbf/0xd0 [ 528.740447][ T556] do_syscall_64+0xfe/0x140 [ 528.744943][ T556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.750826][ T556] RIP: 0033:0x45c2ca [ 528.754712][ T556] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 528.774303][ T556] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 528.782703][ T556] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 528.790670][ T556] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 528.798643][ T556] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 528.806611][ T556] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 528.814573][ T556] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x4, r0, 0x0, [0x2]}, 0x3c) 00:39:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\t\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:22 executing program 2 (fault-call:5 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 528.885865][ T526] device bond_slave_1 entered promiscuous mode [ 528.900448][ T526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:39:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x5, r0, 0x0, [0x2]}, 0x3c) 00:39:22 executing program 1 (fault-call:0 fault-nth:86): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 528.971720][ T570] bond0: (slave bond_slave_1): Releasing backup interface [ 529.005968][ T570] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 00:39:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x6800}}, 0x1c) [ 529.045556][ T580] FAULT_INJECTION: forcing a failure. [ 529.045556][ T580] name failslab, interval 1, probability 0, space 0, times 0 [ 529.058599][ T570] device bond_slave_1 left promiscuous mode [ 529.096536][ T581] FAULT_INJECTION: forcing a failure. [ 529.096536][ T581] name failslab, interval 1, probability 0, space 0, times 0 [ 529.117645][ T581] CPU: 0 PID: 581 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 529.125478][ T581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.135531][ T581] Call Trace: [ 529.138822][ T581] dump_stack+0x1d8/0x2f8 [ 529.143150][ T581] should_fail+0x555/0x770 [ 529.147564][ T581] __should_failslab+0x11a/0x160 [ 529.152506][ T581] should_failslab+0x9/0x20 [ 529.157009][ T581] kmem_cache_alloc_trace+0x5d/0x2f0 [ 529.162294][ T581] ? btrfs_mount_root+0x1b2/0x1050 [ 529.162307][ T581] btrfs_mount_root+0x1b2/0x1050 [ 529.162327][ T581] ? vfs_parse_fs_string+0x13b/0x1a0 [ 529.173259][ T584] device bond_slave_1 entered promiscuous mode [ 529.177609][ T581] ? trace_kfree+0xa0/0x110 [ 529.177622][ T581] legacy_get_tree+0xf9/0x1a0 [ 529.177632][ T581] ? btrfs_control_open+0x40/0x40 [ 529.177641][ T581] vfs_get_tree+0x8f/0x380 [ 529.177652][ T581] vfs_kern_mount+0xc2/0x160 [ 529.177660][ T581] btrfs_mount+0x34f/0x18f0 [ 529.177674][ T581] ? legacy_parse_param+0x37b/0x880 [ 529.177688][ T581] ? cap_capable+0x250/0x290 [ 529.193721][ T584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 529.197992][ T581] legacy_get_tree+0xf9/0x1a0 [ 529.198003][ T581] ? btrfs_resize_thread_pool+0x290/0x290 [ 529.198012][ T581] vfs_get_tree+0x8f/0x380 [ 529.198024][ T581] do_mount+0x169d/0x2490 [ 529.198034][ T581] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 529.198041][ T581] ? copy_mount_options+0x5f/0x3c0 [ 529.198050][ T581] ? copy_mount_options+0x308/0x3c0 [ 529.198064][ T581] ksys_mount+0xcc/0x100 [ 529.198077][ T581] __x64_sys_mount+0xbf/0xd0 [ 529.273929][ T581] do_syscall_64+0xfe/0x140 [ 529.278426][ T581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.284305][ T581] RIP: 0033:0x45c2ca [ 529.288198][ T581] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 529.307816][ T581] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 529.316220][ T581] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 529.324187][ T581] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 529.332157][ T581] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 529.340125][ T581] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 529.348091][ T581] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 529.356229][ T580] CPU: 0 PID: 580 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 529.364038][ T580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.374101][ T580] Call Trace: [ 529.377392][ T580] dump_stack+0x1d8/0x2f8 [ 529.381721][ T580] should_fail+0x555/0x770 [ 529.386133][ T580] __should_failslab+0x11a/0x160 [ 529.391078][ T580] should_failslab+0x9/0x20 [ 529.395577][ T580] kmem_cache_alloc_trace+0x5d/0x2f0 [ 529.400852][ T580] ? alloc_super+0x5d/0x740 [ 529.405349][ T580] alloc_super+0x5d/0x740 [ 529.409671][ T580] ? test_single_super+0x10/0x10 [ 529.414600][ T580] sget_fc+0x1ea/0x640 [ 529.418658][ T580] ? kill_litter_super+0xa0/0xa0 [ 529.423587][ T580] ? mqueue_get_tree+0x90/0x90 [ 529.428338][ T580] vfs_get_super+0x6b/0x1b0 [ 529.432833][ T580] mqueue_get_tree+0x89/0x90 [ 529.437412][ T580] vfs_get_tree+0x8f/0x380 [ 529.441818][ T580] ? __kasan_check_write+0x14/0x20 [ 529.446922][ T580] fc_mount+0x1b/0xa0 [ 529.450899][ T580] mq_init_ns+0x2e4/0x3c0 [ 529.455223][ T580] copy_ipcs+0x27f/0x3d0 [ 529.459459][ T580] create_new_namespaces+0x26e/0x700 [ 529.464737][ T580] ? ns_capable+0x91/0xf0 [ 529.469062][ T580] unshare_nsproxy_namespaces+0x12a/0x190 [ 529.474772][ T580] ksys_unshare+0x478/0xa00 [ 529.479270][ T580] __x64_sys_unshare+0x38/0x40 [ 529.484023][ T580] do_syscall_64+0xfe/0x140 [ 529.488525][ T580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.494404][ T580] RIP: 0033:0x459879 [ 529.494414][ T580] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.494419][ T580] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 529.494428][ T580] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 529.494433][ T580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 00:39:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x6, r0, 0x0, [0x2]}, 0x3c) [ 529.494437][ T580] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 529.494446][ T580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 529.517934][ T580] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 529.571977][ T570] bond0: (slave bond_slave_1): Releasing backup interface 00:39:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 529.584473][ T570] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 529.605425][ T570] device bond_slave_1 left promiscuous mode 00:39:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x7, r0, 0x0, [0x2]}, 0x3c) 00:39:23 executing program 1 (fault-call:0 fault-nth:87): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:23 executing program 2 (fault-call:5 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x8, r0, 0x0, [0x2]}, 0x3c) [ 529.773718][ T603] FAULT_INJECTION: forcing a failure. [ 529.773718][ T603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 529.786939][ T603] CPU: 1 PID: 603 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 529.794721][ T603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.804758][ T603] Call Trace: [ 529.808044][ T603] dump_stack+0x1d8/0x2f8 [ 529.812350][ T603] should_fail+0x555/0x770 [ 529.816742][ T603] should_fail_alloc_page+0x55/0x60 [ 529.821914][ T603] prepare_alloc_pages+0x283/0x470 [ 529.826999][ T603] __alloc_pages_nodemask+0xb2/0x5d0 [ 529.832733][ T603] kmem_getpages+0x56/0xa20 [ 529.837210][ T603] ? trace_lock_release+0x135/0x1a0 [ 529.842383][ T603] cache_grow_begin+0x7e/0x2c0 [ 529.847121][ T603] cache_alloc_refill+0x311/0x3f0 [ 529.852117][ T603] ? check_preemption_disabled+0xb7/0x2a0 [ 529.857812][ T603] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 529.863157][ T603] ? btrfs_mount_root+0x12c/0x1050 [ 529.868241][ T603] btrfs_mount_root+0x12c/0x1050 [ 529.873157][ T603] ? vfs_parse_fs_string+0x13b/0x1a0 [ 529.878413][ T603] ? trace_kfree+0xa0/0x110 [ 529.882889][ T603] legacy_get_tree+0xf9/0x1a0 [ 529.887538][ T603] ? btrfs_control_open+0x40/0x40 [ 529.892534][ T603] vfs_get_tree+0x8f/0x380 [ 529.896921][ T603] vfs_kern_mount+0xc2/0x160 [ 529.901482][ T603] btrfs_mount+0x34f/0x18f0 [ 529.905963][ T603] ? legacy_parse_param+0x37b/0x880 [ 529.911133][ T603] ? cap_capable+0x250/0x290 [ 529.915699][ T603] legacy_get_tree+0xf9/0x1a0 [ 529.920349][ T603] ? btrfs_resize_thread_pool+0x290/0x290 [ 529.926039][ T603] vfs_get_tree+0x8f/0x380 [ 529.930431][ T603] do_mount+0x169d/0x2490 [ 529.934733][ T603] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 529.940249][ T603] ? copy_mount_options+0x5f/0x3c0 [ 529.945345][ T603] ? copy_mount_options+0x308/0x3c0 [ 529.950516][ T603] ksys_mount+0xcc/0x100 [ 529.954734][ T603] __x64_sys_mount+0xbf/0xd0 [ 529.959298][ T603] do_syscall_64+0xfe/0x140 [ 529.963776][ T603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.969641][ T603] RIP: 0033:0x45c2ca [ 529.973513][ T603] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 529.993090][ T603] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 530.001475][ T603] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 530.009432][ T603] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 530.017377][ T603] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 530.025323][ T603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 530.033269][ T603] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 530.076651][ T610] FAULT_INJECTION: forcing a failure. [ 530.076651][ T610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 530.089969][ T610] CPU: 1 PID: 610 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 530.097763][ T610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.107811][ T610] Call Trace: [ 530.111100][ T610] dump_stack+0x1d8/0x2f8 [ 530.115425][ T610] should_fail+0x555/0x770 [ 530.119835][ T610] should_fail_alloc_page+0x55/0x60 [ 530.125024][ T610] prepare_alloc_pages+0x283/0x470 [ 530.130128][ T610] __alloc_pages_nodemask+0xb2/0x5d0 [ 530.135413][ T610] ? mqueue_init_fs_context+0x57/0x260 [ 530.140863][ T610] ? alloc_fs_context+0x4e3/0x5f0 [ 530.145878][ T610] ? mq_init_ns+0x10d/0x3c0 [ 530.150375][ T610] kmem_getpages+0x56/0xa20 [ 530.154865][ T610] ? trace_lock_release+0x135/0x1a0 [ 530.160052][ T610] cache_grow_begin+0x7e/0x2c0 [ 530.164810][ T610] cache_alloc_refill+0x311/0x3f0 [ 530.169825][ T610] ? check_preemption_disabled+0xb7/0x2a0 [ 530.175537][ T610] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 530.180897][ T610] ? alloc_super+0x5d/0x740 [ 530.185393][ T610] alloc_super+0x5d/0x740 [ 530.189712][ T610] ? test_single_super+0x10/0x10 [ 530.194633][ T610] sget_fc+0x1ea/0x640 [ 530.198690][ T610] ? kill_litter_super+0xa0/0xa0 [ 530.203621][ T610] ? mqueue_get_tree+0x90/0x90 [ 530.208372][ T610] vfs_get_super+0x6b/0x1b0 [ 530.212867][ T610] mqueue_get_tree+0x89/0x90 [ 530.217448][ T610] vfs_get_tree+0x8f/0x380 [ 530.221850][ T610] ? __kasan_check_write+0x14/0x20 [ 530.226957][ T610] fc_mount+0x1b/0xa0 [ 530.230926][ T610] mq_init_ns+0x2e4/0x3c0 [ 530.235246][ T610] copy_ipcs+0x27f/0x3d0 [ 530.239488][ T610] create_new_namespaces+0x26e/0x700 [ 530.244768][ T610] ? ns_capable+0x91/0xf0 [ 530.249089][ T610] unshare_nsproxy_namespaces+0x12a/0x190 [ 530.254801][ T610] ksys_unshare+0x478/0xa00 [ 530.259317][ T610] __x64_sys_unshare+0x38/0x40 [ 530.264070][ T610] do_syscall_64+0xfe/0x140 [ 530.268567][ T610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.274445][ T610] RIP: 0033:0x459879 [ 530.278329][ T610] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.297920][ T610] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 530.306319][ T610] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 530.314280][ T610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 00:39:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\n\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 530.322246][ T610] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 530.330204][ T610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 530.338165][ T610] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 00:39:23 executing program 2 (fault-call:5 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 530.414383][ T615] device bond_slave_1 entered promiscuous mode [ 530.425692][ T615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:39:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x9, r0, 0x0, [0x2]}, 0x3c) 00:39:24 executing program 1 (fault-call:0 fault-nth:88): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x6c00}}, 0x1c) [ 530.458111][ T615] bond0: (slave bond_slave_1): Releasing backup interface [ 530.475345][ T615] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 530.476433][ T621] FAULT_INJECTION: forcing a failure. [ 530.476433][ T621] name failslab, interval 1, probability 0, space 0, times 0 [ 530.526295][ T621] CPU: 0 PID: 621 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 530.534136][ T621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.534140][ T621] Call Trace: [ 530.534157][ T621] dump_stack+0x1d8/0x2f8 [ 530.534171][ T621] should_fail+0x555/0x770 [ 530.534187][ T621] __should_failslab+0x11a/0x160 [ 530.534199][ T621] should_failslab+0x9/0x20 [ 530.534209][ T621] kmem_cache_alloc_trace+0x5d/0x2f0 [ 530.534219][ T621] ? smack_sb_alloc_security+0x51/0x130 [ 530.534228][ T621] smack_sb_alloc_security+0x51/0x130 [ 530.534237][ T621] security_sb_alloc+0x55/0xb0 [ 530.534246][ T621] alloc_super+0x167/0x740 [ 530.534255][ T621] ? test_single_super+0x10/0x10 [ 530.534261][ T621] sget_fc+0x1ea/0x640 [ 530.534267][ T621] ? kill_litter_super+0xa0/0xa0 [ 530.534276][ T621] ? mqueue_get_tree+0x90/0x90 [ 530.534284][ T621] vfs_get_super+0x6b/0x1b0 [ 530.534292][ T621] mqueue_get_tree+0x89/0x90 [ 530.534300][ T621] vfs_get_tree+0x8f/0x380 [ 530.534308][ T621] ? __kasan_check_write+0x14/0x20 [ 530.534323][ T621] fc_mount+0x1b/0xa0 [ 530.550717][ T615] device bond_slave_1 left promiscuous mode [ 530.551961][ T621] mq_init_ns+0x2e4/0x3c0 [ 530.551972][ T621] copy_ipcs+0x27f/0x3d0 [ 530.551989][ T621] create_new_namespaces+0x26e/0x700 [ 530.561300][ T621] ? ns_capable+0x91/0xf0 [ 530.561312][ T621] unshare_nsproxy_namespaces+0x12a/0x190 [ 530.561321][ T621] ksys_unshare+0x478/0xa00 [ 530.561334][ T621] __x64_sys_unshare+0x38/0x40 [ 530.561345][ T621] do_syscall_64+0xfe/0x140 [ 530.561357][ T621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.561366][ T621] RIP: 0033:0x459879 [ 530.561374][ T621] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.561379][ T621] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 530.561387][ T621] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 00:39:24 executing program 2 (fault-call:5 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 530.561392][ T621] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 530.561396][ T621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 530.561401][ T621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 530.561406][ T621] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 00:39:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xa, r0, 0x0, [0x2]}, 0x3c) [ 530.805171][ T622] device bond_slave_1 entered promiscuous mode [ 530.821616][ T631] FAULT_INJECTION: forcing a failure. [ 530.821616][ T631] name failslab, interval 1, probability 0, space 0, times 0 [ 530.837468][ T622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 530.849639][ T631] CPU: 1 PID: 631 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 530.857451][ T631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.867518][ T631] Call Trace: [ 530.870802][ T631] dump_stack+0x1d8/0x2f8 [ 530.875116][ T631] should_fail+0x555/0x770 [ 530.879518][ T631] __should_failslab+0x11a/0x160 [ 530.884440][ T631] ? btrfs_mount_root+0x2f4/0x1050 [ 530.889525][ T631] should_failslab+0x9/0x20 [ 530.894001][ T631] __kmalloc_track_caller+0x79/0x340 [ 530.899262][ T631] kstrdup+0x34/0x70 [ 530.903139][ T631] btrfs_mount_root+0x2f4/0x1050 [ 530.908053][ T631] ? vfs_parse_fs_string+0x13b/0x1a0 [ 530.913309][ T631] ? trace_kfree+0xa0/0x110 [ 530.917786][ T631] legacy_get_tree+0xf9/0x1a0 [ 530.922439][ T631] ? btrfs_control_open+0x40/0x40 [ 530.927435][ T631] vfs_get_tree+0x8f/0x380 [ 530.931826][ T631] vfs_kern_mount+0xc2/0x160 [ 530.936389][ T631] btrfs_mount+0x34f/0x18f0 [ 530.940870][ T631] ? legacy_parse_param+0x37b/0x880 [ 530.946044][ T631] ? cap_capable+0x250/0x290 [ 530.950609][ T631] legacy_get_tree+0xf9/0x1a0 [ 530.955269][ T631] ? btrfs_resize_thread_pool+0x290/0x290 [ 530.960962][ T631] vfs_get_tree+0x8f/0x380 [ 530.965352][ T631] do_mount+0x169d/0x2490 [ 530.969652][ T631] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 530.975182][ T631] ? copy_mount_options+0x5f/0x3c0 [ 530.980265][ T631] ? copy_mount_options+0x308/0x3c0 [ 530.985435][ T631] ksys_mount+0xcc/0x100 [ 530.989651][ T631] __x64_sys_mount+0xbf/0xd0 [ 530.994216][ T631] do_syscall_64+0xfe/0x140 [ 530.998694][ T631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.004558][ T631] RIP: 0033:0x45c2ca [ 531.008428][ T631] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 531.028006][ T631] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.036405][ T631] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 531.044352][ T631] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 00:39:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\v\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 531.052297][ T631] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 531.060239][ T631] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 531.068182][ T631] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 531.091256][ T637] FAULT_INJECTION: forcing a failure. [ 531.091256][ T637] name failslab, interval 1, probability 0, space 0, times 0 [ 531.137705][ T637] CPU: 1 PID: 637 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 531.145527][ T637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.145531][ T637] Call Trace: [ 531.145549][ T637] dump_stack+0x1d8/0x2f8 [ 531.145564][ T637] should_fail+0x555/0x770 [ 531.158886][ T637] __should_failslab+0x11a/0x160 [ 531.172505][ T637] ? prealloc_shrinker+0x97/0x2e0 [ 531.177522][ T637] should_failslab+0x9/0x20 [ 531.182018][ T637] __kmalloc+0x7a/0x340 [ 531.186166][ T637] prealloc_shrinker+0x97/0x2e0 [ 531.191004][ T637] alloc_super+0x609/0x740 [ 531.195414][ T637] ? test_single_super+0x10/0x10 [ 531.200341][ T637] sget_fc+0x1ea/0x640 [ 531.204404][ T637] ? kill_litter_super+0xa0/0xa0 [ 531.209339][ T637] ? mqueue_get_tree+0x90/0x90 [ 531.214091][ T637] vfs_get_super+0x6b/0x1b0 [ 531.218583][ T637] mqueue_get_tree+0x89/0x90 [ 531.223166][ T637] vfs_get_tree+0x8f/0x380 [ 531.227570][ T637] ? __kasan_check_write+0x14/0x20 [ 531.232673][ T637] fc_mount+0x1b/0xa0 [ 531.236648][ T637] mq_init_ns+0x2e4/0x3c0 [ 531.240969][ T637] copy_ipcs+0x27f/0x3d0 [ 531.245206][ T637] create_new_namespaces+0x26e/0x700 [ 531.250484][ T637] ? ns_capable+0x91/0xf0 [ 531.254813][ T637] unshare_nsproxy_namespaces+0x12a/0x190 [ 531.260525][ T637] ksys_unshare+0x478/0xa00 [ 531.265025][ T637] __x64_sys_unshare+0x38/0x40 [ 531.269776][ T637] do_syscall_64+0xfe/0x140 [ 531.274273][ T637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.280152][ T637] RIP: 0033:0x459879 [ 531.284034][ T637] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.303629][ T637] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 531.312031][ T637] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 [ 531.319993][ T637] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 531.327953][ T637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:39:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:24 executing program 1 (fault-call:0 fault-nth:89): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 531.335910][ T637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 531.343872][ T637] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 531.369843][ T640] bond0: (slave bond_slave_1): Releasing backup interface 00:39:25 executing program 2 (fault-call:5 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) [ 531.422930][ T640] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 531.450399][ T647] FAULT_INJECTION: forcing a failure. [ 531.450399][ T647] name failslab, interval 1, probability 0, space 0, times 0 00:39:25 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xb, r0, 0x0, [0x2]}, 0x3c) [ 531.471994][ T647] CPU: 1 PID: 647 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 531.479825][ T647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.489879][ T647] Call Trace: [ 531.493171][ T647] dump_stack+0x1d8/0x2f8 [ 531.497495][ T647] should_fail+0x555/0x770 [ 531.501912][ T647] __should_failslab+0x11a/0x160 [ 531.506842][ T647] ? mempool_alloc_slab+0x4d/0x70 [ 531.511856][ T647] should_failslab+0x9/0x20 [ 531.516350][ T647] kmem_cache_alloc+0x56/0x2e0 [ 531.521111][ T647] mempool_alloc_slab+0x4d/0x70 [ 531.525954][ T647] ? mempool_free+0x350/0x350 [ 531.530617][ T647] mempool_alloc+0x104/0x5e0 [ 531.535199][ T647] ? trace_lock_release+0x135/0x1a0 [ 531.540393][ T647] ? create_empty_buffers+0x53f/0x5a0 [ 531.545757][ T647] bio_alloc_bioset+0x1b0/0x5f0 [ 531.550601][ T647] ? __kasan_check_read+0x11/0x20 [ 531.555615][ T647] ? do_raw_spin_unlock+0x49/0x260 [ 531.560722][ T647] submit_bh_wbc+0x1d5/0x700 [ 531.565307][ T647] block_read_full_page+0x9de/0xbd0 [ 531.570500][ T647] ? blkdev_direct_IO+0xd0/0xd0 [ 531.575336][ T647] ? lru_cache_add+0x2db/0x3b0 [ 531.580095][ T647] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 531.585543][ T647] blkdev_readpage+0x1c/0x20 [ 531.590124][ T647] do_read_cache_page+0x798/0xcb0 [ 531.595140][ T647] read_cache_page_gfp+0x29/0x30 [ 531.600069][ T647] btrfs_scan_one_device+0x16a/0x450 [ 531.605344][ T647] ? trace_hardirqs_on+0x74/0x80 [ 531.610279][ T647] btrfs_mount_root+0x4af/0x1050 [ 531.615215][ T647] ? vfs_parse_fs_string+0x13b/0x1a0 [ 531.620500][ T647] ? trace_kfree+0xa0/0x110 [ 531.625003][ T647] legacy_get_tree+0xf9/0x1a0 [ 531.629672][ T647] ? btrfs_control_open+0x40/0x40 [ 531.634684][ T647] vfs_get_tree+0x8f/0x380 [ 531.639090][ T647] vfs_kern_mount+0xc2/0x160 [ 531.643669][ T647] btrfs_mount+0x34f/0x18f0 [ 531.648179][ T647] ? legacy_parse_param+0x37b/0x880 [ 531.653374][ T647] ? cap_capable+0x250/0x290 [ 531.657954][ T647] legacy_get_tree+0xf9/0x1a0 [ 531.663403][ T647] ? btrfs_resize_thread_pool+0x290/0x290 [ 531.669113][ T647] vfs_get_tree+0x8f/0x380 [ 531.673522][ T647] do_mount+0x169d/0x2490 [ 531.677842][ T647] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 531.683376][ T647] ? copy_mount_options+0x5f/0x3c0 [ 531.688476][ T647] ? copy_mount_options+0x308/0x3c0 [ 531.693662][ T647] ksys_mount+0xcc/0x100 [ 531.697898][ T647] __x64_sys_mount+0xbf/0xd0 [ 531.702478][ T647] do_syscall_64+0xfe/0x140 [ 531.706974][ T647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.712856][ T647] RIP: 0033:0x45c2ca [ 531.716742][ T647] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 531.736334][ T647] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.744740][ T647] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 531.752700][ T647] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 531.760661][ T647] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 00:39:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x7400}}, 0x1c) [ 531.768620][ T647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 531.776583][ T647] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 531.789229][ T640] device bond_slave_1 left promiscuous mode 00:39:25 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xc, r0, 0x0, [0x2]}, 0x3c) [ 531.818486][ T654] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop0 00:39:25 executing program 1 (fault-call:0 fault-nth:90): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 531.889331][ T665] FAULT_INJECTION: forcing a failure. [ 531.889331][ T665] name failslab, interval 1, probability 0, space 0, times 0 [ 531.912956][ T649] device bond_slave_1 entered promiscuous mode [ 531.917811][ T665] CPU: 1 PID: 665 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 531.926923][ T665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.936971][ T665] Call Trace: [ 531.937814][ T649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 531.940259][ T665] dump_stack+0x1d8/0x2f8 [ 531.940277][ T665] should_fail+0x555/0x770 [ 531.957999][ T665] __should_failslab+0x11a/0x160 [ 531.962927][ T665] ? __list_lru_init+0xbe/0x900 [ 531.967766][ T665] should_failslab+0x9/0x20 [ 531.972257][ T665] __kmalloc+0x7a/0x340 [ 531.976405][ T665] __list_lru_init+0xbe/0x900 [ 531.981080][ T665] ? prealloc_shrinker+0x249/0x2e0 [ 531.986182][ T665] alloc_super+0x635/0x740 [ 531.990598][ T665] ? test_single_super+0x10/0x10 [ 531.995524][ T665] sget_fc+0x1ea/0x640 [ 531.999582][ T665] ? kill_litter_super+0xa0/0xa0 [ 532.004511][ T665] ? mqueue_get_tree+0x90/0x90 [ 532.009264][ T665] vfs_get_super+0x6b/0x1b0 [ 532.013754][ T665] mqueue_get_tree+0x89/0x90 [ 532.018338][ T665] vfs_get_tree+0x8f/0x380 [ 532.022744][ T665] ? __kasan_check_write+0x14/0x20 [ 532.027844][ T665] fc_mount+0x1b/0xa0 [ 532.031825][ T665] mq_init_ns+0x2e4/0x3c0 [ 532.036231][ T665] copy_ipcs+0x27f/0x3d0 [ 532.040463][ T665] create_new_namespaces+0x26e/0x700 [ 532.045739][ T665] ? ns_capable+0x91/0xf0 [ 532.050059][ T665] unshare_nsproxy_namespaces+0x12a/0x190 [ 532.055768][ T665] ksys_unshare+0x478/0xa00 [ 532.060267][ T665] __x64_sys_unshare+0x38/0x40 [ 532.065020][ T665] do_syscall_64+0xfe/0x140 [ 532.069520][ T665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.075400][ T665] RIP: 0033:0x459879 [ 532.079292][ T665] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.098888][ T665] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 532.107292][ T665] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 532.115256][ T665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 532.123220][ T665] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 532.131178][ T665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 532.142267][ T665] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 [ 532.168767][ T649] bond0: (slave bond_slave_1): Releasing backup interface 00:39:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xc0', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 532.185557][ T649] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 532.223575][ T674] FAULT_INJECTION: forcing a failure. [ 532.223575][ T674] name failslab, interval 1, probability 0, space 0, times 0 [ 532.240247][ T649] device bond_slave_1 left promiscuous mode [ 532.240672][ T674] CPU: 1 PID: 674 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 532.253969][ T674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.264017][ T674] Call Trace: [ 532.267304][ T674] dump_stack+0x1d8/0x2f8 [ 532.271632][ T674] should_fail+0x555/0x770 [ 532.276044][ T674] __should_failslab+0x11a/0x160 [ 532.280973][ T674] ? getname_kernel+0x59/0x2f0 [ 532.285725][ T674] should_failslab+0x9/0x20 [ 532.290216][ T674] kmem_cache_alloc+0x56/0x2e0 [ 532.294971][ T674] getname_kernel+0x59/0x2f0 [ 532.299551][ T674] kern_path+0x1f/0x40 [ 532.303608][ T674] blkdev_get_by_path+0x71/0x270 [ 532.308535][ T674] btrfs_scan_one_device+0xbd/0x450 [ 532.313723][ T674] ? btrfs_mount_root+0x477/0x1050 [ 532.318825][ T674] ? trace_hardirqs_on+0x74/0x80 [ 532.323754][ T674] btrfs_mount_root+0x4af/0x1050 [ 532.328688][ T674] ? vfs_parse_fs_string+0x13b/0x1a0 [ 532.333962][ T674] ? trace_kfree+0xa0/0x110 [ 532.338459][ T674] legacy_get_tree+0xf9/0x1a0 [ 532.343125][ T674] ? btrfs_control_open+0x40/0x40 [ 532.348139][ T674] vfs_get_tree+0x8f/0x380 [ 532.352544][ T674] vfs_kern_mount+0xc2/0x160 [ 532.357125][ T674] btrfs_mount+0x34f/0x18f0 [ 532.361622][ T674] ? legacy_parse_param+0x37b/0x880 [ 532.366811][ T674] ? cap_capable+0x250/0x290 [ 532.371395][ T674] legacy_get_tree+0xf9/0x1a0 [ 532.376063][ T674] ? btrfs_resize_thread_pool+0x290/0x290 [ 532.381787][ T674] vfs_get_tree+0x8f/0x380 [ 532.386282][ T674] do_mount+0x169d/0x2490 [ 532.390601][ T674] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 532.396130][ T674] ? copy_mount_options+0x5f/0x3c0 [ 532.401232][ T674] ? copy_mount_options+0x308/0x3c0 [ 532.406419][ T674] ksys_mount+0xcc/0x100 [ 532.410652][ T674] __x64_sys_mount+0xbf/0xd0 [ 532.415241][ T674] do_syscall_64+0xfe/0x140 [ 532.419737][ T674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.425617][ T674] RIP: 0033:0x45c2ca [ 532.429502][ T674] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 532.449265][ T674] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 532.457666][ T674] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 532.465624][ T674] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 532.473581][ T674] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 532.481537][ T674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 00:39:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xd, r0, 0x0, [0x2]}, 0x3c) [ 532.489497][ T674] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 00:39:26 executing program 2 (fault-call:5 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:26 executing program 1 (fault-call:0 fault-nth:91): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 532.551426][ T671] device bond_slave_1 entered promiscuous mode [ 532.577896][ T671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 532.605523][ T686] FAULT_INJECTION: forcing a failure. [ 532.605523][ T686] name failslab, interval 1, probability 0, space 0, times 0 [ 532.618671][ T686] CPU: 1 PID: 686 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #94 [ 532.626481][ T686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.636530][ T686] Call Trace: [ 532.636548][ T686] dump_stack+0x1d8/0x2f8 [ 532.636565][ T686] should_fail+0x555/0x770 [ 532.648541][ T686] __should_failslab+0x11a/0x160 [ 532.653470][ T686] should_failslab+0x9/0x20 [ 532.653480][ T686] kmem_cache_alloc_trace+0x5d/0x2f0 [ 532.653493][ T686] ? __list_lru_init+0x3e3/0x900 [ 532.663239][ T686] __list_lru_init+0x3e3/0x900 [ 532.672891][ T686] alloc_super+0x635/0x740 [ 532.677308][ T686] ? test_single_super+0x10/0x10 [ 532.682232][ T686] sget_fc+0x1ea/0x640 [ 532.686289][ T686] ? kill_litter_super+0xa0/0xa0 [ 532.691218][ T686] ? mqueue_get_tree+0x90/0x90 [ 532.695994][ T686] vfs_get_super+0x6b/0x1b0 [ 532.700490][ T686] mqueue_get_tree+0x89/0x90 [ 532.705071][ T686] vfs_get_tree+0x8f/0x380 [ 532.709478][ T686] ? __kasan_check_write+0x14/0x20 [ 532.714578][ T686] fc_mount+0x1b/0xa0 [ 532.718545][ T686] mq_init_ns+0x2e4/0x3c0 [ 532.718554][ T686] copy_ipcs+0x27f/0x3d0 [ 532.718566][ T686] create_new_namespaces+0x26e/0x700 [ 532.718577][ T686] ? ns_capable+0x91/0xf0 [ 532.718589][ T686] unshare_nsproxy_namespaces+0x12a/0x190 [ 532.742369][ T686] ksys_unshare+0x478/0xa00 [ 532.746869][ T686] __x64_sys_unshare+0x38/0x40 [ 532.751617][ T686] do_syscall_64+0xfe/0x140 [ 532.756107][ T686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.761989][ T686] RIP: 0033:0x459879 [ 532.765873][ T686] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.785464][ T686] RSP: 002b:00007fe5e996dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 532.793862][ T686] RAX: ffffffffffffffda RBX: 00007fe5e996dc90 RCX: 0000000000459879 00:39:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\f\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:39:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 00:39:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xe, r0, 0x0, [0x2]}, 0x3c) [ 532.801819][ T686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 532.809780][ T686] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 532.817738][ T686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e996e6d4 [ 532.825695][ T686] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000005 00:39:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0xf, r0, 0x0, [0x2]}, 0x3c) [ 532.871724][ T692] bond0: (slave bond_slave_1): Releasing backup interface [ 532.883294][ T693] FAULT_INJECTION: forcing a failure. [ 532.883294][ T693] name failslab, interval 1, probability 0, space 0, times 0 [ 532.900838][ T692] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 532.918360][ T693] CPU: 0 PID: 693 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 532.926161][ T693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.936203][ T693] Call Trace: [ 532.939493][ T693] dump_stack+0x1d8/0x2f8 [ 532.943823][ T693] should_fail+0x555/0x770 [ 532.948240][ T693] __should_failslab+0x11a/0x160 [ 532.953182][ T693] should_failslab+0x9/0x20 [ 532.957686][ T693] kmem_cache_alloc_trace+0x5d/0x2f0 [ 532.962963][ T693] ? btrfs_alloc_device+0x78/0x5a0 [ 532.968073][ T693] btrfs_alloc_device+0x78/0x5a0 [ 532.973011][ T693] ? blkdev_put+0x2c8/0x3b0 [ 532.977511][ T693] close_fs_devices+0x4ae/0x910 [ 532.982358][ T693] btrfs_close_devices+0x33/0x130 [ 532.987377][ T693] btrfs_mount_root+0xa9d/0x1050 [ 532.987392][ T693] ? vfs_parse_fs_string+0x13b/0x1a0 [ 532.987405][ T693] ? trace_kfree+0xa0/0x110 [ 533.002060][ T693] legacy_get_tree+0xf9/0x1a0 [ 533.006730][ T693] ? btrfs_control_open+0x40/0x40 [ 533.006743][ T693] vfs_get_tree+0x8f/0x380 [ 533.006760][ T693] vfs_kern_mount+0xc2/0x160 00:39:26 executing program 2 (fault-call:5 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000000) semget$private(0x0, 0x404b, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) unshare(0x8000400) 00:39:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x7a00}}, 0x1c) 00:39:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x10, r0, 0x0, [0x2]}, 0x3c) [ 533.006773][ T693] btrfs_mount+0x34f/0x18f0 [ 533.016165][ T693] ? legacy_parse_param+0x37b/0x880 [ 533.016178][ T693] ? cap_capable+0x250/0x290 [ 533.016189][ T693] legacy_get_tree+0xf9/0x1a0 [ 533.016201][ T693] ? btrfs_resize_thread_pool+0x290/0x290 [ 533.025241][ T693] vfs_get_tree+0x8f/0x380 [ 533.025254][ T693] do_mount+0x169d/0x2490 [ 533.025266][ T693] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 533.025275][ T693] ? copy_mount_options+0x5f/0x3c0 [ 533.025283][ T693] ? copy_mount_options+0x308/0x3c0 [ 533.025295][ T693] ksys_mount+0xcc/0x100 [ 533.036833][ T3907] kobject: 'loop3' (000000001b058719): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 533.039744][ T693] __x64_sys_mount+0xbf/0xd0 [ 533.039763][ T693] do_syscall_64+0xfe/0x140 [ 533.039774][ T693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.039782][ T693] RIP: 0033:0x45c2ca [ 533.039791][ T693] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 533.039795][ T693] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 533.039803][ T693] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 533.039808][ T693] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 533.039813][ T693] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 533.039817][ T693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 533.039823][ T693] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 533.041969][ T693] ------------[ cut here ]------------ [ 533.047763][ T714] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env [ 533.049983][ T693] kernel BUG at fs/btrfs/volumes.c:1275! [ 533.050828][ T693] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 533.056003][ T714] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 533.059847][ T693] CPU: 0 PID: 693 Comm: syz-executor.1 Not tainted 5.3.0-rc6+ #94 [ 533.059852][ T693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.059868][ T693] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 533.059876][ T693] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 fb 17 fb fe e9 56 ff ff ff e8 11 1f c2 fe <0f> 0b e8 0a 1f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 533.059880][ T693] RSP: 0018:ffff888058d1f990 EFLAGS: 00010246 [ 533.059887][ T693] RAX: ffffffff82b16b9f RBX: ffff88809fe1e0e8 RCX: 0000000000040000 [ 533.059891][ T693] RDX: ffffc90006183000 RSI: 000000000003ffff RDI: 0000000000040000 [ 533.059895][ T693] RBP: ffff888058d1fa20 R08: ffffffff82b24018 R09: fffffbfff11204fa [ 533.059900][ T693] R10: fffffbfff11204fa R11: 0000000000000000 R12: dffffc0000000000 [ 533.059905][ T693] R13: ffff88809fe1e0f0 R14: ffff88809fe1e000 R15: ffff88804b009340 [ 533.059912][ T693] FS: 00007f06bf5ee700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 533.059916][ T693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 533.059921][ T693] CR2: 0000555555d90978 CR3: 000000008dd0a000 CR4: 00000000001406f0 [ 533.059929][ T693] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 533.059934][ T693] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 533.059936][ T693] Call Trace: [ 533.059951][ T693] btrfs_close_devices+0x33/0x130 [ 533.059962][ T693] btrfs_mount_root+0xa9d/0x1050 [ 533.059977][ T693] ? vfs_parse_fs_string+0x13b/0x1a0 [ 533.059987][ T693] ? trace_kfree+0xa0/0x110 [ 533.059997][ T693] legacy_get_tree+0xf9/0x1a0 [ 533.060005][ T693] ? btrfs_control_open+0x40/0x40 [ 533.060014][ T693] vfs_get_tree+0x8f/0x380 [ 533.060026][ T693] vfs_kern_mount+0xc2/0x160 [ 533.060034][ T693] btrfs_mount+0x34f/0x18f0 [ 533.060049][ T693] ? legacy_parse_param+0x37b/0x880 [ 533.060060][ T693] ? cap_capable+0x250/0x290 [ 533.060071][ T693] legacy_get_tree+0xf9/0x1a0 [ 533.060084][ T693] ? btrfs_resize_thread_pool+0x290/0x290 [ 533.068290][ T692] device bond_slave_1 left promiscuous mode [ 533.070355][ T693] vfs_get_tree+0x8f/0x380 [ 533.070368][ T693] do_mount+0x169d/0x2490 [ 533.070379][ T693] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 533.070387][ T693] ? copy_mount_options+0x5f/0x3c0 [ 533.070397][ T693] ? copy_mount_options+0x308/0x3c0 [ 533.070406][ T693] ksys_mount+0xcc/0x100 [ 533.070417][ T693] __x64_sys_mount+0xbf/0xd0 [ 533.070427][ T693] do_syscall_64+0xfe/0x140 [ 533.070440][ T693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.070448][ T693] RIP: 0033:0x45c2ca [ 533.070462][ T693] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 533.230440][ T3907] kobject: 'loop2' (00000000650e5f9a): kobject_uevent_env [ 533.248704][ T693] RSP: 002b:00007f06bf5eda88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 533.248715][ T693] RAX: ffffffffffffffda RBX: 00007f06bf5edb40 RCX: 000000000045c2ca [ 533.248720][ T693] RDX: 00007f06bf5edae0 RSI: 0000000020000100 RDI: 00007f06bf5edb00 [ 533.248726][ T693] RBP: 0000000000000001 R08: 00007f06bf5edb40 R09: 00007f06bf5edae0 [ 533.248736][ T693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 533.248742][ T693] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 533.248753][ T693] Modules linked in: [ 533.257248][ T693] ---[ end trace 6d7870d818f3c12a ]--- [ 533.274130][ T3907] kobject: 'loop2' (00000000650e5f9a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 533.282050][ T693] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 533.345256][ T719] FAULT_INJECTION: forcing a failure. [ 533.345256][ T719] name failslab, interval 1, probability 0, space 0, times 0 [ 533.354264][ T693] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 fb 17 fb fe e9 56 ff ff ff e8 11 1f c2 fe <0f> 0b e8 0a 1f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 533.367724][ T714] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env [ 533.372147][ T693] RSP: 0018:ffff888058d1f990 EFLAGS: 00010246 [ 533.380937][ T714] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 533.385249][ T719] CPU: 0 PID: 719 Comm: syz-executor.2 Tainted: G D 5.3.0-rc6+ #94 [ 533.628277][ T719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.638306][ T719] Call Trace: [ 533.641575][ T719] dump_stack+0x1d8/0x2f8 [ 533.645878][ T719] should_fail+0x555/0x770 [ 533.650270][ T719] __should_failslab+0x11a/0x160 [ 533.655179][ T719] should_failslab+0x9/0x20 [ 533.661127][ T719] kmem_cache_alloc_trace+0x5d/0x2f0 [ 533.666386][ T719] ? __list_lru_init+0x3e3/0x900 [ 533.671298][ T719] __list_lru_init+0x3e3/0x900 [ 533.676037][ T719] alloc_super+0x635/0x740 [ 533.680426][ T719] ? test_single_super+0x10/0x10 [ 533.685332][ T719] sget_fc+0x1ea/0x640 [ 533.689370][ T719] ? kill_litter_super+0xa0/0xa0 [ 533.694282][ T719] ? mqueue_get_tree+0x90/0x90 [ 533.699030][ T719] vfs_get_super+0x6b/0x1b0 [ 533.703507][ T719] mqueue_get_tree+0x89/0x90 [ 533.708067][ T719] vfs_get_tree+0x8f/0x380 [ 533.712455][ T719] ? __kasan_check_write+0x14/0x20 [ 533.717553][ T719] fc_mount+0x1b/0xa0 [ 533.721508][ T719] mq_init_ns+0x2e4/0x3c0 [ 533.725810][ T719] copy_ipcs+0x27f/0x3d0 [ 533.730028][ T719] create_new_namespaces+0x26e/0x700 [ 533.735288][ T719] ? ns_capable+0x91/0xf0 [ 533.739591][ T719] unshare_nsproxy_namespaces+0x12a/0x190 [ 533.745281][ T719] ksys_unshare+0x478/0xa00 [ 533.750118][ T719] __x64_sys_unshare+0x38/0x40 [ 533.754863][ T719] do_syscall_64+0xfe/0x140 [ 533.759338][ T719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.765204][ T719] RIP: 0033:0x459879 [ 533.769070][ T719] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.788645][ T719] RSP: 002b:00007fe5e994cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 533.797114][ T719] RAX: ffffffffffffffda RBX: 00007fe5e994cc90 RCX: 0000000000459879 [ 533.805058][ T719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 533.813003][ T719] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 533.820959][ T719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e994d6d4 [ 533.828922][ T719] R13: 00000000004c9041 R14: 00000000004e0210 R15: 0000000000000003 [ 533.844096][ T693] RAX: ffffffff82b16b9f RBX: ffff88809fe1e0e8 RCX: 0000000000040000 [ 533.848678][ T3907] kobject: 'loop1' (00000000a7343187): kobject_uevent_env [ 533.861187][ T701] kobject: 'bonding_slave' (00000000b2f157d4): kobject_add_internal: parent: 'bond_slave_1', set: '' 00:39:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x11, r0, 0x0, [0x2]}, 0x3c) 00:39:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback={0x7f00}}, 0x1c) [ 533.861465][ T3907] kobject: 'loop1' (00000000a7343187): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 533.873305][ T693] RDX: ffffc90006183000 RSI: 000000000003ffff RDI: 0000000000040000 [ 533.885774][ T3907] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env [ 533.895163][ T701] device bond_slave_1 entered promiscuous mode [ 533.910661][ T701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:39:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffffefff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 533.915621][ T3907] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 533.927306][ T724] kobject: 'bonding_slave' (00000000b2f157d4): kobject_cleanup, parent 00000000047f29bb [ 533.934261][ T3907] kobject: 'loop5' (000000007c9b09f3): kobject_uevent_env [ 533.946773][ T724] kobject: 'bonding_slave' (00000000b2f157d4): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 533.949255][ T3907] kobject: 'loop5' (000000007c9b09f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 533.962986][ T693] RBP: ffff888058d1fa20 R08: ffffffff82b24018 R09: fffffbfff11204fa [ 533.976019][ T3907] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env [ 533.981260][ T724] kobject: 'bonding_slave' (00000000b2f157d4): auto cleanup kobject_del [ 533.991847][ T3907] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 533.996630][ T724] kobject: 'bonding_slave': free name [ 534.014577][ T693] R10: fffffbfff11204fa R11: 0000000000000000 R12: dffffc0000000000 [ 534.023537][ T724] bond0: (slave bond_slave_1): Releasing backup interface [ 534.028520][ T3907] kobject: 'loop3' (000000001b058719): kobject_uevent_env [ 534.039205][ T3907] kobject: 'loop3' (000000001b058719): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 534.040256][ T724] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 0a:a0:a7:07:e5:2d - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 534.067731][ T3907] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env 00:39:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000005180)={0xd, 0x4, 0x4, 0x2, 0x12, r0, 0x0, [0x2]}, 0x3c) [ 534.069991][ T693] R13: ffff88809fe1e0f0 R14: ffff88809fe1e000 R15: ffff88804b009340 [ 534.076826][ T3907] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 534.084535][ T693] FS: 00007f06bf5ee700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 534.105456][ T693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 534.105718][ T724] device bond_slave_1 left promiscuous mode [ 534.118291][ T693] CR2: 00007ffe496c6fa8 CR3: 000000008dd0a000 CR4: 00000000001406e0 [ 534.126621][ T693] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 534.132408][ T734] kobject: 'loop0' (0000000022b30e8d): kobject_uevent_env [ 534.139689][ T693] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 534.153534][ T734] kobject: 'loop0' (0000000022b30e8d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 534.162839][ T693] Kernel panic - not syncing: Fatal exception [ 534.170916][ T693] Kernel Offset: disabled [ 534.175253][ T693] Rebooting in 86400 seconds..