, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:38:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf0}, 0x0) 05:38:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1274, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:38:53 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) fallocate(r2, 0x3, 0x0, 0x4f) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:39:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x300}, 0x0) 05:39:08 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x292e9) 05:39:08 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r3) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) name_to_handle_at(r5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x1, 0x5, 0x3}}, &(0x7f0000000140), 0x0) 05:39:08 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x7) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:39:08 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x227d, 0x0) 05:39:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:08 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x227e, 0x0) 05:39:08 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1276, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x500}, 0x0) 05:39:08 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x292e9) 05:39:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0x0) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:39:23 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x227f, 0x0) 05:39:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:39:23 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2201, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x600}, 0x0) 05:39:23 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x292e9) 05:39:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7c02, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2282, 0x0) 05:39:23 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, 0x0, 0x0) 05:39:23 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2202, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x700}, 0x0) 05:39:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:39:23 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, 0x0, 0x0) 05:39:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:23 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2203, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:38 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2283, 0x0) 05:39:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:39:38 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, 0x0, 0x0) 05:39:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x900}, 0x0) 05:39:38 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2205, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:38 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) stat(&(0x7f0000001280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, r2}}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq}, {@measure}]}}) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)={{0x2, r4, r3, r2, 0xee00, 0x8e, 0x6}, 0xd590, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}) keyctl$chown(0x4, r0, 0x0, r3) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000280)=ANY=[@ANYBLOB="d238c876dfe0ad06e02345680bbda91c10e5a9778c5709ce32f28d1bc1699a3b9bfbaf8bc221821f8120ab7c7ac6ec176ae8ca8f653dc7874c6c725b1621e9ab957c69f7b3", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='./file0\x00']) fallocate(r6, 0x20, 0xffffffffffff8b4b, 0x100000001) 05:39:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:54 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000040)=0x3, 0x7f, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, 0x2) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:39:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:54 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080), 0x0) 05:39:54 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2284, 0x0) 05:39:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x12) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:39:54 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2271, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf00}, 0x0) 05:39:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:54 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2272, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:39:54 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2285, 0x0) 05:39:54 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080), 0x0) 05:39:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xd100}, 0x0) 05:39:54 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:39:54 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000580)='rxrpc_s\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="719921d14954c413d765daf55574eed94142ffec6b9e68e2063dc60e79ac13f9df0a737ecfd529bc751c0b21c56b874bb477619783b56b56d6d0953c4bb33da813e66ab4ab6bdec1d478cae248c695e1f53a9fa5a48c7f93bc42b56ee0461d28a5bb0630976b7e5d8ecf0e514569b0a508e83707f895b054745017c1c7bd41d38dc858affbf6060288e3e04569b2a1c8cb21d67850303eb90be72b0d26173c28afe7241eb8381d149174b82cf9e096ddb4fabdd86eea", 0xb6, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be522d7223f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0ff62f8aea6000", 0x803}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$chown(0x4, r1, 0xee00, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffff9c, 0xc0506617, &(0x7f00000004c0)={@desc={0x1, 0x0, @desc3}, 0x40, r0, '\x00', @b}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) r4 = add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={'\x00', 0x0, 0x1, 0x8}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000200)={r5, 0x61, 0xe3}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d726d643136302d67656e000000000000000000000000000000000000000000000000000000000000000000000000000000000031d124c64e2b51148433c70ac9aabce1325a84c3c9248b76ea7aad7d46f1995513f64a6119358cdecc06244b390888453aa278884ee0092dd7b62779480000000000000000"], &(0x7f00000002c0)="91de3c7d0523a05c52f5db5b9906ace8e09066e5e7560ad527ef49c1938004883af83a4e59250040af64f4a9a5c7c66410841990c02de4a114517abf9a7486f3a3b00628b7f8c798eade15f64417ceeff3016d1d7628178bdf0c112ebb84915c6d", &(0x7f0000000340)=""/227) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) 05:40:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf000}, 0x0) 05:40:09 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x18) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:09 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2276, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:09 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080), 0x0) 05:40:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x300}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:09 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2286, 0x0) 05:40:09 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2279, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x30000}, 0x0) 05:40:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:09 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2287, 0x0) 05:40:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:09 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x34000}, 0x0) 05:40:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x80000}, 0x0) 05:40:23 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2288, 0x0) 05:40:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x24) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:23 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:23 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000040)=0x3, 0x7f, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, 0x2) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:40:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:23 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) fallocate(r2, 0x3, 0x0, 0x4f) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:40:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x80000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:24 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2289, 0x0) 05:40:24 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000040)=0x3, 0x7f, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, 0x2) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:40:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x400300}, 0x0) 05:40:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2e) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:24 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:24 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) 05:40:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x400001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf0ffff}, 0x0) 05:40:24 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) 05:40:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:37 executing program 4: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) 05:40:37 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000040)=0x3, 0x7f, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x1000)=nil, 0x2) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x10) add_key$keyring(&(0x7f0000002440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:40:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:37 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x64) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x1000000}, 0x0) 05:40:37 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) 05:40:37 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1004000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8e) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 05:40:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5382, 0x0) 05:40:53 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 1) 05:40:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x2000000}, 0x0) 05:40:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 2530.894365] FAULT_INJECTION: forcing a failure. [ 2530.894365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2530.895925] CPU: 0 PID: 26846 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2530.896931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.897915] Call Trace: [ 2530.898238] [ 2530.898535] dump_stack_lvl+0xc1/0xf0 [ 2530.899038] should_fail_ex+0x4b4/0x5b0 [ 2530.899565] _copy_from_user+0x2e/0x180 [ 2530.900091] perf_copy_attr+0x123/0x9c0 [ 2530.900628] __do_sys_perf_event_open+0xc0/0x2a60 [ 2530.901233] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2530.901848] ? receive_fd+0xa3/0x110 [ 2530.902336] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2530.902994] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2530.903684] ? ksys_write+0x1a7/0x260 [ 2530.904194] ? rcu_read_lock_sched_held+0x42/0x80 [ 2530.904813] do_syscall_64+0x3f/0x90 [ 2530.905301] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2530.905946] RIP: 0033:0x7f27118bfb19 [ 2530.906411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2530.908518] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2530.909489] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2530.910338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2530.911194] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.912044] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2530.912911] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2530.913781] [ 2530.961412] FAULT_INJECTION: forcing a failure. [ 2530.961412] name failslab, interval 1, probability 0, space 0, times 0 [ 2530.964318] CPU: 1 PID: 26852 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2530.965327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2530.966337] Call Trace: [ 2530.966661] [ 2530.966962] dump_stack_lvl+0xc1/0xf0 [ 2530.967469] should_fail_ex+0x4b4/0x5b0 [ 2530.967988] ? jbd2__journal_start+0x194/0x6b0 [ 2530.968588] should_failslab+0x9/0x20 [ 2530.969070] kmem_cache_alloc+0x5a/0x320 [ 2530.969599] jbd2__journal_start+0x194/0x6b0 [ 2530.970180] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2530.970782] ? ext4_dirty_inode+0xa5/0x130 [ 2530.971321] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2530.971904] ext4_dirty_inode+0xa5/0x130 [ 2530.972421] __mark_inode_dirty+0x1aa/0xee0 [ 2530.972990] generic_update_time+0x21b/0x2b0 [ 2530.973565] file_modified_flags+0x2d4/0x330 [ 2530.974139] ? __pfx_file_modified_flags+0x10/0x10 [ 2530.974777] ext4_buffered_write_iter+0xf9/0x460 [ 2530.975377] ext4_file_write_iter+0x3ff/0x1930 [ 2530.975951] ? lock_acquire.part.0+0x10f/0x320 [ 2530.976571] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2530.977181] ? trace_lock_acquire+0x170/0x1e0 [ 2530.977758] ? ksys_write+0x12b/0x260 [ 2530.978246] ? lock_is_held_type+0x9f/0x120 [ 2530.978794] vfs_write+0x9b4/0xdc0 [ 2530.979270] ? __pfx_vfs_write+0x10/0x10 [ 2530.979789] ? __pfx___fget_files+0x10/0x10 [ 2530.980339] ? __fget_files+0x270/0x480 [ 2530.980880] ksys_write+0x12b/0x260 [ 2530.981363] ? __pfx_ksys_write+0x10/0x10 [ 2530.981913] ? rcu_read_lock_sched_held+0x42/0x80 [ 2530.982523] do_syscall_64+0x3f/0x90 [ 2530.983004] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2530.983638] RIP: 0033:0x7fd00c11db19 [ 2530.984092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2530.986220] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2530.987139] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2530.987989] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2530.988855] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2530.989704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2530.990545] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2530.991429] 05:40:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x27cffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) 05:40:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x3000000}, 0x0) 05:40:53 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5385, 0x0) [ 2531.130101] FAULT_INJECTION: forcing a failure. [ 2531.130101] name failslab, interval 1, probability 0, space 0, times 0 [ 2531.131588] CPU: 0 PID: 26962 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2531.132593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.133592] Call Trace: [ 2531.133923] [ 2531.134213] dump_stack_lvl+0xc1/0xf0 [ 2531.134722] should_fail_ex+0x4b4/0x5b0 [ 2531.135239] ? perf_event_alloc.part.0+0xc2/0x3990 [ 2531.135878] should_failslab+0x9/0x20 [ 2531.136368] kmem_cache_alloc_node+0x5d/0x330 [ 2531.137034] perf_event_alloc.part.0+0xc2/0x3990 [ 2531.137717] ? __pfx_lock_release+0x10/0x10 [ 2531.138332] ? trace_lock_acquire+0x170/0x1e0 [ 2531.138961] ? _raw_spin_unlock+0x1e/0x40 [ 2531.139549] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2531.140252] ? lock_acquire+0x32/0xc0 [ 2531.140811] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2531.141472] __do_sys_perf_event_open+0x4d3/0x2a60 [ 2531.142106] ? receive_fd+0xa3/0x110 [ 2531.142608] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2531.143276] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2531.143970] ? ksys_write+0x1a7/0x260 [ 2531.144486] ? rcu_read_lock_sched_held+0x42/0x80 [ 2531.145118] do_syscall_64+0x3f/0x90 [ 2531.145611] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2531.146261] RIP: 0033:0x7f27118bfb19 [ 2531.146721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2531.148922] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2531.149855] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2531.150738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2531.151618] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.152493] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2531.153396] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2531.154295] 05:40:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2282, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:40:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:40:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:40:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x4000000}, 0x0) 05:40:53 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5386, 0x0) 05:40:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 3) 05:41:10 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) 05:41:10 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2283, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xf0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 4) 05:41:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:10 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 2) 05:41:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x5000000}, 0x0) 05:41:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:10 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) 05:41:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:10 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2284, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) 05:41:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x6000000}, 0x0) 05:41:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x112) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:30 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x300) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:30 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) 05:41:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) 05:41:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:30 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2285, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x7000000}, 0x0) 05:41:30 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 3) 05:41:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2567.614324] FAULT_INJECTION: forcing a failure. [ 2567.614324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2567.615415] CPU: 1 PID: 27345 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2567.615947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.616482] Call Trace: [ 2567.616661] [ 2567.616826] dump_stack_lvl+0xc1/0xf0 [ 2567.617108] should_fail_ex+0x4b4/0x5b0 [ 2567.617390] prepare_alloc_pages+0x178/0x500 [ 2567.617717] __alloc_pages+0x149/0x510 [ 2567.617996] ? __pfx___alloc_pages+0x10/0x10 [ 2567.618298] ? mark_lock.part.0+0xef/0x2f30 [ 2567.618617] ? perf_trace_lock+0xc1/0x480 [ 2567.618908] ? __pfx_perf_trace_lock+0x10/0x10 [ 2567.619226] alloc_pages+0x1a0/0x260 [ 2567.619496] filemap_alloc_folio+0x374/0x410 [ 2567.619796] ? __pfx_lock_release+0x10/0x10 [ 2567.620108] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2567.620440] ? xas_start+0x14e/0x710 [ 2567.620720] ? xas_load+0x6a/0x140 [ 2567.620980] __filemap_get_folio+0x32b/0xcd0 [ 2567.621340] ? __pfx___filemap_get_folio+0x10/0x10 [ 2567.621457] FAULT_INJECTION: forcing a failure. [ 2567.621457] name failslab, interval 1, probability 0, space 0, times 0 [ 2567.621664] ? __pfx___lock_acquire+0x10/0x10 [ 2567.623435] ? __pfx_perf_trace_lock+0x10/0x10 [ 2567.623758] ? __mark_inode_dirty+0x625/0xee0 [ 2567.624081] pagecache_get_page+0x2e/0x130 [ 2567.624398] ext4_da_write_begin+0x328/0x9c0 [ 2567.624711] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2567.625082] generic_perform_write+0x25a/0x580 [ 2567.625403] ? __pfx_generic_perform_write+0x10/0x10 [ 2567.625759] ? __pfx_file_modified_flags+0x10/0x10 [ 2567.626114] ext4_buffered_write_iter+0x164/0x460 [ 2567.626456] ext4_file_write_iter+0x3ff/0x1930 [ 2567.626782] ? lock_acquire.part.0+0xec/0x320 [ 2567.627121] ? ksys_write+0x12b/0x260 [ 2567.627405] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2567.627753] ? trace_lock_acquire+0x170/0x1e0 [ 2567.628067] ? ksys_write+0x12b/0x260 [ 2567.628353] ? lock_is_held_type+0x9f/0x120 [ 2567.628657] vfs_write+0x9b4/0xdc0 [ 2567.628929] ? __pfx_vfs_write+0x10/0x10 [ 2567.629235] ? __pfx___fget_files+0x10/0x10 [ 2567.629549] ? __fget_files+0x270/0x480 [ 2567.629851] ksys_write+0x12b/0x260 [ 2567.630113] ? __pfx_ksys_write+0x10/0x10 [ 2567.630419] ? rcu_read_lock_sched_held+0x42/0x80 [ 2567.630765] do_syscall_64+0x3f/0x90 [ 2567.631039] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2567.631392] RIP: 0033:0x7fd00c11db19 [ 2567.631645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.632792] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2567.633317] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2567.633776] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2567.634258] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.634739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2567.635212] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2567.635724] [ 2567.635891] CPU: 0 PID: 27357 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2567.636975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.638050] Call Trace: [ 2567.638393] [ 2567.638708] dump_stack_lvl+0xc1/0xf0 [ 2567.639248] should_fail_ex+0x4b4/0x5b0 [ 2567.639804] should_failslab+0x9/0x20 [ 2567.640335] __kmem_cache_alloc_node+0x5b/0x310 [ 2567.640965] ? tracepoint_add_func+0x282/0xe60 [ 2567.641611] ? tracepoint_add_func+0x282/0xe60 [ 2567.642226] __kmalloc+0x46/0xc0 [ 2567.642706] tracepoint_add_func+0x282/0xe60 [ 2567.643296] ? __pfx_perf_trace_block_rq+0x10/0x10 [ 2567.643986] ? __pfx_perf_trace_block_rq+0x10/0x10 [ 2567.644653] tracepoint_probe_register+0xa5/0xf0 [ 2567.645293] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 2567.646006] ? __pfx_perf_trace_block_rq+0x10/0x10 [ 2567.646676] ? pcpu_alloc+0x12a/0x1120 [ 2567.647223] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2567.647925] trace_event_reg+0x297/0x350 [ 2567.648478] perf_trace_event_init+0x550/0x9d0 [ 2567.649144] perf_trace_init+0x1a4/0x2f0 [ 2567.649714] perf_tp_event_init+0xa6/0x120 [ 2567.650296] perf_try_init_event+0x130/0x570 [ 2567.650902] perf_event_alloc.part.0+0xf1b/0x3990 [ 2567.651568] ? __pfx_lock_release+0x10/0x10 [ 2567.652171] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2567.652844] ? lock_acquire+0x32/0xc0 [ 2567.653387] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2567.654066] __do_sys_perf_event_open+0x4d3/0x2a60 [ 2567.654721] ? receive_fd+0xa3/0x110 [ 2567.655249] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2567.655951] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2567.656694] ? ksys_write+0x1a7/0x260 [ 2567.657253] ? rcu_read_lock_sched_held+0x42/0x80 [ 2567.657908] do_syscall_64+0x3f/0x90 [ 2567.658429] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2567.659125] RIP: 0033:0x7f27118bfb19 [ 2567.659622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.661991] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2567.663010] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2567.663964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2567.664942] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.665904] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2567.666863] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2567.667848] 05:41:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfeffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:30 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) 05:41:45 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) 05:41:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffff7c02}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 7) 05:41:45 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 4) 05:41:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x9000000}, 0x0) 05:41:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2286, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x321) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf000000}, 0x0) 05:41:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 8) 05:41:45 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) 05:41:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2287, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x408) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x800000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2583.031927] FAULT_INJECTION: forcing a failure. [ 2583.031927] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.033652] CPU: 0 PID: 27592 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2583.034714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.036076] Call Trace: [ 2583.036431] [ 2583.036844] dump_stack_lvl+0xc1/0xf0 [ 2583.037417] should_fail_ex+0x4b4/0x5b0 [ 2583.037988] should_failslab+0x9/0x20 [ 2583.038644] __kmem_cache_alloc_node+0x5b/0x310 [ 2583.039283] ? selinux_perf_event_alloc+0x47/0x190 [ 2583.040117] kmalloc_trace+0x26/0x120 [ 2583.040656] selinux_perf_event_alloc+0x47/0x190 [ 2583.041457] security_perf_event_alloc+0x4a/0xa0 [ 2583.042108] perf_event_alloc.part.0+0x1b9f/0x3990 [ 2583.042972] ? __pfx_lock_release+0x10/0x10 [ 2583.043601] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2583.044464] ? lock_acquire+0x32/0xc0 [ 2583.045017] ? __do_sys_perf_event_open+0xe77/0x2a60 [ 2583.045796] __do_sys_perf_event_open+0x4d3/0x2a60 [ 2583.046651] ? receive_fd+0xa3/0x110 [ 2583.047203] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2583.048109] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2583.048882] ? ksys_write+0x1a7/0x260 [ 2583.049585] ? rcu_read_lock_sched_held+0x42/0x80 [ 2583.050277] do_syscall_64+0x3f/0x90 [ 2583.050823] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2583.051544] RIP: 0033:0x7f27118bfb19 [ 2583.052066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.054441] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2583.055465] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2583.056408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2583.057368] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.058313] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2583.059259] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2583.060228] 05:41:45 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) 05:41:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x9effffff}, 0x0) 05:41:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000001000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xd1000000}, 0x0) 05:41:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2288, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:57 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 5) 05:41:57 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) 05:41:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x480) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 9) 05:41:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2289, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 2594.839435] FAULT_INJECTION: forcing a failure. [ 2594.839435] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.842357] CPU: 0 PID: 27722 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2594.843327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.844288] Call Trace: [ 2594.844618] [ 2594.844909] dump_stack_lvl+0xc1/0xf0 [ 2594.845418] should_fail_ex+0x4b4/0x5b0 [ 2594.845939] should_failslab+0x9/0x20 [ 2594.846424] __kmem_cache_alloc_node+0x5b/0x310 [ 2594.847009] ? ext4_find_extent+0xa41/0xd30 [ 2594.847566] ? ext4_find_extent+0xa41/0xd30 [ 2594.848100] __kmalloc+0x46/0xc0 [ 2594.848538] ext4_find_extent+0xa41/0xd30 [ 2594.849066] ? mark_lock.part.0+0xef/0x2f30 [ 2594.849660] ext4_ext_map_blocks+0x1c7/0x5dd0 [ 2594.850253] ? __lock_acquire+0x1936/0x63b0 [ 2594.850836] ? __pfx_perf_trace_lock+0x10/0x10 [ 2594.851402] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 2594.851987] ? __pfx___lock_acquire+0x10/0x10 [ 2594.852564] ? lock_is_held_type+0x9f/0x120 [ 2594.853078] ? find_held_lock+0x2c/0x110 [ 2594.853607] ? __down_read_common+0x819/0xee0 [ 2594.854179] ? lock_acquire.part.0+0xec/0x320 [ 2594.854729] ? __pfx___down_read_common+0x10/0x10 [ 2594.855326] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2594.855956] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2594.856529] ? rcu_read_lock_sched_held+0x42/0x80 [ 2594.857121] ? trace_lock_acquire+0x170/0x1e0 [ 2594.857708] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2594.858300] ? lock_acquire+0x32/0xc0 [ 2594.858802] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2594.859390] ext4_da_get_block_prep+0xcbb/0x1180 [ 2594.859979] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2594.860579] ? __pfx_lock_release+0x10/0x10 [ 2594.861143] ? create_empty_buffers+0x300/0xa60 [ 2594.861750] ? do_raw_spin_unlock+0x53/0x220 [ 2594.862324] __block_write_begin_int+0x380/0x13d0 [ 2594.862924] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2594.863537] ? __mark_inode_dirty+0x625/0xee0 [ 2594.864115] ? __pfx___block_write_begin_int+0x10/0x10 [ 2594.864770] ? PageHeadHuge+0x92/0xb0 [ 2594.865253] ext4_da_write_begin+0x357/0x9c0 [ 2594.865827] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2594.866429] generic_perform_write+0x25a/0x580 [ 2594.867107] ? __pfx_generic_perform_write+0x10/0x10 [ 2594.867811] ? __pfx_file_modified_flags+0x10/0x10 [ 2594.868578] ext4_buffered_write_iter+0x164/0x460 [ 2594.869256] ext4_file_write_iter+0x3ff/0x1930 [ 2594.869951] ? lock_acquire.part.0+0xec/0x320 [ 2594.870630] ? ksys_write+0x12b/0x260 [ 2594.871231] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2594.871946] ? trace_lock_acquire+0x170/0x1e0 [ 2594.872603] ? ksys_write+0x12b/0x260 [ 2594.873190] ? lock_is_held_type+0x9f/0x120 [ 2594.873821] vfs_write+0x9b4/0xdc0 [ 2594.874380] ? __pfx_vfs_write+0x10/0x10 [ 2594.874967] ? __pfx___fget_files+0x10/0x10 [ 2594.875619] ? __fget_files+0x270/0x480 [ 2594.876223] ksys_write+0x12b/0x260 [ 2594.876788] ? __pfx_ksys_write+0x10/0x10 [ 2594.877424] ? rcu_read_lock_sched_held+0x42/0x80 [ 2594.878149] do_syscall_64+0x3f/0x90 [ 2594.878726] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2594.879475] RIP: 0033:0x7fd00c11db19 [ 2594.879993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.882467] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2594.883484] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2594.884483] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2594.885491] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.886498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2594.887502] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2594.888549] 05:41:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) 05:41:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:57 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) 05:41:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2594.953569] FAULT_INJECTION: forcing a failure. [ 2594.953569] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.954335] CPU: 1 PID: 27841 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2594.954871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2594.955400] Call Trace: [ 2594.955583] [ 2594.955741] dump_stack_lvl+0xc1/0xf0 [ 2594.956018] should_fail_ex+0x4b4/0x5b0 [ 2594.956306] should_failslab+0x9/0x20 [ 2594.956575] __kmem_cache_alloc_node+0x5b/0x310 [ 2594.956899] ? find_get_context+0xcc/0x800 [ 2594.957196] ? __do_sys_perf_event_open+0x67b/0x2a60 [ 2594.957553] kmalloc_trace+0x26/0x120 [ 2594.957819] find_get_context+0xcc/0x800 [ 2594.958111] ? __pfx_find_get_context+0x10/0x10 [ 2594.958440] ? security_capable+0x99/0xc0 [ 2594.958742] __do_sys_perf_event_open+0xb3c/0x2a60 [ 2594.959087] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2594.959447] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2594.959833] ? ksys_write+0x1a7/0x260 [ 2594.960116] ? rcu_read_lock_sched_held+0x42/0x80 [ 2594.960462] do_syscall_64+0x3f/0x90 [ 2594.960730] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2594.961085] RIP: 0033:0x7f27118bfb19 [ 2594.961340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.962512] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2594.963009] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2594.963474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2594.963940] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2594.964414] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2594.964888] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2594.965381] 05:41:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:41:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x500) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:41:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xfffff000}, 0x0) 05:41:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10000010000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) 05:42:12 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 6) 05:42:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x555) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:12 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401c5820, 0x0) 05:42:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x40000100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xffffff7f}, 0x0) 05:42:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fcffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5382, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 05:42:12 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) [ 2609.923830] FAULT_INJECTION: forcing a failure. [ 2609.923830] name failslab, interval 1, probability 0, space 0, times 0 [ 2609.924674] CPU: 1 PID: 28089 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2609.925167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2609.925716] Call Trace: [ 2609.925883] [ 2609.926036] dump_stack_lvl+0xc1/0xf0 [ 2609.926295] should_fail_ex+0x4b4/0x5b0 [ 2609.926563] should_failslab+0x9/0x20 [ 2609.926811] __kmem_cache_alloc_node+0x5b/0x310 [ 2609.927110] ? find_get_pmu_context+0x86/0x960 [ 2609.927411] kmalloc_trace+0x26/0x120 [ 2609.927675] find_get_pmu_context+0x86/0x960 [ 2609.927965] __do_sys_perf_event_open+0x143b/0x2a60 [ 2609.928316] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2609.928649] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 2609.929029] ? ksys_write+0x1a7/0x260 [ 2609.929292] ? rcu_read_lock_sched_held+0x42/0x80 [ 2609.929637] do_syscall_64+0x3f/0x90 [ 2609.929886] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2609.930238] RIP: 0033:0x7f27118bfb19 [ 2609.930477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2609.931622] RSP: 002b:00007f270ee35188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2609.932083] RAX: ffffffffffffffda RBX: 00007f27119d2f60 RCX: 00007f27118bfb19 [ 2609.932546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 2609.933007] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2609.933471] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2609.933943] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2609.934425] 05:42:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xffffff9e}, 0x0) 05:42:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x600) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xfffffff0}, 0x0) 05:42:29 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) 05:42:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x27cffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x700) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:29 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) 05:42:29 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 7) 05:42:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 05:42:29 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5386, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x300000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2626.785085] FAULT_INJECTION: forcing a failure. [ 2626.785085] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.787462] CPU: 0 PID: 28221 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2626.788435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2626.789405] Call Trace: [ 2626.789735] [ 2626.790041] dump_stack_lvl+0xc1/0xf0 [ 2626.790546] should_fail_ex+0x4b4/0x5b0 [ 2626.791073] ? __es_insert_extent+0x3a9/0x12f0 [ 2626.791666] should_failslab+0x9/0x20 [ 2626.792154] kmem_cache_alloc+0x5a/0x320 [ 2626.792677] __es_insert_extent+0x3a9/0x12f0 [ 2626.793248] ? do_raw_write_lock+0x11e/0x3b0 [ 2626.793810] ? __pfx_do_raw_write_lock+0x10/0x10 [ 2626.794427] ? lock_acquire+0x32/0xc0 [ 2626.795006] ext4_es_insert_extent+0x2db/0xc20 [ 2626.795761] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 2626.796568] ? __pfx_lock_release+0x10/0x10 [ 2626.797276] ? __pfx_ext4_es_is_delayed+0x10/0x10 [ 2626.798054] ? __es_find_extent_range+0x197/0x4b0 [ 2626.798832] ? lock_is_held_type+0x9f/0x120 [ 2626.799522] ? __pfx_ext4_es_is_delayed+0x10/0x10 [ 2626.800285] ? rcu_read_lock_sched_held+0x42/0x80 [ 2626.801056] ext4_ext_map_blocks+0x1a58/0x5dd0 [ 2626.801827] ? __lock_acquire+0x1936/0x63b0 [ 2626.802557] ? __pfx_perf_trace_lock+0x10/0x10 [ 2626.803287] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 2626.804074] ? __pfx___lock_acquire+0x10/0x10 [ 2626.804812] ? lock_is_held_type+0x9f/0x120 [ 2626.805497] ? find_held_lock+0x2c/0x110 [ 2626.806184] ? __down_read_common+0x819/0xee0 [ 2626.806903] ? lock_acquire.part.0+0xec/0x320 [ 2626.807633] ? __pfx___down_read_common+0x10/0x10 [ 2626.808404] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2626.809192] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2626.809966] ? rcu_read_lock_sched_held+0x42/0x80 [ 2626.810732] ? trace_lock_acquire+0x170/0x1e0 [ 2626.811472] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2626.812237] ? lock_acquire+0x32/0xc0 [ 2626.812865] ? ext4_da_get_block_prep+0x5ca/0x1180 [ 2626.813653] ext4_da_get_block_prep+0xcbb/0x1180 [ 2626.814427] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2626.815236] ? __pfx_lock_release+0x10/0x10 [ 2626.815948] ? create_empty_buffers+0x300/0xa60 [ 2626.816649] ? do_raw_spin_unlock+0x53/0x220 [ 2626.817327] __block_write_begin_int+0x380/0x13d0 [ 2626.818080] ? __pfx_ext4_da_get_block_prep+0x10/0x10 [ 2626.818847] ? __mark_inode_dirty+0x625/0xee0 [ 2626.819533] ? __pfx___block_write_begin_int+0x10/0x10 [ 2626.820311] ? PageHeadHuge+0x92/0xb0 [ 2626.820915] ext4_da_write_begin+0x357/0x9c0 [ 2626.821594] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2626.822349] generic_perform_write+0x25a/0x580 [ 2626.823041] ? __pfx_generic_perform_write+0x10/0x10 [ 2626.823784] ? __pfx_file_modified_flags+0x10/0x10 [ 2626.824548] ext4_buffered_write_iter+0x164/0x460 [ 2626.825260] ext4_file_write_iter+0x3ff/0x1930 [ 2626.825942] ? lock_acquire.part.0+0xec/0x320 [ 2626.826626] ? ksys_write+0x12b/0x260 [ 2626.827226] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2626.827950] ? trace_lock_acquire+0x170/0x1e0 [ 2626.828633] ? ksys_write+0x12b/0x260 [ 2626.829220] ? lock_is_held_type+0x9f/0x120 [ 2626.829908] vfs_write+0x9b4/0xdc0 [ 2626.830526] ? __pfx_vfs_write+0x10/0x10 [ 2626.831186] ? __pfx___fget_files+0x10/0x10 [ 2626.831878] ? __fget_files+0x270/0x480 [ 2626.832547] ksys_write+0x12b/0x260 [ 2626.833143] ? __pfx_ksys_write+0x10/0x10 [ 2626.833835] ? rcu_read_lock_sched_held+0x42/0x80 [ 2626.834612] do_syscall_64+0x3f/0x90 [ 2626.835218] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2626.836028] RIP: 0033:0x7fd00c11db19 [ 2626.836607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2626.839289] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2626.840423] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2626.841458] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2626.842580] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2626.843607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2626.844616] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2626.845666] 05:42:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:29 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) [ 2626.928375] FAULT_INJECTION: forcing a failure. [ 2626.928375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2626.929431] CPU: 1 PID: 28290 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2626.929982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2626.930509] Call Trace: [ 2626.930684] [ 2626.930840] dump_stack_lvl+0xc1/0xf0 [ 2626.931115] should_fail_ex+0x4b4/0x5b0 [ 2626.931394] _copy_to_user+0x2e/0x150 [ 2626.931675] simple_read_from_buffer+0xd0/0x170 [ 2626.932003] proc_fail_nth_read+0x19c/0x230 [ 2626.932299] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2626.932625] ? security_file_permission+0xb5/0xe0 [ 2626.932963] vfs_read+0x257/0x940 [ 2626.933217] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2626.933550] ? __pfx_vfs_read+0x10/0x10 [ 2626.933826] ? __pfx___fget_files+0x10/0x10 [ 2626.934131] ? __fget_files+0x270/0x480 [ 2626.934419] ksys_read+0x12b/0x260 [ 2626.934672] ? __pfx_ksys_read+0x10/0x10 [ 2626.934964] ? rcu_read_lock_sched_held+0x42/0x80 [ 2626.935299] do_syscall_64+0x3f/0x90 [ 2626.935563] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2626.935913] RIP: 0033:0x7f271187269c [ 2626.936163] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2626.937311] RSP: 002b:00007f270ee35170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2626.937805] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f271187269c [ 2626.938273] RDX: 000000000000000f RSI: 00007f270ee351e0 RDI: 0000000000000003 [ 2626.938731] RBP: 00007f270ee351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2626.939186] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2626.939636] R13: 00007ffff60f3e1f R14: 00007f270ee35300 R15: 0000000000022000 [ 2626.940102] 05:42:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x400000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x804) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:41 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x801c581f, 0x0) 05:42:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x3000000000000}, 0x0) 05:42:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:41 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 8) 05:42:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc00000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 05:42:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x8000000000000}, 0x0) 05:42:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc00) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:41 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 9) 05:42:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:41 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 05:42:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x14, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x40030000000000}, 0x0) 05:42:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xd8e) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:55 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 05:42:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1200) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:55 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) 05:42:55 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 10) 05:42:55 executing program 4: perf_event_open(&(0x7f0000000080)={0xf8, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfeffffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x100000000000000}, 0x0) 05:42:56 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) 05:42:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2a400, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x200000000000000}, 0x0) 05:42:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffc02, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:56 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:42:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1201) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:42:56 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) 05:43:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1800) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:43:10 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 11) 05:43:10 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x300000000000000}, 0x0) 05:43:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x3, 0x4f) sendfile(r1, r2, 0x0, 0x9) 05:43:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 2667.913260] FAULT_INJECTION: forcing a failure. [ 2667.913260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2667.914878] CPU: 1 PID: 28994 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2667.915462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2667.916029] Call Trace: [ 2667.916219] [ 2667.916392] dump_stack_lvl+0xc1/0xf0 [ 2667.916684] should_fail_ex+0x4b4/0x5b0 [ 2667.916987] copyin+0x19/0x120 [ 2667.917238] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2667.917609] ? ext4_da_write_begin+0x63e/0x9c0 [ 2667.917946] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2667.918347] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2667.918727] generic_perform_write+0x2cf/0x580 [ 2667.919068] ? __pfx_generic_perform_write+0x10/0x10 [ 2667.919436] ? __pfx_file_modified_flags+0x10/0x10 [ 2667.919814] ext4_buffered_write_iter+0x164/0x460 [ 2667.920167] ext4_file_write_iter+0x3ff/0x1930 [ 2667.920498] ? lock_acquire.part.0+0xec/0x320 [ 2667.920840] ? ksys_write+0x12b/0x260 [ 2667.921126] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2667.921482] ? trace_lock_acquire+0x170/0x1e0 [ 2667.921805] ? ksys_write+0x12b/0x260 [ 2667.922083] ? lock_is_held_type+0x9f/0x120 [ 2667.922417] vfs_write+0x9b4/0xdc0 [ 2667.922680] ? __pfx_vfs_write+0x10/0x10 [ 2667.922986] ? __pfx___fget_files+0x10/0x10 [ 2667.923287] ? __fget_files+0x270/0x480 [ 2667.923601] ksys_write+0x12b/0x260 [ 2667.923867] ? __pfx_ksys_write+0x10/0x10 [ 2667.924186] ? rcu_read_lock_sched_held+0x42/0x80 [ 2667.924536] do_syscall_64+0x3f/0x90 [ 2667.924814] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2667.925169] RIP: 0033:0x7fd00c11db19 [ 2667.925448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2667.926639] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2667.927165] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2667.927661] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2667.928166] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.928664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2667.929170] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2667.929690] 05:43:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:10 executing program 0: add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="23b1d33636a639da43f3d0292264ededa8a087f7e30419831108837b18e20ef94ce69b278a3cfaa624cb6a99eb43313cd88ad856ecde1d75794366e083566eeafe251ac7a9d7ec2d245782e6f8a3b2445fe86acae06641a6cce66d1fbae13ceb833c04dc09bfb790cfd2b61c0ca679c049d857661cdfc60041e646ab79c4565ac58c419c77663767ba603a3eaf62e64239da36acf055263e01f97b9bfce012a8a031a19f8089c6bd56ac11e24057e01167ec64158c3d846630033e4d759dba76761cd018dbfd1001a1e607d4bb31eddccad8e1e21c32e1ee115ada94872a5ecef6bc1cb04b59872b66d2611090f5", 0xee, 0xfffffffffffffffd) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 05:43:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x500000000000000}, 0x0) 05:43:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1b30) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:43:26 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 12) 05:43:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x401c5820, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:26 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "0fbc860ffdef5764ecc2ba9df4532bd348cf8000000067f6b5830bcb74fe0fd62f8aea6000", 0x25}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x62, 0x31, 0x63, 0x36, 0x38, 0x66, 0x61, 0x64, 0x32, 0x35, 0x65, 0x38, 0x33, 0x34, 0x66, 0x35]}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, r3) keyctl$chown(0x4, r4, 0xee00, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbd86532bd3481826cf6ecb74fe0f00", 0x14}, 0x48, 0xfffffffffffffff8) keyctl$chown(0x4, r5, 0xee00, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r5, 0x1) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 05:43:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2683.384322] FAULT_INJECTION: forcing a failure. [ 2683.384322] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.385675] CPU: 1 PID: 29100 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2683.386260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2683.386841] Call Trace: [ 2683.387034] [ 2683.387203] dump_stack_lvl+0xc1/0xf0 [ 2683.387503] should_fail_ex+0x4b4/0x5b0 [ 2683.387809] ? jbd2__journal_start+0x194/0x6b0 [ 2683.388155] should_failslab+0x9/0x20 [ 2683.388440] kmem_cache_alloc+0x5a/0x320 [ 2683.388749] jbd2__journal_start+0x194/0x6b0 [ 2683.389084] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2683.389435] ? ext4_dirty_inode+0xa5/0x130 [ 2683.389754] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2683.390090] ext4_dirty_inode+0xa5/0x130 [ 2683.390392] __mark_inode_dirty+0x1aa/0xee0 [ 2683.390729] generic_write_end+0x319/0x3d0 [ 2683.391048] ext4_da_write_end+0x162/0x950 [ 2683.391374] generic_perform_write+0x318/0x580 [ 2683.391724] ? __pfx_generic_perform_write+0x10/0x10 [ 2683.392087] ? __pfx_file_modified_flags+0x10/0x10 [ 2683.392472] ext4_buffered_write_iter+0x164/0x460 [ 2683.392827] ext4_file_write_iter+0x3ff/0x1930 [ 2683.393164] ? lock_acquire.part.0+0xec/0x320 [ 2683.393509] ? ksys_write+0x12b/0x260 [ 2683.393804] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2683.394169] ? trace_lock_acquire+0x170/0x1e0 [ 2683.394515] ? ksys_write+0x12b/0x260 [ 2683.394820] ? lock_is_held_type+0x9f/0x120 [ 2683.395143] vfs_write+0x9b4/0xdc0 [ 2683.395422] ? __pfx_vfs_write+0x10/0x10 [ 2683.395725] ? __pfx___fget_files+0x10/0x10 [ 2683.396038] ? __fget_files+0x270/0x480 [ 2683.396353] ksys_write+0x12b/0x260 [ 2683.396627] ? __pfx_ksys_write+0x10/0x10 [ 2683.396951] ? rcu_read_lock_sched_held+0x42/0x80 [ 2683.397310] do_syscall_64+0x3f/0x90 [ 2683.397579] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2683.397960] RIP: 0033:0x7fd00c11db19 [ 2683.398213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2683.399477] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2683.400012] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2683.400521] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2683.401022] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.401527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2683.402029] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2683.402545] 05:43:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8b, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="04dc627c04a3958d44b6875005ce453ba376a930173a40a1fc23881a9d0c12679ad849aeb2bea28f49e8ed6ad41880cc66632c5b2243ebf35a941ede308d081e297e06e5cb542cb58a2173d0ea95683126638a9d94ef8359d62880863273d9b1beb33af876dece9a02f7f1b29800300e35cec871ba531b4755936e03aae30a602f7cfe9fcf46a623dd78ff0a1646c3", 0x8f}], 0x10c0000, &(0x7f0000000240)={[{@check_strict}], [{@obj_type={'obj_type', 0x3d, '(%[\xe3.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x33, 0x65, 0x32, 0x63, 0x38, 0x34], 0x2d, [0x37, 0x65, 0xd, 0x39], 0x2d, [0x33, 0x30, 0x37, 0x31], 0x2d, [0x38, 0x32, 0x34, 0x62], 0x2d, [0x64, 0x66, 0x64, 0x37, 0x32, 0x30, 0x36, 0x39]}}}, {@smackfstransmute}, {@seclabel}, {@appraise}, {@subj_type}, {@audit}, {@appraise}, {@fowner_eq}]}) r1 = openat(r0, 0x0, 0x8100, 0xfd) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000180)) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) 05:43:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x600000000000000}, 0x0) 05:43:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:43:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:39 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 13) 05:43:39 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x94) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) 05:43:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x700000000000000}, 0x0) 05:43:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2103) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:43:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2400) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:43:52 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 14) 05:43:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x801c581f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x10001, 0x2d82c2) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:43:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x900000000000000}, 0x0) [ 2710.062485] FAULT_INJECTION: forcing a failure. [ 2710.062485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2710.063927] CPU: 1 PID: 29471 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2710.064464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2710.065016] Call Trace: [ 2710.065197] [ 2710.065358] dump_stack_lvl+0xc1/0xf0 [ 2710.065641] should_fail_ex+0x4b4/0x5b0 [ 2710.065939] prepare_alloc_pages+0x178/0x500 [ 2710.066253] __alloc_pages+0x149/0x510 [ 2710.066531] ? __pfx___alloc_pages+0x10/0x10 [ 2710.066841] ? perf_trace_lock+0xc1/0x480 [ 2710.067139] ? find_held_lock+0x2c/0x110 [ 2710.067432] ? __pfx_perf_trace_lock+0x10/0x10 [ 2710.067741] ? __lock_acquire+0x1936/0x63b0 [ 2710.068052] alloc_pages+0x1a0/0x260 [ 2710.068319] filemap_alloc_folio+0x374/0x410 [ 2710.068625] ? __pfx_lock_release+0x10/0x10 [ 2710.068924] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2710.069252] ? xas_start+0x14e/0x710 [ 2710.069525] ? xas_load+0x6a/0x140 [ 2710.069783] __filemap_get_folio+0x32b/0xcd0 [ 2710.070099] ? __pfx___filemap_get_folio+0x10/0x10 [ 2710.070440] ? lock_acquire.part.0+0xec/0x320 [ 2710.070757] ? lock_is_held_type+0x9f/0x120 [ 2710.071062] ? find_held_lock+0x2c/0x110 [ 2710.071348] pagecache_get_page+0x2e/0x130 [ 2710.071649] ext4_da_write_begin+0x328/0x9c0 [ 2710.071960] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2710.072304] generic_perform_write+0x25a/0x580 [ 2710.072620] ? __pfx_generic_perform_write+0x10/0x10 [ 2710.072977] ? __pfx_file_modified_flags+0x10/0x10 [ 2710.073331] ext4_buffered_write_iter+0x164/0x460 [ 2710.073692] ext4_file_write_iter+0x3ff/0x1930 [ 2710.074031] ? lock_acquire.part.0+0xec/0x320 [ 2710.074344] ? ksys_write+0x12b/0x260 [ 2710.074645] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2710.075018] ? trace_lock_acquire+0x170/0x1e0 [ 2710.075342] ? ksys_write+0x12b/0x260 [ 2710.075629] ? lock_is_held_type+0x9f/0x120 [ 2710.075955] vfs_write+0x9b4/0xdc0 [ 2710.076219] ? __pfx_vfs_write+0x10/0x10 [ 2710.076524] ? __pfx___fget_files+0x10/0x10 [ 2710.076825] ? __fget_files+0x270/0x480 [ 2710.077140] ksys_write+0x12b/0x260 [ 2710.077418] ? __pfx_ksys_write+0x10/0x10 [ 2710.077710] ? rcu_read_lock_sched_held+0x42/0x80 [ 2710.078080] do_syscall_64+0x3f/0x90 [ 2710.078349] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2710.078741] RIP: 0033:0x7fd00c11db19 [ 2710.079011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2710.080273] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2710.080784] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2710.081284] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2710.081744] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2710.082242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2710.082700] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2710.083239] 05:43:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 05:43:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) fallocate(r0, 0x1, 0x80000000, 0xaeef) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:43:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:43:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 05:43:52 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 15) 05:43:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2e00) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x301b) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:05 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 16) 05:44:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:05 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x80000, 0x46, 0x1a}, 0x18) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012a00fbdbdf2570000000080003000000", @ANYRES32=0x0, @ANYBLOB="0c00990000040000560000000a00060008021100000000000a00060008021100000000000a0006000802110000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x100005, 0x2000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$FIOCLEX(r1, 0x5451) 05:44:05 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xd100000000000000}, 0x0) 05:44:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 17) 05:44:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 05:44:18 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$binfmt_aout(r1, &(0x7f0000000240)={{0x107, 0x6, 0xfc, 0x15c, 0x145, 0x1000, 0x12e, 0x7}, "288ec92b0ccb6a635213fa449d445a839dc75972b3c71b44c4b9fd53dc388a5a17a6a39463882b9b3f4405073cac4af8180eee1709488d6e97b13faffcfe4ff252d5d49615199c948c97e72e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x76c) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) write(r0, &(0x7f0000000000)="28ba80fd3a0b279021a3dfbde5fb7cfe908f5cd8a20c1555616e1ea057476ec0b98c93374a5ec60bbb5dae798447cf7842bf032d99e068ca5b3e605f35c6f508d737b908fa4a26f2b22802929cf340d1c7bb7fad2d2ade06290483d9fd42eec927c60bf760ba915bab36f7c4a5f5dba82457d2131df5aed55b92ef9a2cc1a4e1fd1f7be9d8d6104c5dbbd4a6faea09a7050b0b1841c70cec2106a1fbe4293ad51e123a0a3f40d4b1a44ff96c0707f4b78545866db51f77ebdea0956f9200cbd8c3851a3f7713bae11e1cbc3495d4ef7aa375bb", 0xd3) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='freezer.state\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000180)={0x20, 0x9, 0x8001, "eadc5636f991e9eeda268b38df5f17f7596a345b5d80a4ec5b8dc0f5654293a7"}) 05:44:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:18 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x3f00) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x303882, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0x0) keyctl$link(0x8, r0, r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x42) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "207ba2ef791aeeea0b22a503df6fb0db997d775aca72848a73b245337c489b71422399ab257c5903d446a9d558351c88a148d71831276293d0b69edd6bd52dc4", 0x21}, 0x48, 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000140), 0x20000000000008, 0x2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x20, 0x0, 0x4f) sendfile(r2, r3, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1274, 0x0) 05:44:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 05:44:18 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x5505) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:18 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 18) 05:44:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 19) 05:44:34 executing program 0: add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001040)={0x2, 0x3, {0x9, @struct={0x20, 0xffffffff}, 0x0, 0x10001, 0x6, 0x17, 0xfffffffffffffffe, 0x9, 0xc1, @struct={0x0, 0x1}, 0x9, 0x8001, [0xfffffffffffffff7, 0x1, 0xdf72, 0xfffffffffffffff9, 0x101, 0x6]}, {0x10001, @struct={0x401, 0x80}, 0x0, 0x3, 0x6c, 0x6b2, 0x20ba0e55, 0xffffffffffffb349, 0x10, @struct={0x5, 0x7}, 0x9, 0x8, [0x0, 0x4d4, 0x10001, 0x10000, 0x4, 0x1000]}, {0x7f, @usage=0x8, 0x0, 0x2, 0x3, 0x4, 0x61d45a21, 0xaca, 0x42, @usage=0x1000, 0x40, 0x2, [0x80, 0x4, 0x8, 0x3f00000000, 0x857, 0xffffffffffffffff]}, {0xb8, 0xffffffff, 0x8001}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000001440)={0x1, 0x2, {0x1, @struct={0x2, 0xfffffff7}, 0x0, 0x5, 0x4, 0x1, 0x9, 0xdc8, 0x1b0, @usage=0x7, 0x3, 0x8, [0xffffffffffffff3d, 0x9, 0x7fffffff, 0x2, 0x0, 0x6]}, {0x1, @usage=0x3, 0x0, 0x0, 0x4, 0x7, 0x100000000, 0x6a2, 0x80, @usage=0x9, 0x0, 0x9a5, [0x8, 0x5, 0x10000, 0xfffffffffffffffd, 0xca57, 0x4]}, {0x8, @struct={0x6, 0x40}, r0, 0x10000, 0x100, 0x1, 0x8001, 0xffff, 0x43, @usage=0x9, 0x8b00, 0x3d4, [0x81, 0x3, 0xfffffffffffff7a7, 0x800, 0x1ff, 0xab7]}, {0x5, 0x9, 0x4}}) r1 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x39b0, 0xa, &(0x7f0000000900)=[{&(0x7f0000000080)="f4777cc6f4a419e357ea1441fc4a0319e2e05d24dbb2725051f7070727f5e35ca027d28d3d116d8f30f621070c5aaf7dd3fecf3f6b371451ec66161065e2ebee44f5e9ec6f3c538ecfef3cb3c0b1337561e98fd5a3f18bc4fe61eb1c77c45ac13ec04ec19b7d22336227596d8aec83e1fd6868c0ef1a69f513db55c6402843e908ddcf8ae0fa1ab01e98c329c6800cf4976e95cf8a4f7cc1d23a58629b6f48090e5f902f75c478290944b980de8f3b03e5e1486a546ccee1adfb90ad08b21a9395cad8d26277d9c45dc586e09c8a", 0xce, 0xfffffffffffffffe}, {&(0x7f0000000240)="4881e8bf5d9c668c51b829250ce72918857155b91039bf36a626eaff50b7bde0707eeca85abcba62d9c99f384bf5a71a06f1b4892c32ece1bc94ce2789fa16abd98488adddcc0c7747b354e1e33d982070e6f5353a68f928f58e06b54fe189cea3de0799b3003fcd2ef07ae1ac023762c55433dc44b445438e76b391f1c31dc24df00805a0161a6edc6ea35cd18ba75ddc99c67d24b267106857252e04e7db3497bc626250ec33dfed6fca27adaeefbc7da32623583ae577a305a087c6", 0xbd, 0x9}, {&(0x7f0000000180)="f6832fd66bde3f667fc31186ce111b26875791d9bd53c042ecad88a13f842a6b58dd0c13fabd6c2ef1f2b5ba6627612a38c506830bfec827069aed81c89bcf705aae6f8019f22d0e88e61e2547db1870092ebb168223a8c4ea0a4d515bf404c2c531b6770226eab69b38a3f1da8a", 0x6e, 0x3}, {&(0x7f0000000300)="b4bfc875305e66eff0e43cf10f002f6c7b1de13ec41e48741beb0576a19eaad2476289c131e8c4edb72c0ab8919b125d88e5ac98f3053bc395917221d911e3dc1fabf344293d037aeb60816ed594181183ee2f57e66736a5a5db1c469d611d87be4e0180ac3e1aae2d91cd844ba74a6d087ff7bb41f848c3c7b284695d46e25cc06d996618e6040d69093c34be1cd166e8fa8974351013a7742dfb21b635624bcdc7cf3c22b59d4bcd720643fe1cec9bfc130e03872aaad4a1ab84d8e2c98ff4f826d5eee00c1faf7a02b6f178ee496d13dc98b2e7950831e6339299202e7b75b160c2de12359be7191671d2a49d0420", 0xf0, 0x8}, {&(0x7f0000000400)="7b6539bd43a3c0f27ae7073321efa571d3878608fb712c4e78857e979bd8a8372b4cb66a1d8d99cbc87f4b5702eb8267ca5cda49a1dc2df063fb6d6e70eb496d3542713c4477c841384787366455d376b9af3eeb2fdb3cebad7b57f7e9eb4343f42f748db35bb651ade0aa77296e9240ba2d52b8e85214a8d1dba0323e19ccae01a363cc367d749cd874becfd9450f9b27ca606585a82b75d3d6a21a9c9e7bab5841464df07901ab481979ec4c92f85d03af7acd123c2512d0ef29985ae37f9136114b97b8aa", 0xc6, 0x1}, {&(0x7f0000000500)="dfbbc2673703fc700bc1b7ffbe20d384de9c89c2d59e5bf1d7f0924e0d9ba26b72003b46f0552916c8f79a5ab417e086f09904ac02409dc9647e5b57e0d36fe67c010e4aa5d1919b4fb6bab0e715f825d7aa0b9835b2becd01f4374d40ad8532895971d2fabd11198c0eb3bdf58ed33d2110c943e2cce4775df3b0140bc05779be3ca5623905376efaefca6723fe236e0747ae0031fda66663c02d9f6c44cd2747523334d96b659cb38a22cccac2e93c48b7065ca633c95986fde6f03464616427ddba662dad1b5ed290d124bd2056c2df80d231b93c823f968c07947fcae743d9a2f696b9c3b5228591132e3648d1d3b4c99d02dfcc", 0xf6, 0x10000}, {&(0x7f0000000600)="4498fe2ebfc8dfcfe360f47c8dc3b8e658ee287f8919bb6c59b6ee1e786d5887ec6ae3aaf3cb12d2190ea8577a499710d87b86a7b073ec76e04b2b4267218353023b8de4d11f09839be55119576befd7f71027d5b0f52aa97465dfaab3d6bc04d931f659869beca337bb4b624b29d85f6cc7918b58068c5732470883641db86ce673bcf8e359549f88156113419744b3b74884b80b9bf748db2eec69b16f561f1313791b368639f81892", 0xaa, 0xde}, {&(0x7f00000006c0)="7d80eb4489f3367e52a21822c4d4bfb0816237efd5a6877760e15da2d54dad9413fcd86af1932613c819acf485ac96563a826fa56b5d7c813983eb76b4d2871d96250b467610d8d63ef3d9ae724065f584cb5597b4127e1b2c8871512fc41147ffd12294154d57fdcdf04b92922b688a4f49ea7f4015842bc2f51a87f42568", 0x7f, 0x101}, {&(0x7f0000000740)="f170f436e4a2d0d989572a40ffb3055dfb3191badd3782ccc4f51cb6c12daa6a95da8283e5b7b3d28e0db3f19ab5361cde69d3a940e276bbb82f24f6de7b274e9970e6cb44d26c03d77cad2fa22029e262377bfd3e5c7f7768fa23f71d040670b9f414062a2fb857ce5ddc2d929891e89d50c7687cf7bd1f1251e84407fa0ccaff7960a43669ff4252773efc5d1501e93b4830eb5fe5e488f3642f1b673299378b6ca1b51c938a53f74d020fd8ec82f07beb17cf628df444566b", 0xba, 0x3f}, {&(0x7f0000000800)="b99efc24bb526f9171e22a9bfba209b5c2eabbf76b512afe1ff13b10650c60edd3b656a2cbae2c7f3ef3e7dd28228b11a25571ac3abb08866cbed7a28cbf41bf01cbcec75eacf5b0ef3b88dd2ee927b9c609986b6edc6923eaab720eb22e1b223cff7635b08c8cd4ec99222226f7599369dcd4df325ca8c8204b51a454944bc25a96aac520af8442f610ec247ec8e307f7a4c05814b34a69240fee4b6c4984bace007ae964498704a792035520c824e4ecfe3b578e07c48785a1f8773c9b730dcb41aded17a5ad", 0xc7, 0x100000000}], 0x2000000, &(0x7f0000000e00)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c7569cc3e4ca88a0379de8c1ef5e7da3ab3f03d5dae5954b59eef6451b65b61bddb66e8fb6affcc905625efeb87c51ec224655a5a6f6c390dfc0796fa7c824564ebfeae41ac01495ac7870ed51eb4ed304981", @ANYRESDEC=0x0, @ANYBLOB="2c73e5636c6162656c2c6d6561737572652c00"]) openat(r1, &(0x7f0000000a80)='./file0\x00', 0x200800, 0x10) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) 05:44:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x27cffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x6400) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 2751.558308] FAULT_INJECTION: forcing a failure. [ 2751.558308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2751.559930] CPU: 1 PID: 30085 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2751.560654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2751.561371] Call Trace: [ 2751.561608] [ 2751.561819] dump_stack_lvl+0xc1/0xf0 [ 2751.562186] should_fail_ex+0x4b4/0x5b0 [ 2751.562565] copyin+0x19/0x120 [ 2751.562878] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2751.563349] ? ext4_da_write_begin+0x63e/0x9c0 [ 2751.563780] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2751.564283] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2751.564748] generic_perform_write+0x2cf/0x580 [ 2751.565175] ? __pfx_generic_perform_write+0x10/0x10 [ 2751.565631] ? __pfx_file_modified_flags+0x10/0x10 [ 2751.566094] ext4_buffered_write_iter+0x164/0x460 [ 2751.566549] ext4_file_write_iter+0x3ff/0x1930 [ 2751.566970] ? lock_acquire.part.0+0xec/0x320 [ 2751.567399] ? ksys_write+0x12b/0x260 [ 2751.567783] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2751.568237] ? trace_lock_acquire+0x170/0x1e0 [ 2751.568664] ? ksys_write+0x12b/0x260 [ 2751.569035] ? lock_is_held_type+0x9f/0x120 [ 2751.569440] vfs_write+0x9b4/0xdc0 [ 2751.569791] ? __pfx_vfs_write+0x10/0x10 [ 2751.570175] ? __pfx___fget_files+0x10/0x10 [ 2751.570577] ? __fget_files+0x270/0x480 [ 2751.570973] ksys_write+0x12b/0x260 [ 2751.571327] ? __pfx_ksys_write+0x10/0x10 [ 2751.571741] ? rcu_read_lock_sched_held+0x42/0x80 [ 2751.572197] do_syscall_64+0x3f/0x90 [ 2751.572547] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2751.573015] RIP: 0033:0x7fd00c11db19 [ 2751.573352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2751.574912] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2751.575590] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2751.576229] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2751.576855] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2751.577480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2751.578097] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2751.578749] 05:44:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:34 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:34 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:44:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x0) 05:44:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8004) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 05:44:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8e00) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:47 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/223, 0xdf}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f00000008c0)=""/255, 0xff}, {&(0x7f00000001c0)=""/82, 0x52}, {&(0x7f00000009c0)=""/170, 0xaa}], 0x5, 0x4, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) statx(r2, &(0x7f0000000240)='./file1\x00', 0x2000, 0x4, &(0x7f0000000300)) r3 = openat$cgroup_int(r0, &(0x7f0000000000)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4007, @fd=r3, 0x6, 0x0, 0x8, 0x1c, 0x0, {0x1}}, 0x1) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1274, 0x0) 05:44:47 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 20) 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fcffff, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 05:44:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:47 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2764.796232] FAULT_INJECTION: forcing a failure. 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2764.796232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2764.799443] CPU: 0 PID: 30340 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2764.800520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2764.801540] Call Trace: [ 2764.801903] [ 2764.802204] dump_stack_lvl+0xc1/0xf0 [ 2764.802725] should_fail_ex+0x4b4/0x5b0 [ 2764.803292] copyin+0x19/0x120 [ 2764.803758] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2764.804452] ? ext4_da_write_begin+0x63e/0x9c0 [ 2764.805072] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2764.805777] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2764.806443] generic_perform_write+0x2cf/0x580 [ 2764.807055] ? __pfx_generic_perform_write+0x10/0x10 [ 2764.807720] ? __pfx_file_modified_flags+0x10/0x10 [ 2764.808416] ext4_buffered_write_iter+0x164/0x460 [ 2764.809066] ext4_file_write_iter+0x3ff/0x1930 [ 2764.809661] ? lock_acquire.part.0+0xec/0x320 [ 2764.810275] ? ksys_write+0x12b/0x260 [ 2764.810811] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2764.811479] ? trace_lock_acquire+0x170/0x1e0 [ 2764.812116] ? ksys_write+0x12b/0x260 [ 2764.812628] ? lock_is_held_type+0x9f/0x120 [ 2764.813213] vfs_write+0x9b4/0xdc0 [ 2764.813702] ? __pfx_vfs_write+0x10/0x10 [ 2764.814247] ? __pfx___fget_files+0x10/0x10 [ 2764.814815] ? __fget_files+0x270/0x480 [ 2764.815392] ksys_write+0x12b/0x260 [ 2764.815926] ? __pfx_ksys_write+0x10/0x10 [ 2764.816489] ? rcu_read_lock_sched_held+0x42/0x80 [ 2764.817121] do_syscall_64+0x3f/0x90 [ 2764.817616] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2764.818296] RIP: 0033:0x7fd00c11db19 [ 2764.818777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2764.821006] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2764.821947] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2764.822803] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2764.823712] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2764.824598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2764.825617] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2764.826581] 05:44:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8e0d) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:44:47 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:44:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:00 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 21) 05:45:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 05:45:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x428200, 0x188) 05:45:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:00 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:00 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 2777.727468] FAULT_INJECTION: forcing a failure. [ 2777.727468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2777.729930] CPU: 0 PID: 30574 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2777.730925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2777.731933] Call Trace: [ 2777.732267] [ 2777.732569] dump_stack_lvl+0xc1/0xf0 [ 2777.733091] should_fail_ex+0x4b4/0x5b0 [ 2777.733620] prepare_alloc_pages+0x178/0x500 [ 2777.734206] __alloc_pages+0x149/0x510 [ 2777.734722] ? __pfx___alloc_pages+0x10/0x10 [ 2777.735304] ? perf_trace_lock+0xc1/0x480 [ 2777.735864] ? __pfx_perf_trace_lock+0x10/0x10 [ 2777.736458] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2777.737192] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2777.737935] alloc_pages+0x1a0/0x260 [ 2777.738429] filemap_alloc_folio+0x374/0x410 [ 2777.738992] ? __pfx_lock_release+0x10/0x10 [ 2777.739553] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2777.740184] ? xas_load+0x6a/0x140 [ 2777.740675] __filemap_get_folio+0x32b/0xcd0 [ 2777.741269] ? __pfx___filemap_get_folio+0x10/0x10 [ 2777.741910] ? lock_acquire.part.0+0xec/0x320 [ 2777.742513] ? lock_is_held_type+0x9f/0x120 [ 2777.743066] ? find_held_lock+0x2c/0x110 [ 2777.743620] pagecache_get_page+0x2e/0x130 [ 2777.744190] ext4_da_write_begin+0x328/0x9c0 [ 2777.744792] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2777.745428] generic_perform_write+0x25a/0x580 [ 2777.746047] ? __pfx_generic_perform_write+0x10/0x10 [ 2777.746680] ? __pfx_file_modified_flags+0x10/0x10 [ 2777.747357] ext4_buffered_write_iter+0x164/0x460 [ 2777.747994] ext4_file_write_iter+0x3ff/0x1930 [ 2777.748605] ? lock_acquire.part.0+0xec/0x320 [ 2777.749189] ? ksys_write+0x12b/0x260 [ 2777.749731] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2777.750383] ? trace_lock_acquire+0x170/0x1e0 [ 2777.750976] ? ksys_write+0x12b/0x260 [ 2777.751501] ? lock_is_held_type+0x9f/0x120 [ 2777.752066] vfs_write+0x9b4/0xdc0 [ 2777.752566] ? __pfx_vfs_write+0x10/0x10 [ 2777.753097] ? __pfx___fget_files+0x10/0x10 [ 2777.753674] ? __fget_files+0x270/0x480 [ 2777.754215] ksys_write+0x12b/0x260 [ 2777.754718] ? __pfx_ksys_write+0x10/0x10 [ 2777.755273] ? rcu_read_lock_sched_held+0x42/0x80 [ 2777.755929] do_syscall_64+0x3f/0x90 [ 2777.756429] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2777.757093] RIP: 0033:0x7fd00c11db19 [ 2777.757568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2777.759733] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2777.760678] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2777.761539] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2777.762418] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2777.763281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2777.764164] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2777.765064] 05:45:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 05:45:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0xdb, 0x200000) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="70ae72dc8fdf86a574865089a763b7845dfe0bd3d30416ea9d602c98d69ed82d730bf8ff9278dfb513e88f0acd77f757939797e1878185", 0x37}, {&(0x7f0000001040)="4da5e4c0206c4e56144aa59731fdee56c26081ffb7a223c27d0542b3d4f85cb90852234e7e16981159a1b5c3b449116f5132f295cf0be18b8acfc311ba244c8d558bddc054bb66fc7684c447af892b185261b7c36f40b533f445d6fbb5f6083d433df82828ffe1701047c342d4df6302eb0e03c6ade599f1be2687f8bd076b654b300058966204a273f5341f09a0056eef99fc271d74c89a417f56db5097e7fa5287ae033e7fa6a0755763db0e5cefdc8e9e786f39b0cc52f3ea36b3e4320e38978b3761e2958383e8726b99bc0d7f9b4d2dd408a8d084193875553d39da5a1376f14538b36ddfbfbbe63a6057dfae57f182bdc58a60f391ce1d64edd34e214cf58b1163715559dcf25e699556a35ba39c972621602cd2169ddf0a49f267309fd863c686fc6cb2bcb1d1bc32499c42a7b9e42c4b57cf1654233af7f136e4c8a75ceb3bb578a2dd00d63cae5030af0c27c8097b1a1d3e2fbcb325070aac9b87da59fe8c0aaf12c5be10fa9abaa2db3e38734e0800a19730d8660cec0cb336a1747ec6294bf2a50e757af02231e26fac5fa45a3015b1dac4134bb648fd2764b328e83cadcd54e899f839f9e39635aff9ac97fd37335f0fd7885d01f6fef15b5a7fe1a5d667bad93880debd47eb4676c2b5ccff12446e468ca5c604bfe21038425d6c3a789460d1285d8bca614a95c2e259796345617ab9924cf26907174620c8bbc23a4fcab63db7bb8f4184dcdf0a901b93f255188c148ba0d32e6f53506fd2af6acf73b858d0db44f32dbe90ee67ee802880c77d0a596abd9085d5d21de7fd6e3f8f830579cada0f53b5b3d6a649cd57b22a62330d0b3a75e25dbd33f7e51a5acdacca9c876b95440758bc39089bf24a3adbfd44add2d543c453ad6eb2fe94468a969c861639a88a791bd0a155c5a6f2a6705bf857d33098453e01dc552ffc02ea811a85d118d63b9710fef886527c0589a0001d0d0a1b8e3d10f4988c3ded3de990256033417fe7d02043cade545e468ee56c834c54caf7a766b505f3b1db0ee6cc57a9a672e9ff9afa23c98216a731f669619608296b6adde1a6b1e27dbd35e1286783e0205908a45545157336fd565a3aa9897a838faaa6c5f4690eee4328a7cb5437ad109873133fc72c60d00b1fdc3fd71b89dcea13ba496bf76b497a65716eb87aeaea1825a3cae52db2cb3eeef0fd550d656c5ca92cb8a38625c796c2e3c48dd38866e82cd44bf314d75388b7f2f4ce2ac95a82332412a1afa1383acaae0061fab05f8f87148086f70bf5a64e2bb7e2f4562c8ecbc4700c06851d6d02dee225d49a34d407d5f38e318b6257c50b669c38c400d58a609f1aab940e2cd50416abb030d2c92c88d8ca9773ca76608bf290c7f76319e6f4bd2cf70180c8dc0cb7315e285ac944e7c9979874a0107f6917e109836b8534b6e3f84b2d363f906ea436b67ea122a463c077db61db295432185cc793b8a9b70a9a543670ceb5dffb30a16362b2036e67edb13adfd1a41027ba0fc27e3ab55f77d322d864a22d785955d338edb13a76de1c9300ba4ea2f4c9b7d032337d370b8faae12c4e7a87012940c70c4a1c28ebeab1948391b6e32ab439dc1ae81407bb5b439e4484a902f38666ad26fba49f7560e2a3901690b9634b757e6c531a1d1f0cea53a3de0863e5deaebc5bbe313be2817847b3505275202c401532dfd5a9b66493278617a6bd2571d50223a35945dce21dd92346865967b0025b588305168e7f36477d95081001f62878a6019fed9302c45e82bda7736f4c67af883259f30f82e8a6edc870a2fb01839cb2215aa61d44b4db7e9daa3cc8316ec244c09a3060b4585904194e1813e55879900813a07ad74e65338bce1443c568b4eeb72daaaad41df2a5ebbbe08adc7f63b534673a4f5a9b9da5ef0cd424e1baebdb62581b185784ce757d7784831d313bb1538d85db61d4c055624cd1e13bd2c9418fdac7ceb0de1aa371d4de8af509708a2a81871afb226ffe158fc9df325e823603e5b859becbda0ed990f52bd104f069566b40c1e9f218056f1df754e233bc21c81ada689a24fe6c7be61559e4ba149d99c8017e0158a7ffd99f5daf193f00cb7d258c69ee84cc7a5c8051076712fc0bb8128c2a0f062d53723c573cb8d81ccfd38f6bb2030fcbe4a02baa5151713c4abd0660c903111a314f2035ad619dbb61b3f7e407bd5f5f708dca7f41dfdc1ef2178ac6b8397eefcdce8fafa405751f70f422f99537044667b454ab20fbf7c6dd49817291746cb66645fc3b49a2be89e621ba9bf03252e6cadb2e9d42c918706a7d84fc7fd8cf602f51a7ccb79c79f8ce69fc458f76b60b3023182ccc12dd362bf493482fbc6219f97416e5064404cbefc5dfe0ffee1dfbd4a14307223505976fe83e5b967552cb955d7c85bfe2a13624e68d77d06ccb1e6680f71e2094aa3f063ef105c4192ea890225e10ca93c1d4fcb2a0845cc1a09d2ba9dc93e316c666fc6f1c9bed4c9114e20a15e39c7de67e5026d631991562aa0c5bd52135ea7434db000f71ec2b4ac21b37164bd79166a41b1f67bcc55c2b9731d70d45a78363c15fbbf9d3c6249683a6f6e63130433a35a1f82d1846ee80fc85d6df91a5cd7e1c2010e2b5fc599687030e27c3f788ab7ff8363d91f57a1a597fd7e7f73ccd3f71aa41c8d8e0a40ed1847517f6ceb08b5d3104ade5b1d731d47a7e6abab10f160a00e10a761cdedce996ff385cf134c6cbee599e3e1d4daf0705b455a1c186a7ba0056ff2f3b9a8bc2eae07568e9dd20e1f9c70456b31b43c7490de100a2f01d528ab26c69d8a52c2181b351d85af35deccfe006c0b6a334d1196501e805d3044cff7e39bb7f7f309eb2ba72bcc54298fd6ae1287659b827a0ed730041b5a06e4fd4bc67971b8b2d68192a53290468a696fdf5da780c1129b73d024c703091a5043de421e5be1e032a71d135bc5fe7842f3f854862c24af110df2648ee99424046eeb48558274c1cd36ec12d1b497ee94df0af7c95b80b257a282fb9781569c4f53dff97069406944ca99f0d9559da89a025a125cf953f047f5e4ef458d6aacf7e74bbca661e2fc7ffa2092d0ec0272e87fe23db9fae2124439debaa5857e8fba31570cb30b28904154d01ef9f43800f8edbbaf2ef618d81569d187db731024d8a5e7ec4832f837c7319f0d9989d1ce8ecbc86f7fce08eb05d4599df1eeb372989e06229357c19bd2d46304a072d0a9ef311de5f39aa9c7a0540f6c295f1cbd907e5a93dbfecac84bcfe6af8bf2356d7933562333703e7a994e9114873beafa7add5eefb9f923ab9bad99b121703f166a2b6de687ea65ebb2ed44e6419d2254e809f5b2035af545fd31af50ae46b7fc1906dc4e61e6e8af6282f44e36206bdb3c44eff2168c003ce41b23e7a900a7c0de015a4bb5d62bf9dc624b6e5b519bc9be85b1e75ecf42bc2aa754480259c10e07177a2d310559e2c4cd5829bd3db3f434e97e0d8d7f944a92852c5aea2e10268f4da5201c1aacde283ed34f92c6c82f2bacfa393d393705e05cbb50f4c68bd5f7f8f0b63755b6157f6f283ab8ba8b326e9cec6fd14dabd78475c7df6d153b10318e37ea146832b21c2e29cd10c8ed4c49f4a100d9ad4355e65e6b55eab7212acd3cfea00f1db3074cecadf6a9baf41a96146a2cc0bdd2f092b473beaa3671c9b778edbaeb243c60cd31fda8418ea073d6520f09ae7fdd7fd6ee9470a2a5b6b23b962c7d27aeed6f54d471b36c085dace964cd45b02aa9bf31052826ee8cbac53b0ba28772e7aeabb0b43ffaeaa22b0804bc437897a7c65ea0f975973449c9decda6ea3813837e53ca2d0be321968dd57ce26fdfafb5d71729a0e029de451c58d33fe137691e31ebfd1570c3ec40ca6f8a5f3725896c73f198c23fbca5206f623175cf473281397efbd54c00de5f7383bd33a597181a52260fa001f926bb2d63a250ca965ab36fe01153207d64dba4f551888afae54cf87416ec3d23b158c9d63a05a3d006f27558cfc7d646d8faec09d0a51936d307457a48dbfa37808b7972d65e83d9ead998d8c4ec52759d5db91a67bd9b7112bcc00f4530369e2b22389fb4f44802a448478dc3d64abdcfcf5357208629f87bf267293f3b740da59165c6d04f97f0c5fe95430dc219bf62c97735a299eb6c80a6934a494a75616b29c8853372a2db530d83794bf5dfc72456aeb1e8b368ed9308d96b95797dba29e992a6dc4920c1c6985539aa2def165a3a10489db33207c3694b15f710fd29c49401a860e4aafd0bb5565053d4209b0e30fa1df7f36d1e16854d6426501d4e6aaf6d7aab3760e6ac720d16f357c9bf26eaaf525d206e4815ef0df2653dbe1aab85022432f6b89705921b20b2fa2bcffa8987e583244ed1093e0865b57b18cb0d64c0d3f2c16b409c891cc4e96116a2e20bbde80fb2be552796a12d5e9ccbbf8ad86dea989fa7bfe9456edc2d6efd5757187e829455f511afe79e3dec3f3c2574f0ea20841f2639162ef9b415dd322db899bc0beb3a7c58be98ff37f77170b3e5e4832eae8044d690bd07507c36f2c6f01b9d9ee7427c415b308d5a67e066726ceb18da480530809c70782e30172ce9b287868c0ba99ee0ec6047863ed244cda3050f5b54404ab4ef72050bda370be7dbef9c0654b45d4294c2140749d96b54d4d81fb7c4d23b70a184d9078122334ee4e874da5d0b0710ac739926c7d38197f4433372924e57c75647dafb17e5f19a6b65e48c837a2c41f38983b3e2e2a6d0f059ebb96b427b716232bd043af18bf72a70f88e17a868835aeebf2c64eb6a3d5e1f7f5048ca5919189786b2708f1a309b2fcdcf73138a9cfcd1b985b86a92beb020eea8883825fc1425406df5b276152050fabac59d5609406b9932800014b2a9321c825a6f1467225771c41449e71e119efefaec4a01578350bc4c90b2c52de928bb42932f45108992ce5130b2ae3631c0423960720dac7303a9b759a414c28b285e66cb93aa54ef81a345585881b7971a4ab1f53faccb5b72bc4e464f9877119474df88f78fb050284b5ffd29a09fbb7389f87b2dcfce897ae07e810eec6d28778f51138ddcdda901ad3344a6f9dbd2149bd135c4462b20a15dc21c150fc62e6d0e45713e7727f759d9e788138db511ea77e3bcc86081f6af96d364583fe69687eb93c5789f04f55805a2743eaa91180d61dc80a7126f082689fbf03ea9c5b59d5400b63bba803f18026c7fe43a8d48380671dcc7093f3a1c8af5d91e8d7389e134fd7c30dde2925d20829396a306ce572a1c4518c44bfdc374d050e00971e67f89878a93f9eaacf22ce9bb8e1a2c3657ab4fa88840e50827c0aa807cd813272be0c65896bb13cb7cb7bf948bd1dd6c372439a147fc68fddec9aac6c91c77ac2a48e9423a163d8852d3388549168882af335c11f538daf0dd82a330639c0d8ac44dd20dabbe5c4f01991085ade8aef4bef39afab27eb93de087ec0599749ce0e17fe0117089359d35ad37f927fcebb5ca736309ce710bea0b6123c0f368528d21923cb5e8390206dfb72805a79714df1b6248aecc893b888e8ecd85f5d69ed45b80041ae87e68a6d32191d1f1c9053b9a29d77ae27dbe09b2cbe55f26b52ad723f171b448486b61f720c5e75505b7e4727f5c95d4b438d14189956e0dd401164db762e69e31dcd37485f55f7b10a491b43f0cab0520e6cc5687d5444e4cca4d25003377ce84551a5885c66cf681f87421d6b663be9ffb8f64af37bfa94e7b1f78c98e98b5af1eb06f92ddf4bde72e169b1", 0x1000}, {&(0x7f0000000080)="391a98e44af63fb4a770fa13df1c68b5715c27dbf2eb355de99ddddcd0dbe441b58316fe8b8f2c4aa7073c74315cf2ea5175e4ae", 0x34}], 0x3, 0x8, 0x3) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:45:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 22) 05:45:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 05:45:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xf000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:15 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x200803, 0x1cb) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x7fffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:45:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) clone3(&(0x7f0000000280)={0x1090a800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x18}, &(0x7f00000000c0)=""/123, 0x7b, &(0x7f0000000140)=""/184, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3, {r0}}, 0x58) 05:45:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 05:45:15 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 23) 05:45:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x80000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffff7c02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 2793.099349] FAULT_INJECTION: forcing a failure. [ 2793.099349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2793.101319] CPU: 0 PID: 30830 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2793.102355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2793.103318] Call Trace: [ 2793.103656] [ 2793.103944] dump_stack_lvl+0xc1/0xf0 [ 2793.104492] should_fail_ex+0x4b4/0x5b0 [ 2793.105012] copyin+0x19/0x120 [ 2793.105463] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2793.106115] ? ext4_da_write_begin+0x63e/0x9c0 [ 2793.106722] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2793.107403] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2793.108079] generic_perform_write+0x2cf/0x580 [ 2793.108665] ? __pfx_generic_perform_write+0x10/0x10 [ 2793.109319] ? __pfx_file_modified_flags+0x10/0x10 [ 2793.109966] ext4_buffered_write_iter+0x164/0x460 [ 2793.110604] ext4_file_write_iter+0x3ff/0x1930 [ 2793.111174] ? lock_acquire.part.0+0xec/0x320 [ 2793.111786] ? ksys_write+0x12b/0x260 [ 2793.112309] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2793.112950] ? trace_lock_acquire+0x170/0x1e0 [ 2793.113529] ? ksys_write+0x12b/0x260 [ 2793.114051] ? lock_is_held_type+0x9f/0x120 [ 2793.114598] vfs_write+0x9b4/0xdc0 [ 2793.115110] ? __pfx_vfs_write+0x10/0x10 [ 2793.115633] ? __pfx___fget_files+0x10/0x10 [ 2793.116221] ? __fget_files+0x270/0x480 [ 2793.116764] ksys_write+0x12b/0x260 [ 2793.117262] ? __pfx_ksys_write+0x10/0x10 [ 2793.117798] ? rcu_read_lock_sched_held+0x42/0x80 [ 2793.118425] do_syscall_64+0x3f/0x90 [ 2793.118903] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2793.119568] RIP: 0033:0x7fd00c11db19 [ 2793.120037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2793.122232] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2793.123161] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2793.124047] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2793.124923] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2793.125794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2793.126669] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2793.127577] 05:45:29 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 24) 05:45:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x200000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9}, 0x0) 05:45:29 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x6, 0x10000) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:45:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:29 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffc02, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2806.519389] FAULT_INJECTION: forcing a failure. [ 2806.519389] name failslab, interval 1, probability 0, space 0, times 0 [ 2806.520909] CPU: 1 PID: 30961 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2806.521499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2806.522081] Call Trace: [ 2806.522260] [ 2806.522426] dump_stack_lvl+0xc1/0xf0 [ 2806.522713] should_fail_ex+0x4b4/0x5b0 [ 2806.523022] ? jbd2__journal_start+0x194/0x6b0 [ 2806.523341] should_failslab+0x9/0x20 [ 2806.523626] kmem_cache_alloc+0x5a/0x320 [ 2806.523929] jbd2__journal_start+0x194/0x6b0 [ 2806.524266] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2806.524593] ? ext4_dirty_inode+0xa5/0x130 [ 2806.524920] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2806.525239] ext4_dirty_inode+0xa5/0x130 [ 2806.525542] __mark_inode_dirty+0x1aa/0xee0 [ 2806.525854] generic_write_end+0x319/0x3d0 [ 2806.526164] ext4_da_write_end+0x162/0x950 [ 2806.526465] generic_perform_write+0x318/0x580 [ 2806.526827] ? __pfx_generic_perform_write+0x10/0x10 [ 2806.527174] ? __pfx_file_modified_flags+0x10/0x10 [ 2806.527555] ext4_buffered_write_iter+0x164/0x460 [ 2806.527888] ext4_file_write_iter+0x3ff/0x1930 [ 2806.528244] ? lock_acquire.part.0+0xec/0x320 [ 2806.528569] ? ksys_write+0x12b/0x260 [ 2806.528854] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2806.529229] ? trace_lock_acquire+0x170/0x1e0 [ 2806.529550] ? ksys_write+0x12b/0x260 [ 2806.529847] ? lock_is_held_type+0x9f/0x120 [ 2806.530153] vfs_write+0x9b4/0xdc0 [ 2806.530428] ? __pfx_vfs_write+0x10/0x10 [ 2806.530718] ? __pfx___fget_files+0x10/0x10 [ 2806.531036] ? __fget_files+0x270/0x480 [ 2806.531326] ksys_write+0x12b/0x260 [ 2806.531602] ? __pfx_ksys_write+0x10/0x10 [ 2806.531909] ? rcu_read_lock_sched_held+0x42/0x80 [ 2806.532282] do_syscall_64+0x3f/0x90 [ 2806.532550] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2806.532936] RIP: 0033:0x7fd00c11db19 [ 2806.533206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2806.534459] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2806.534993] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2806.535496] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2806.535991] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2806.536505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2806.537003] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2806.537524] 05:45:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x40000, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/204, 0xcc}], 0x1, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f00000001c0)={0x3, 0x200, 0x6}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)={0x0, @aes128, 0x0, @desc1}) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) syz_open_dev$sg(&(0x7f0000000280), 0x962, 0x1a1002) 05:45:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:44 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 25) 05:45:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 05:45:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x80ffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd1}, 0x0) 05:45:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc00000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:44 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x8100, 0x18) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:45:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:58 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 26) 05:45:58 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x20, 0x0, 0x4f) r4 = pidfd_getfd(r2, r0, 0x0) sendfile(r3, r4, &(0x7f0000000140)=0x7, 0x401) fallocate(r2, 0x20, 0x0, 0x4f) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000000)) 05:45:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 05:45:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xf0ffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:45:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 05:45:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:58 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:45:59 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000140)=@v3={0x3000002, [], 0xee01}, 0x18, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="184e4cfe4f5af7107267ed10ed6a114bc41852da6d83d559818b691c68d15c20de38a6662357da3ff1785ffe92bda86fbe97f6313213652b4881e93382390e4606cb826566745988d42228b12368a22530734eab7b7a3f86eb705ddd0b8b7c12bd1240bd03f2a5fa828242e49c437c893bf7149c91049e61f3b35916dceb3aa84e3a1d2b378cfa1be62ce17b98cd7a93a312b42dbbcc738d9a2ea1933f17cef8c7f6a8cecaf71652ff542310d7bf7517f5b4a5ecbf528ef45d4044600a0fa4102be99552f62118d875c1162ea6410fef246e6a5b9b3a4be2f09e4c", 0xdb, 0x4}, {&(0x7f0000000180)="3e1cf027e9907528a758346f3355687d1935ac73adc0b465d60bf4d0b6977635908baac1d4bb07ef707878ec3742da438d45733aaef3169bd64bd069c4652f2c55cfbbf8ae71d73a809db332217924dd1c049e557dcaf5d66430f415b4230ded7c92399060d574cd21ffc3980bb2121fcf442e119d6883cff27548b098619160", 0x80, 0x5}, {&(0x7f0000000240)="41777e324893a5e28e9a32d22e555921c7", 0x11, 0x5}], 0x1d002, &(0x7f0000000300)=ANY=[@ANYBLOB='subj_role=(#^,obj_role=),$(},uid=', @ANYRESOCT=r3, @ANYBLOB=',fsconuext=unconfined_ser=\\,smackfsroot=keyring\x00,ov/sg#\x00,fowner<\x00'/82, @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRES64=r3, @ANYRESHEX=r3]) openat(r4, &(0x7f00000003c0)='./file0\x00', 0x0, 0x100) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1b675dc8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008004}, 0x4008004) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), 0x20000, &(0x7f0000000700)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x7}}, {@access_user}, {@access_client}, {@afid={'afid', 0x3d, 0x7343}}, {@cache_fscache}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@appraise}, {@context={'context', 0x3d, 'sysadm_u'}}, {@dont_appraise}]}}) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000500)={0x75, 0x2, 0x5a9, 0x8001, 0x4}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000004c0)={'veth1_to_bridge\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x8, './file0\x00'}}) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1274, 0x0) [ 2836.324215] FAULT_INJECTION: forcing a failure. [ 2836.324215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2836.326066] CPU: 0 PID: 31332 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2836.327204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2836.328321] Call Trace: [ 2836.328706] [ 2836.329036] dump_stack_lvl+0xc1/0xf0 [ 2836.329608] should_fail_ex+0x4b4/0x5b0 [ 2836.330204] prepare_alloc_pages+0x178/0x500 [ 2836.330865] __alloc_pages+0x149/0x510 [ 2836.331439] ? __pfx___alloc_pages+0x10/0x10 [ 2836.332089] ? perf_trace_lock+0xc1/0x480 [ 2836.332714] ? __pfx_perf_trace_lock+0x10/0x10 [ 2836.333330] ? mark_lock.part.0+0xef/0x2f30 [ 2836.333946] alloc_pages+0x1a0/0x260 [ 2836.334460] filemap_alloc_folio+0x374/0x410 [ 2836.335054] ? __pfx_lock_release+0x10/0x10 [ 2836.335649] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2836.336314] ? xas_load+0x6a/0x140 [ 2836.336855] __filemap_get_folio+0x32b/0xcd0 [ 2836.337490] ? __pfx___filemap_get_folio+0x10/0x10 [ 2836.338188] ? asm_exc_page_fault+0x26/0x30 [ 2836.338810] pagecache_get_page+0x2e/0x130 [ 2836.339409] ext4_da_write_begin+0x328/0x9c0 [ 2836.340057] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2836.340771] generic_perform_write+0x25a/0x580 [ 2836.341421] ? __pfx_generic_perform_write+0x10/0x10 [ 2836.342115] ? __pfx_file_modified_flags+0x10/0x10 [ 2836.342833] ext4_buffered_write_iter+0x164/0x460 [ 2836.343507] ext4_file_write_iter+0x3ff/0x1930 [ 2836.344146] ? lock_acquire.part.0+0xec/0x320 [ 2836.344793] ? ksys_write+0x12b/0x260 [ 2836.345372] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2836.346059] ? trace_lock_acquire+0x170/0x1e0 [ 2836.346692] ? ksys_write+0x12b/0x260 [ 2836.347248] ? lock_is_held_type+0x9f/0x120 [ 2836.347861] vfs_write+0x9b4/0xdc0 [ 2836.348380] ? __pfx_vfs_write+0x10/0x10 [ 2836.348971] ? __pfx___fget_files+0x10/0x10 [ 2836.349586] ? __fget_files+0x270/0x480 [ 2836.350180] ksys_write+0x12b/0x260 [ 2836.350700] ? __pfx_ksys_write+0x10/0x10 [ 2836.351306] ? rcu_read_lock_sched_held+0x42/0x80 [ 2836.351991] do_syscall_64+0x3f/0x90 [ 2836.352519] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2836.353247] RIP: 0033:0x7fd00c11db19 [ 2836.353767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2836.356054] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2836.357093] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2836.358036] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2836.358986] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2836.359935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2836.360894] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2836.361874] 05:45:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:45:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:46:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:11 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 27) 05:46:11 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) mknodat$loop(r1, &(0x7f0000000000)='./file0\x00', 0x20, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:46:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x500}, 0x0) 05:46:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:11 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:46:11 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048c2d6, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 05:46:12 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:46:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048d6c2, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:12 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 28) 05:46:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x3000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:46:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x300}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2849.577150] FAULT_INJECTION: forcing a failure. [ 2849.577150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2849.578583] CPU: 1 PID: 31710 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2849.579280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2849.579980] Call Trace: [ 2849.580214] [ 2849.580419] dump_stack_lvl+0xc1/0xf0 [ 2849.580787] should_fail_ex+0x4b4/0x5b0 [ 2849.581155] copyin+0x19/0x120 [ 2849.581461] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2849.581922] ? ext4_da_write_begin+0x63e/0x9c0 [ 2849.582327] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2849.582807] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2849.583248] generic_perform_write+0x2cf/0x580 [ 2849.583657] ? __pfx_generic_perform_write+0x10/0x10 [ 2849.584089] ? __pfx_file_modified_flags+0x10/0x10 [ 2849.584540] ext4_buffered_write_iter+0x164/0x460 [ 2849.584980] ext4_file_write_iter+0x3ff/0x1930 [ 2849.585366] ? mark_held_locks+0x9e/0xe0 [ 2849.585727] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2849.586184] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2849.586613] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2849.587042] vfs_write+0x9b4/0xdc0 [ 2849.587369] ? __pfx_vfs_write+0x10/0x10 [ 2849.587653] ? __pfx___fget_files+0x10/0x10 [ 2849.588033] ? __fget_files+0x270/0x480 [ 2849.588403] ksys_write+0x12b/0x260 [ 2849.588730] ? __pfx_ksys_write+0x10/0x10 [ 2849.589112] ? rcu_read_lock_sched_held+0x42/0x80 [ 2849.589531] do_syscall_64+0x3f/0x90 [ 2849.589787] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2849.590116] RIP: 0033:0x7fd00c11db19 [ 2849.590355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2849.591424] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2849.591890] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2849.592321] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2849.592757] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.593197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2849.593631] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2849.594080] 05:46:26 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 29) 05:46:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x700}, 0x0) 05:46:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x27cffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x600801, 0x10) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000040)) chdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x9a9) 05:46:26 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x4000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:46:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x6600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2863.460889] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:46:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 05:46:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:26 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:46:26 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 30) 05:46:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 31) 05:46:41 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x80, 0x20000) 05:46:41 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3e00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 05:46:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x5000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 2878.540839] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:46:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x80000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd100}, 0x0) 05:46:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x6000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:46:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x400001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 05:46:53 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 32) 05:46:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2890.697786] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:46:53 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1, 0x21, 0x2}, 0x18) openat(r0, 0x0, 0xc4fdf43ba2a67e07, 0x4) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:46:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x30000}, 0x0) 05:46:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:46:53 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="af8c88110f94c438b1d3a63e539b36cff9fb3fe3b324b8ad840c6bae044d39efb5bae3fdddbe0c2792130fc8c1ff1468eeb3087f0197c61e3150c93716d421172e2ed0218528a236d0", 0x49, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:46:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:46:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1004000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x7000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x5b2f465a00, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:47:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 05:47:07 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 33) 05:47:07 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:47:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2fcffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2904.557441] FAULT_INJECTION: forcing a failure. [ 2904.557441] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2904.560114] CPU: 0 PID: 32239 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2904.561188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2904.562257] Call Trace: [ 2904.562606] [ 2904.562918] dump_stack_lvl+0xc1/0xf0 [ 2904.563459] should_fail_ex+0x4b4/0x5b0 [ 2904.564022] copyin+0x19/0x120 [ 2904.564482] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2904.565195] ? ext4_da_write_begin+0x63e/0x9c0 [ 2904.565840] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2904.566602] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2904.567289] generic_perform_write+0x2cf/0x580 [ 2904.567926] ? __pfx_generic_perform_write+0x10/0x10 [ 2904.568602] ? __pfx_file_modified_flags+0x10/0x10 [ 2904.569296] ext4_buffered_write_iter+0x164/0x460 [ 2904.569997] ext4_file_write_iter+0x3ff/0x1930 [ 2904.570638] ? lock_acquire.part.0+0xec/0x320 [ 2904.571294] ? ksys_write+0x12b/0x260 [ 2904.571868] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2904.572552] ? trace_lock_acquire+0x170/0x1e0 [ 2904.573199] ? ksys_write+0x12b/0x260 [ 2904.573768] ? lock_is_held_type+0x9f/0x120 [ 2904.574381] vfs_write+0x9b4/0xdc0 [ 2904.574913] ? __pfx_vfs_write+0x10/0x10 [ 2904.575495] ? __pfx___fget_files+0x10/0x10 [ 2904.576114] ? __fget_files+0x270/0x480 [ 2904.576709] ksys_write+0x12b/0x260 [ 2904.577246] ? __pfx_ksys_write+0x10/0x10 [ 2904.577865] ? rcu_read_lock_sched_held+0x42/0x80 [ 2904.578548] do_syscall_64+0x3f/0x90 [ 2904.579093] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2904.579822] RIP: 0033:0x7fd00c11db19 [ 2904.580338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2904.582741] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2904.583767] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2904.584724] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2904.585688] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2904.586647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2904.587606] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2904.588603] 05:47:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 05:47:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8040000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:07 executing program 0: timer_create(0x1, &(0x7f00000001c0)={0x0, 0x2d, 0x4, @thr={&(0x7f00000000c0)="90d354709b898a4054c42452", &(0x7f0000000100)="15d3ba895e906151f87cda057012c4fd5fac31030fab3c9c273c2bff936f1e24d78f22c7c4d355d3a77e98c7d10ccee318e9dd663823017a544f4375f9526ccf11b25e99a60e745d68dc3baa48e6fa3c847c83e656c1e369215669edabbf39bee4b40154c170e93e3359547c7dd3b9f6a0a004f1d5dcd7c2e1a596b06a80f66ec2c4a9e6498966577f01149d5a97962003db87bb8514b1e9ea"}}, &(0x7f0000000240)=0x0) timer_delete(r0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000280)={0x3afb, 0x7, 0x3, 0x488e, 0x7, [{0x91a9, 0x8, 0x100, '\x00', 0x2002}, {0x0, 0x8000, 0x9f29, '\x00', 0x82}, {0x7, 0x7, 0xe69, '\x00', 0x600}, {0x3, 0x84, 0x100, '\x00', 0x1000}, {0xfed, 0x10001, 0x4, '\x00', 0x2101}, {0x9, 0x577, 0xed4, '\x00', 0x188}, {0xffffffff, 0xcd9, 0x7ff, '\x00', 0x2606}]}) openat(r2, &(0x7f0000000080)='./file0\x00', 0x101000, 0x100) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000000)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 05:47:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:21 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 34) 05:47:21 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:47:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:21 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000040)) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:47:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 05:47:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2919.357105] FAULT_INJECTION: forcing a failure. [ 2919.357105] name failslab, interval 1, probability 0, space 0, times 0 [ 2919.359150] CPU: 1 PID: 32482 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2919.360151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2919.361149] Call Trace: [ 2919.361483] [ 2919.361807] dump_stack_lvl+0xc1/0xf0 [ 2919.362309] should_fail_ex+0x4b4/0x5b0 [ 2919.362830] ? jbd2__journal_start+0x194/0x6b0 [ 2919.363422] should_failslab+0x9/0x20 [ 2919.363916] kmem_cache_alloc+0x5a/0x320 [ 2919.364448] jbd2__journal_start+0x194/0x6b0 [ 2919.365028] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2919.365637] ? ext4_dirty_inode+0xa5/0x130 [ 2919.366196] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2919.366796] ext4_dirty_inode+0xa5/0x130 [ 2919.367331] __mark_inode_dirty+0x1aa/0xee0 [ 2919.367899] generic_write_end+0x319/0x3d0 [ 2919.368455] ext4_da_write_end+0x162/0x950 [ 2919.369028] generic_perform_write+0x318/0x580 [ 2919.369633] ? __pfx_generic_perform_write+0x10/0x10 [ 2919.370283] ? __pfx_file_modified_flags+0x10/0x10 [ 2919.370959] ext4_buffered_write_iter+0x164/0x460 [ 2919.371575] ext4_file_write_iter+0x3ff/0x1930 [ 2919.372161] ? lock_acquire.part.0+0xec/0x320 [ 2919.372754] ? ksys_write+0x12b/0x260 [ 2919.373270] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2919.373905] ? trace_lock_acquire+0x170/0x1e0 [ 2919.374508] ? ksys_write+0x12b/0x260 [ 2919.375017] ? lock_is_held_type+0x9f/0x120 [ 2919.375585] vfs_write+0x9b4/0xdc0 [ 2919.376071] ? __pfx_vfs_write+0x10/0x10 [ 2919.376610] ? __pfx___fget_files+0x10/0x10 [ 2919.377171] ? __fget_files+0x270/0x480 [ 2919.377747] ksys_write+0x12b/0x260 [ 2919.378251] ? __pfx_ksys_write+0x10/0x10 [ 2919.378817] ? rcu_read_lock_sched_held+0x42/0x80 [ 2919.379438] do_syscall_64+0x3f/0x90 [ 2919.379940] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2919.380604] RIP: 0033:0x7fd00c11db19 [ 2919.381081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2919.383267] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2919.384230] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2919.385093] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2919.385998] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2919.386884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2919.387755] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2919.388652] 05:47:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:22 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) sendto$packet(r1, &(0x7f0000000000)="94d27b76583e21227a393730b9f26489238f8d031acc7d42be0976c5fa9a2503a6f673e031d8c940df9819071d714d85f4783ed257d35bee5f001fcca7dcf71b5b10e28be4c1c725a601c91e193b2b9be0f4c96d337d0693", 0x58, 0x4004, &(0x7f0000000080)={0x11, 0xc, 0x0, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:47:22 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x10000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 05:47:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 35) 05:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 05:47:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x12000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:47:39 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) open_tree(r1, &(0x7f0000000000)='./file0\x00', 0x80800) 05:47:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x66000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0}) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) r5 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x1266e17e89f0541, 0x292) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001040)={r4, r3, "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", "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"}) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2000008, 0x2010, r5, 0x10000000) r7 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x2007, @fd=r7, 0x5, 0x3, 0x6212, 0xc, 0x1, {0x3}}, 0x3ddfd68) 05:47:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:47:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3e000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:39 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x301002, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x8d77, 0x400040) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:47:52 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 36) 05:47:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 05:47:52 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x4f) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 05:47:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfeffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:47:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x12010000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2949.961987] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:47:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfffffc02}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2950.003984] FAULT_INJECTION: forcing a failure. [ 2950.003984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2950.004881] CPU: 1 PID: 32854 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2950.005419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2950.005955] Call Trace: [ 2950.006145] [ 2950.006306] dump_stack_lvl+0xc1/0xf0 [ 2950.006587] should_fail_ex+0x4b4/0x5b0 [ 2950.006872] prepare_alloc_pages+0x178/0x500 [ 2950.007187] __alloc_pages+0x149/0x510 [ 2950.007470] ? __pfx___alloc_pages+0x10/0x10 [ 2950.007777] ? perf_trace_lock+0xc1/0x480 [ 2950.008070] ? __pfx_perf_trace_lock+0x10/0x10 [ 2950.008390] ? mark_lock.part.0+0xef/0x2f30 [ 2950.008704] alloc_pages+0x1a0/0x260 [ 2950.008967] filemap_alloc_folio+0x374/0x410 [ 2950.009278] ? __pfx_lock_release+0x10/0x10 [ 2950.009589] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2950.009929] ? xas_load+0x6a/0x140 [ 2950.010202] __filemap_get_folio+0x32b/0xcd0 [ 2950.010513] ? __pfx___filemap_get_folio+0x10/0x10 [ 2950.010856] ? asm_exc_page_fault+0x26/0x30 [ 2950.011167] pagecache_get_page+0x2e/0x130 [ 2950.011467] ext4_da_write_begin+0x328/0x9c0 [ 2950.011782] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2950.012131] generic_perform_write+0x25a/0x580 [ 2950.012456] ? __pfx_generic_perform_write+0x10/0x10 [ 2950.012801] ? __pfx_file_modified_flags+0x10/0x10 [ 2950.013159] ext4_buffered_write_iter+0x164/0x460 [ 2950.013496] ext4_file_write_iter+0x3ff/0x1930 [ 2950.013812] ? lock_acquire.part.0+0xec/0x320 [ 2950.014150] ? ksys_write+0x12b/0x260 [ 2950.014436] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2950.014771] ? trace_lock_acquire+0x170/0x1e0 [ 2950.015097] ? ksys_write+0x12b/0x260 [ 2950.015370] ? lock_is_held_type+0x9f/0x120 [ 2950.015676] vfs_write+0x9b4/0xdc0 [ 2950.015941] ? __pfx_vfs_write+0x10/0x10 [ 2950.016229] ? __pfx___fget_files+0x10/0x10 [ 2950.016536] ? __fget_files+0x270/0x480 [ 2950.016833] ksys_write+0x12b/0x260 [ 2950.017100] ? __pfx_ksys_write+0x10/0x10 [ 2950.017397] ? rcu_read_lock_sched_held+0x42/0x80 [ 2950.017741] do_syscall_64+0x3f/0x90 [ 2950.018011] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2950.018376] RIP: 0033:0x7fd00c11db19 [ 2950.018629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2950.019799] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2950.020303] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2950.020770] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2950.021238] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.021703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2950.022184] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2950.022674] 05:47:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) accept4(r0, &(0x7f0000000000)=@ieee802154={0x24, @long}, &(0x7f0000000080)=0x80, 0x80800) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:47:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:47:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x15) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x401, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:47:52 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 37) 05:47:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x18000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:47:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 05:47:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:47:52 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="7b646d2c01dcb94966"], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)='/dev/sg#\x00') r0 = syz_open_dev$sg(&(0x7f0000001000), 0x400, 0x0) r1 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='%{\x00', 0xfffffffffffffff8) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "be52c58e22fffc8e3137f5652f08ad0fbc860ffdef5764eca1babdf4532bb6481826cf6eef3e061066cf5ad882bd67f6b500006a36cb74fe0fd62f8aea6000", 0x22}, 0x48, r1) keyctl$chown(0x4, r2, 0xee00, 0x0) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, r2, r3, 0x0) 05:47:52 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1b300000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x800000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:08 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x119) fallocate(r0, 0x20, 0x0, 0x4f) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:48:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:08 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 38) 05:48:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 05:48:08 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa9, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:09 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x752, 0x2, &(0x7f0000000240)=[{&(0x7f0000000080)="b84b65c85b178ec3c8a5866fa21a9a4155f435d17b8a04540405300ecb8158d202bb81318304d2223ffca545f81ae03f2645adbfe8238000ccb0a73385ccd1510dd0a86179d0dbcb4b28345c77e59ba253596782dd117564a0608f86b527ba9f958adc3a7dac3e9302fd729d120ebce9e98325ad4637d23198db8033c228a02ffe9bfadd170cfe57f8c84393358206a0a87aeabb5b715181733f7d7bef791ebf060db025d0bbcbec1526ac3fc0349d936ced8cf7a21923b9bdbcd7134699", 0xbe, 0x4}, {&(0x7f0000000140)="807e669bec2e0945635b935361fda120b1a54d8383afe1d4c5883eab169afa898f2cd14de6b0e680f62fe32941bd8a11cfbebe51bc64b68a7ca3d6cdaaac3ffccb46de8af81c6ad02af5f7eb89b31d55deb8bdcbc684d1b33ddd393bebd0f04bb587aee91a7e0a414d1916b5745245e72d2a0b2a208e031177c6bc6cb56cffbeb488cd23a3d18cc3f97b74912b3c1d1f04a92b2e7de974b377bb970c674b92db", 0xa0, 0xfffffffffffffffd}], 0x1000404, &(0x7f0000000280)=ANY=[@ANYBLOB='huge=advise,Dont_appraise,@']) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r3 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x7291f3db5fdd1a26, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) 05:48:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000001000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 2966.377109] FAULT_INJECTION: forcing a failure. [ 2966.377109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2966.379299] CPU: 1 PID: 33115 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2966.380278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2966.381255] Call Trace: [ 2966.381580] [ 2966.381869] dump_stack_lvl+0xc1/0xf0 [ 2966.382397] should_fail_ex+0x4b4/0x5b0 [ 2966.382917] copyin+0x19/0x120 [ 2966.383345] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2966.383998] ? ext4_da_write_begin+0x63e/0x9c0 [ 2966.384580] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2966.385269] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2966.385917] generic_perform_write+0x2cf/0x580 [ 2966.386527] ? __pfx_generic_perform_write+0x10/0x10 [ 2966.387172] ? __pfx_file_modified_flags+0x10/0x10 [ 2966.387835] ext4_buffered_write_iter+0x164/0x460 [ 2966.388460] ext4_file_write_iter+0x3ff/0x1930 [ 2966.389052] ? lock_acquire.part.0+0xec/0x320 [ 2966.389649] ? ksys_write+0x12b/0x260 [ 2966.390174] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2966.390806] ? trace_lock_acquire+0x170/0x1e0 [ 2966.391407] ? ksys_write+0x12b/0x260 [ 2966.391916] ? lock_is_held_type+0x9f/0x120 [ 2966.392481] vfs_write+0x9b4/0xdc0 [ 2966.392966] ? __pfx_vfs_write+0x10/0x10 [ 2966.393502] ? __pfx___fget_files+0x10/0x10 [ 2966.394046] ? __fget_files+0x270/0x480 [ 2966.394615] ksys_write+0x12b/0x260 [ 2966.395092] ? __pfx_ksys_write+0x10/0x10 [ 2966.395645] ? rcu_read_lock_sched_held+0x42/0x80 [ 2966.396252] do_syscall_64+0x3f/0x90 [ 2966.396755] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2966.397396] RIP: 0033:0x7fd00c11db19 [ 2966.397871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2966.400053] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2966.400986] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2966.401861] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2966.402758] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2966.403629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2966.404504] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2966.405412] 05:48:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x21030000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 05:48:09 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x2, 0x20000) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="3811cc6e01b620398f3f80e4a41ffdf2ba5c901c6363768978fa3aa9f5a91bd0c945bab78bf2e387a761c2f43d7afc1762d65dbf09afee5f30bfdbe00ede51b9408d7d11274d678dc2c8e540d2327ff91932c788176e659462e343b735dd92a36d8546768235f537ba40a50a9ddbcadbefac39600ea347b9c4bd966072d971e50486021190ffe5f92773695a0a55e70a1101d7cbccf54468c3039ec8abc5aeb734c0f6f49834adc871d0b4ec8b8e4eb9108b4138c71ddf4538f0bc81e40dedfeadd2338cec9bdce00fb8c8ad601043c8bb2c0da4f829d485b1cdaf9fec1bc6618da5d7b8ac2907df34334beeef4265262ece85c900e212a297a9adb9fe5f9a", 0xff, r0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:48:09 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x27cffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x459, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 05:48:22 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 39) 05:48:22 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x24000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) close(r1) 05:48:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2980.114124] FAULT_INJECTION: forcing a failure. [ 2980.114124] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.115050] CPU: 1 PID: 33361 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2980.115598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2980.116131] Call Trace: [ 2980.116319] [ 2980.116481] dump_stack_lvl+0xc1/0xf0 [ 2980.116762] should_fail_ex+0x4b4/0x5b0 [ 2980.117056] ? jbd2__journal_start+0x194/0x6b0 [ 2980.117384] should_failslab+0x9/0x20 [ 2980.117656] kmem_cache_alloc+0x5a/0x320 [ 2980.117942] jbd2__journal_start+0x194/0x6b0 [ 2980.118260] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2980.118598] ? ext4_dirty_inode+0xa5/0x130 [ 2980.118892] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2980.119228] ext4_dirty_inode+0xa5/0x130 [ 2980.119522] __mark_inode_dirty+0x1aa/0xee0 [ 2980.119838] generic_write_end+0x319/0x3d0 [ 2980.120161] ext4_da_write_end+0x162/0x950 [ 2980.120476] generic_perform_write+0x318/0x580 [ 2980.120804] ? __pfx_generic_perform_write+0x10/0x10 [ 2980.121151] ? __pfx_file_modified_flags+0x10/0x10 [ 2980.121508] ext4_buffered_write_iter+0x164/0x460 [ 2980.121852] ext4_file_write_iter+0x3ff/0x1930 [ 2980.122165] ? lock_acquire.part.0+0xec/0x320 [ 2980.122489] ? ksys_write+0x12b/0x260 [ 2980.122794] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2980.123149] ? trace_lock_acquire+0x170/0x1e0 [ 2980.123489] ? ksys_write+0x12b/0x260 [ 2980.123784] ? lock_is_held_type+0x9f/0x120 [ 2980.124111] vfs_write+0x9b4/0xdc0 [ 2980.124389] ? __pfx_vfs_write+0x10/0x10 [ 2980.124695] ? __pfx___fget_files+0x10/0x10 [ 2980.125023] ? __fget_files+0x270/0x480 [ 2980.125338] ksys_write+0x12b/0x260 [ 2980.125626] ? __pfx_ksys_write+0x10/0x10 [ 2980.125946] ? rcu_read_lock_sched_held+0x42/0x80 [ 2980.126303] do_syscall_64+0x3f/0x90 [ 2980.126579] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2980.126966] RIP: 0033:0x7fd00c11db19 [ 2980.127224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2980.128425] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2980.128940] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2980.129439] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2980.129928] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2980.130404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2980.130898] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2980.131409] 05:48:22 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x40) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:48:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 05:48:22 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f00000005c0)={[{@huge_always}, {@uid={'uid', 0x3d, r1}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x35, 0x2d]}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x70, 0x38, 0x47, 0x38, 0x38, 0x70, 0x30]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x0, 0x2d, 0x0]}}, {@huge_always}, {@mpol={'mpol', 0x3d, {'default', '=static', @void}}}], [{@uid_lt={'uid<', 0xee00}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, 'keyring\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) statx(r0, &(0x7f0000000240)='./file0\x00', 0x400, 0x80, &(0x7f0000000280)) r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x480c01, 0x8) openat(r2, &(0x7f0000000040)='./file0\x00', 0x400, 0x120) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a30920cddee996232852623d3063a3b67985b2734dd981b0fd0a1b6b6b8c669b9e5ca17b17dcfaf7eb93e70cd7e6856aa5b1402bda6fb56319e1c5432c17609243d01e50a47f35c419d09495128fdd54df3e649cd30d3efe9ba4e9a6c0e37291378fed917841b35d06aa3e905e65e8caf45e8e4a72c18bacf36789045b62cc1930c9737bafc3ee531c600c9e392763274b4fabb00389620f66e8ccce379de8a98442ed8ef61c50e18c152f44ab395f1e1aa274e44a0031c6aad5cb581e7c7011d"], 0xc3) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:48:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10000010000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:22 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 40) 05:48:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x497, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x40000100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd1000000}, 0x0) 05:48:35 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="c20000000500000000000100c348bdf3a659ec2d43895c4bd3e02a0a54c7f5b03f2da7f3d0ab63321798c5179d68bee279f5a2ad028f51ba2d5b973b57e1c36d0b1fa964fdf388cc666e49547820bee527ff4446393083352e115747a520d2e8455ff7d65af53cafb09138b6e29eb0fd005086d22373932700b9634768c3cc9877989c3d764eb42cf1bfc2d302c49626002fc044811ddfbaf2dc82790e5106a136e40997e74a657414df827b341a7479d251fd030b37d2dad0d07f93f51bc0cc80b099b3c05e2ac2d68e3942d554"]) 05:48:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2e000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:35 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 41) [ 2992.439801] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2992.445379] relay: one or more items not logged [item size (48) > sub-buffer size (1)] [ 2992.456416] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2992.463221] FAULT_INJECTION: forcing a failure. [ 2992.463221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2992.464942] CPU: 1 PID: 33510 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 2992.465522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2992.466099] Call Trace: [ 2992.466286] [ 2992.466459] dump_stack_lvl+0xc1/0xf0 [ 2992.466762] should_fail_ex+0x4b4/0x5b0 [ 2992.467062] prepare_alloc_pages+0x178/0x500 [ 2992.467391] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2992.467822] __alloc_pages+0x149/0x510 [ 2992.468111] ? __pfx___alloc_pages+0x10/0x10 [ 2992.468436] ? perf_trace_lock+0xc1/0x480 [ 2992.468747] ? __pfx_perf_trace_lock+0x10/0x10 [ 2992.469073] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2992.469479] alloc_pages+0x1a0/0x260 [ 2992.469757] filemap_alloc_folio+0x374/0x410 [ 2992.470059] ? __pfx_lock_release+0x10/0x10 [ 2992.470380] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2992.470718] ? xas_load+0x6a/0x140 [ 2992.470992] __filemap_get_folio+0x32b/0xcd0 [ 2992.471324] ? __pfx___filemap_get_folio+0x10/0x10 [ 2992.471687] ? asm_exc_page_fault+0x26/0x30 [ 2992.472009] pagecache_get_page+0x2e/0x130 [ 2992.472324] ext4_da_write_begin+0x328/0x9c0 [ 2992.472639] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2992.473005] generic_perform_write+0x25a/0x580 [ 2992.473321] ? __pfx_generic_perform_write+0x10/0x10 [ 2992.473686] ? __pfx_file_modified_flags+0x10/0x10 [ 2992.474040] ext4_buffered_write_iter+0x164/0x460 [ 2992.474396] ext4_file_write_iter+0x3ff/0x1930 [ 2992.474724] ? lock_acquire.part.0+0xec/0x320 [ 2992.475060] ? ksys_write+0x12b/0x260 [ 2992.475345] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2992.475702] ? trace_lock_acquire+0x170/0x1e0 [ 2992.476024] ? ksys_write+0x12b/0x260 [ 2992.476309] ? lock_is_held_type+0x9f/0x120 [ 2992.476613] vfs_write+0x9b4/0xdc0 [ 2992.476888] ? __pfx_vfs_write+0x10/0x10 [ 2992.477186] ? __pfx___fget_files+0x10/0x10 [ 2992.477512] ? __fget_files+0x270/0x480 [ 2992.477810] ksys_write+0x12b/0x260 [ 2992.478088] ? __pfx_ksys_write+0x10/0x10 [ 2992.478387] ? rcu_read_lock_sched_held+0x42/0x80 [ 2992.478751] do_syscall_64+0x3f/0x90 [ 2992.479032] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2992.479405] RIP: 0033:0x7fd00c11db19 [ 2992.479674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2992.480921] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2992.481451] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 2992.481944] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 2992.482445] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 2992.482949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2992.483449] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 2992.483962] 05:48:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 05:48:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x3f000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 05:48:35 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\xbf\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) 05:48:35 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 42) 05:48:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 43) 05:48:49 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x498, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:48:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2fcffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x55050000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 05:48:49 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x200042, 0x1c0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x2000000000, 0x8000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) 05:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3006.894370] FAULT_INJECTION: forcing a failure. [ 3006.894370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3006.896547] CPU: 0 PID: 33745 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3006.897624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3006.898729] Call Trace: [ 3006.899101] [ 3006.899422] dump_stack_lvl+0xc1/0xf0 [ 3006.899970] should_fail_ex+0x4b4/0x5b0 [ 3006.900548] prepare_alloc_pages+0x178/0x500 [ 3006.901163] ? perf_trace_preemptirq_template+0x252/0x420 [ 3006.901925] __alloc_pages+0x149/0x510 [ 3006.902478] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 3006.903283] ? __pfx___alloc_pages+0x10/0x10 [ 3006.903904] ? perf_trace_lock+0xc1/0x480 [ 3006.904483] ? __pfx_perf_trace_lock+0x10/0x10 [ 3006.905108] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3006.905850] alloc_pages+0x1a0/0x260 [ 3006.906382] filemap_alloc_folio+0x374/0x410 [ 3006.907010] ? __pfx_lock_release+0x10/0x10 [ 3006.907620] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 3006.908285] ? xas_load+0x6a/0x140 [ 3006.908792] __filemap_get_folio+0x32b/0xcd0 [ 3006.909423] ? __pfx___filemap_get_folio+0x10/0x10 [ 3006.910122] ? asm_exc_page_fault+0x26/0x30 [ 3006.910746] pagecache_get_page+0x2e/0x130 [ 3006.911359] ext4_da_write_begin+0x328/0x9c0 [ 3006.912015] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3006.912709] generic_perform_write+0x25a/0x580 [ 3006.913357] ? __pfx_generic_perform_write+0x10/0x10 [ 3006.914076] ? __pfx_file_modified_flags+0x10/0x10 [ 3006.914793] ext4_buffered_write_iter+0x164/0x460 [ 3006.915491] ext4_file_write_iter+0x3ff/0x1930 [ 3006.916147] ? lock_acquire.part.0+0xec/0x320 [ 3006.916779] ? ksys_write+0x12b/0x260 [ 3006.917339] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3006.918009] ? trace_lock_acquire+0x170/0x1e0 [ 3006.918641] ? ksys_write+0x12b/0x260 [ 3006.919199] ? lock_is_held_type+0x9f/0x120 [ 3006.919809] vfs_write+0x9b4/0xdc0 [ 3006.920334] ? __pfx_vfs_write+0x10/0x10 [ 3006.920911] ? __pfx___fget_files+0x10/0x10 [ 3006.921517] ? __fget_files+0x270/0x480 [ 3006.922106] ksys_write+0x12b/0x260 [ 3006.922634] ? __pfx_ksys_write+0x10/0x10 [ 3006.923238] ? rcu_read_lock_sched_held+0x42/0x80 [ 3006.923907] do_syscall_64+0x3f/0x90 [ 3006.924444] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3006.925153] RIP: 0033:0x7fd00c11db19 [ 3006.925668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3006.928024] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3006.929038] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3006.930006] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3006.930964] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3006.931912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3006.932869] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3006.933868] 05:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff7c02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 05:48:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x300000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:48:49 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x4c, 0x2, 0x1ff) r0 = syz_open_dev$sg(&(0x7f0000000140), 0xfffffffffffffffe, 0x400442) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/thermal', 0x10000, 0x5) pwrite64(r1, &(0x7f0000000040)="8b95dd7f19a48e8cf20b97a200b230475e62818d90953e1e8c541755bcc265483f5bb64f8b8b564973c9100e01a13c66832f6641ad710d50e0278538809d8c76da9af41ed2a4ead2d8c89a9b19929951b731e0f263d8ee118dcad41f5f28eef9ead3f6f85d1e39dcc46243d9ec371464a92bfef5dbf4df14c6608a8b2e682e52bd7e336ecc1ed6996b40771ffbcd2dcba6919b27a172038e352b090340f71d47447efb1ff4473842ff83253b94cffb4f2e98af7ef9f3625671428942b98fdf6043348b7210452aa3811bedca344d609a0ab1825133ee38d7b8382e36aea1709db1", 0xe1, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:48:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x64000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x80040000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:49:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 05:49:06 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r2) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x1, 0x30a00) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r1) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:49:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x400000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x499, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:49:06 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 44) 05:49:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc00000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3023.662113] FAULT_INJECTION: forcing a failure. [ 3023.662113] name failslab, interval 1, probability 0, space 0, times 0 [ 3023.663987] CPU: 1 PID: 33993 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3023.664724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3023.665451] Call Trace: [ 3023.665690] [ 3023.665904] dump_stack_lvl+0xc1/0xf0 [ 3023.666282] should_fail_ex+0x4b4/0x5b0 [ 3023.666683] ? jbd2__journal_start+0x194/0x6b0 [ 3023.667134] should_failslab+0x9/0x20 [ 3023.667498] kmem_cache_alloc+0x5a/0x320 [ 3023.667891] jbd2__journal_start+0x194/0x6b0 [ 3023.668319] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3023.668773] ? ext4_dirty_inode+0xa5/0x130 [ 3023.669198] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3023.669629] ext4_dirty_inode+0xa5/0x130 [ 3023.670011] __mark_inode_dirty+0x1aa/0xee0 [ 3023.670433] generic_write_end+0x319/0x3d0 [ 3023.670839] ext4_da_write_end+0x162/0x950 [ 3023.671258] generic_perform_write+0x318/0x580 [ 3023.671695] ? __pfx_generic_perform_write+0x10/0x10 [ 3023.672171] ? __pfx_file_modified_flags+0x10/0x10 [ 3023.672646] ext4_buffered_write_iter+0x164/0x460 [ 3023.673100] ext4_file_write_iter+0x3ff/0x1930 [ 3023.673533] ? lock_acquire.part.0+0xec/0x320 [ 3023.673961] ? ksys_write+0x12b/0x260 [ 3023.674349] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3023.674814] ? trace_lock_acquire+0x170/0x1e0 [ 3023.675266] ? ksys_write+0x12b/0x260 [ 3023.675634] ? lock_is_held_type+0x9f/0x120 [ 3023.676042] vfs_write+0x9b4/0xdc0 [ 3023.676407] ? __pfx_vfs_write+0x10/0x10 [ 3023.676790] ? __pfx___fget_files+0x10/0x10 [ 3023.677202] ? __fget_files+0x270/0x480 [ 3023.677596] ksys_write+0x12b/0x260 [ 3023.677960] ? __pfx_ksys_write+0x10/0x10 [ 3023.678363] ? rcu_read_lock_sched_held+0x42/0x80 [ 3023.678837] do_syscall_64+0x3f/0x90 [ 3023.679209] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3023.679686] RIP: 0033:0x7fd00c11db19 [ 3023.680028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3023.681619] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3023.682326] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3023.682952] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3023.683607] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3023.684253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3023.684916] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3023.685572] 05:49:06 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x84) openat(r0, 0x0, 0x8c400, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xc00, 0x4) openat(r1, &(0x7f0000000080)='./file0\x00', 0x230a20, 0x80) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) 05:49:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 05:49:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x6600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:22 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8cffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:49:22 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 45) 05:49:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:22 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x700, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:49:22 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'nr0\x00', @ifru_names}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000240)="502e88da9911b0457a42353b86ec8f49424c438d8af204fa6c70957bdb20b0c5da16b8df37e39a0363c36b6be587124fba458408c59e762d508374bcf7d75f1d395461e1b83c8a19b4cb928af9277161c65c013712eb58d38dd40c78fd6208adc978eed9dd11780b61ce1f7902f155ba4ee76de7c7aca58b765f76f3a6500dcd69fb3a911632ad7f7a9de35e", 0x8c, 0x8}, {&(0x7f0000000180)="25ffd0213f27da8d16557c2679b977e702ee41393c058f9e0744ae6fab1881deaf36cea8e3c79ecfe5ffb5", 0x2b, 0x9f45}, {&(0x7f0000000300)="e4437f5721125f0623de18ab19bdeb35b62f5b29e78251edc4400c104c0af153a2ffcfa75d8b704e725019367c5b5061a88edcf5c31f9fff03425848f1f39e7980104a166b0e4f8e8cac27663cdd3571628fa1e6fcea6c5aa35b678a8057d16ca83de22f904cb1a10886cd53c7ec21731cd9f1c78b2acab1ac4f53d16a42a29aa7463503bf445d4fba13d4f2b3eb9661cb73d3c83bfc8d90beea799c3e5cb628473f6765135741710517ffb1", 0xac, 0xffffffff}, {&(0x7f00000001c0)="a42cd2da082cfbe185a4fa1739aa37d770695bcbb0ac09a6ee", 0x19, 0x1}, {&(0x7f00000003c0)="00beb5c3dc116b448b89bc1dab85d1ce9540bc1cf76cd1a2cde3c76948433ff0681fcfb24d1a54a963ee793ec6ec501eb948aae3608f4044e1f5232cc695b3c9bd1f27c2cae76cb5e12b2499aabf141b", 0x50}, {&(0x7f0000000440)="956b641b50607d40fcfe789e70580f930ecd18fcc7c4309cb8c139736102fc80d3176d9a75069275ccb4a0e1e2c5d972eeb350692dfdbddc6673f543c08eaa7cf09fbe75d0413ba9aac600148f92e8ffecbec1079bea02e2904cffc0eb7ccee72e793c97adb862c63b4c958bd895ade6a3f965d99606fac058843fdad44b746ca039c827bec31b8716d8325729e44ee24b340b084b4823c3f1695e7257e2cdca710ed6276ed3318296f5aabdbc", 0xad, 0xffffffffffff1230}, {&(0x7f0000000500)="b2c71bb6fbeefdc318185dc995a8e7d97b5eb9abf5d57e4aad2eb2e7e24b3494aab6073d9a14c7f935d94eef316d3d5eec2343e47576c1eec35c93068adeb6f034050b52e7c9b78df50805b1b0ff3c3b944912ae7ff244e7d170f3b958a52cafa717fa7c208fdd3cf294b7cbacc3e5b7779d44a8b52efd1de7c451ddf55eb3882cbbc3c0fa70f32fdae807998926a45eb860b983cd9ff787e1f261759fe998341a147264a8c9655a3d20699578e0c5022f4b020244c5c0db", 0xb8, 0x80000000}], 0x400, &(0x7f0000000680)={[{@sysvgroups}, {@init_itable_val={'init_itable', 0x3d, 0x7}}], [{@measure}, {@smackfshat}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) signalfd(r2, &(0x7f0000000700)={[0x2]}, 0x8) fallocate(r1, 0x20, 0x0, 0x4f) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000080)=0x4) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)=0x1) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:49:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x2) 05:49:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x3) 05:49:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x4) 05:49:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3e00000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8e000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:49:34 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 46) 05:49:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:34 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:49:34 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x101002, 0x988a91f15a9658e6) add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='/dev/sg#\x00', 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0x0, 0x1) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "c62a3577ae566c4b748f167e25519614e1ad2a23a363ebc8f11afeaff22f16f707157be3c915069993ee332880559c9d6c300a6c94b9bb0aee35ced0128a9373", 0x28}, 0x48, r1) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x20, 0x0, 0x4f) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x5}}, './file0\x00'}) 05:49:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x5) 05:49:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xfeffffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3051.908065] FAULT_INJECTION: forcing a failure. [ 3051.908065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3051.909322] CPU: 1 PID: 34256 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3051.909869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3051.910411] Call Trace: [ 3051.910592] [ 3051.910754] dump_stack_lvl+0xc1/0xf0 [ 3051.911036] should_fail_ex+0x4b4/0x5b0 [ 3051.911322] prepare_alloc_pages+0x178/0x500 [ 3051.911646] __alloc_pages+0x149/0x510 [ 3051.911920] ? __pfx___alloc_pages+0x10/0x10 [ 3051.912231] ? perf_trace_lock+0xc1/0x480 [ 3051.912523] ? __pfx_perf_trace_lock+0x10/0x10 [ 3051.912831] ? mark_lock.part.0+0xef/0x2f30 [ 3051.913148] alloc_pages+0x1a0/0x260 [ 3051.913407] filemap_alloc_folio+0x374/0x410 [ 3051.913713] ? __pfx_lock_release+0x10/0x10 [ 3051.914024] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 3051.914362] ? xas_load+0x6a/0x140 [ 3051.914623] __filemap_get_folio+0x32b/0xcd0 [ 3051.914940] ? __pfx___filemap_get_folio+0x10/0x10 [ 3051.915281] ? asm_exc_page_fault+0x26/0x30 [ 3051.915602] pagecache_get_page+0x2e/0x130 [ 3051.915913] ext4_da_write_begin+0x328/0x9c0 [ 3051.916230] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3051.916571] generic_perform_write+0x25a/0x580 [ 3051.916895] ? __pfx_generic_perform_write+0x10/0x10 [ 3051.917237] ? __pfx_file_modified_flags+0x10/0x10 [ 3051.917594] ext4_buffered_write_iter+0x164/0x460 [ 3051.917955] ext4_file_write_iter+0x3ff/0x1930 [ 3051.918298] ? lock_acquire.part.0+0x10f/0x320 [ 3051.918653] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3051.919015] ? trace_lock_acquire+0x170/0x1e0 [ 3051.919355] ? ksys_write+0x12b/0x260 [ 3051.919662] ? lock_is_held_type+0x9f/0x120 [ 3051.919988] vfs_write+0x9b4/0xdc0 [ 3051.920263] ? __pfx_vfs_write+0x10/0x10 [ 3051.920571] ? __pfx___fget_files+0x10/0x10 [ 3051.920901] ? __fget_files+0x270/0x480 [ 3051.921196] ksys_write+0x12b/0x260 [ 3051.921467] ? __pfx_ksys_write+0x10/0x10 [ 3051.921795] ? rcu_read_lock_sched_held+0x42/0x80 [ 3051.922154] do_syscall_64+0x3f/0x90 [ 3051.922437] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3051.922815] RIP: 0033:0x7fd00c11db19 [ 3051.923088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3051.924281] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3051.924826] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3051.925330] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3051.925823] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3051.926329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3051.926837] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3051.927358] 05:49:48 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 47) 05:49:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x6) 05:49:48 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd68, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:49:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, 0x1c) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:49:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff00000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8e0d0000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:49:48 executing program 0: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000000)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:49:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x7) 05:49:48 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd69, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:49:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xa1ffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:49:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x10) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) 05:49:48 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 48) 05:49:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x8) 05:49:48 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:49:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:49:48 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd7c, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:02 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) 05:50:02 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd8f, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x9) 05:50:02 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 49) 05:50:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:02 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xe4ffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3080.048996] FAULT_INJECTION: forcing a failure. [ 3080.048996] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.050190] CPU: 1 PID: 34636 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3080.050735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3080.051274] Call Trace: [ 3080.051460] [ 3080.051624] dump_stack_lvl+0xc1/0xf0 [ 3080.051914] should_fail_ex+0x4b4/0x5b0 [ 3080.052202] ? jbd2__journal_start+0x194/0x6b0 [ 3080.052519] should_failslab+0x9/0x20 [ 3080.052790] kmem_cache_alloc+0x5a/0x320 [ 3080.053081] jbd2__journal_start+0x194/0x6b0 [ 3080.053393] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3080.053729] ? ext4_dirty_inode+0xa5/0x130 [ 3080.054023] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3080.054346] ext4_dirty_inode+0xa5/0x130 [ 3080.054634] __mark_inode_dirty+0x1aa/0xee0 [ 3080.054949] generic_write_end+0x319/0x3d0 [ 3080.055248] ext4_da_write_end+0x162/0x950 [ 3080.055553] generic_perform_write+0x318/0x580 [ 3080.055898] ? __pfx_generic_perform_write+0x10/0x10 [ 3080.056241] ? __pfx_file_modified_flags+0x10/0x10 [ 3080.056602] ext4_buffered_write_iter+0x164/0x460 [ 3080.056934] ext4_file_write_iter+0x3ff/0x1930 [ 3080.057250] ? lock_acquire.part.0+0xec/0x320 [ 3080.057567] ? ksys_write+0x12b/0x260 [ 3080.057852] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3080.058193] ? trace_lock_acquire+0x170/0x1e0 [ 3080.058517] ? ksys_write+0x12b/0x260 [ 3080.058810] ? lock_is_held_type+0x9f/0x120 [ 3080.059143] vfs_write+0x9b4/0xdc0 [ 3080.059418] ? __pfx_vfs_write+0x10/0x10 [ 3080.059715] ? __pfx___fget_files+0x10/0x10 [ 3080.060051] ? __fget_files+0x270/0x480 [ 3080.060372] ksys_write+0x12b/0x260 [ 3080.060653] ? __pfx_ksys_write+0x10/0x10 [ 3080.060967] ? rcu_read_lock_sched_held+0x42/0x80 [ 3080.061330] do_syscall_64+0x3f/0x90 [ 3080.061617] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3080.062010] RIP: 0033:0x7fd00c11db19 [ 3080.062285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3080.063451] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3080.064001] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3080.064517] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3080.065024] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3080.065540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3080.066040] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3080.066571] 05:50:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x27cffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:02 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:02 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00', &(0x7f0000000040)=""/187, 0xbb) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:50:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:02 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xf6ffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf) 05:50:02 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 50) 05:50:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3080.277237] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:50:02 executing program 0: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x121080) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:50:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xd1) 05:50:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3080.336263] FAULT_INJECTION: forcing a failure. [ 3080.336263] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.337385] CPU: 1 PID: 34693 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3080.337921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3080.338464] Call Trace: [ 3080.338645] [ 3080.338808] dump_stack_lvl+0xc1/0xf0 [ 3080.339099] should_fail_ex+0x4b4/0x5b0 [ 3080.339386] ? jbd2__journal_start+0x194/0x6b0 [ 3080.339710] should_failslab+0x9/0x20 [ 3080.339991] kmem_cache_alloc+0x5a/0x320 [ 3080.340279] jbd2__journal_start+0x194/0x6b0 [ 3080.340597] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3080.340928] ? ext4_dirty_inode+0xa5/0x130 [ 3080.341224] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3080.341542] ext4_dirty_inode+0xa5/0x130 [ 3080.341824] __mark_inode_dirty+0x1aa/0xee0 [ 3080.342133] generic_write_end+0x319/0x3d0 [ 3080.342430] ext4_da_write_end+0x162/0x950 [ 3080.342742] generic_perform_write+0x318/0x580 [ 3080.343072] ? __pfx_generic_perform_write+0x10/0x10 [ 3080.343415] ? __pfx_file_modified_flags+0x10/0x10 [ 3080.343771] ext4_buffered_write_iter+0x164/0x460 [ 3080.344132] ext4_file_write_iter+0x3ff/0x1930 [ 3080.344450] ? lock_acquire.part.0+0xec/0x320 [ 3080.344775] ? ksys_write+0x12b/0x260 [ 3080.345057] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3080.345402] ? trace_lock_acquire+0x170/0x1e0 [ 3080.345725] ? ksys_write+0x12b/0x260 [ 3080.345995] ? lock_is_held_type+0x9f/0x120 [ 3080.346297] vfs_write+0x9b4/0xdc0 [ 3080.346562] ? __pfx_vfs_write+0x10/0x10 [ 3080.346850] ? __pfx___fget_files+0x10/0x10 [ 3080.347151] ? __fget_files+0x270/0x480 [ 3080.347444] ksys_write+0x12b/0x260 [ 3080.347711] ? __pfx_ksys_write+0x10/0x10 [ 3080.348020] ? rcu_read_lock_sched_held+0x42/0x80 [ 3080.348361] do_syscall_64+0x3f/0x90 [ 3080.348629] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3080.348983] RIP: 0033:0x7fd00c11db19 [ 3080.349251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3080.350517] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3080.351058] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3080.351573] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3080.352078] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3080.352591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3080.353100] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3080.353630] 05:50:03 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000040)={{0x32, @multicast1, 0x4e24, 0x4, 'nq\x00', 0x36, 0x9, 0x6e}, {@multicast1, 0x4e20, 0x10000, 0x1, 0x7ff, 0x9}}, 0x44) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x3, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:50:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfbffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf0) 05:50:03 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0xccd, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:50:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x300) 05:50:15 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:15 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 51) 05:50:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfeffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:15 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "4512881c8bb8b2b1aa04d3a376f8a499a6a509a73a71daad8d2a47d95405fcc8f42789f68c514a3bcb49ba01a8ea2b802f5059701c158880a5f1785a807b5815", 0x1d}, 0x48, r0) keyctl$setperm(0x5, r2, 0x20041400) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:50:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:15 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r2) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fbebf565ed77f6b91d5317bbb879974e2237ee025912e4d2221b567f0c91362e4b509d449aac6f95792ea87883d536b44acc0a2332ca7cc4fc53833a00f1abdbc2fe59a3e4ed8b244ec5932021070d", 0x4f, r2) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) [ 3093.127107] FAULT_INJECTION: forcing a failure. [ 3093.127107] name failslab, interval 1, probability 0, space 0, times 0 [ 3093.128356] CPU: 0 PID: 34900 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3093.128898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3093.129440] Call Trace: [ 3093.129630] [ 3093.129792] dump_stack_lvl+0xc1/0xf0 [ 3093.130067] should_fail_ex+0x4b4/0x5b0 [ 3093.130353] ? jbd2__journal_start+0x194/0x6b0 [ 3093.130679] should_failslab+0x9/0x20 [ 3093.130954] kmem_cache_alloc+0x5a/0x320 [ 3093.131241] jbd2__journal_start+0x194/0x6b0 [ 3093.131551] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3093.131880] ? ext4_dirty_inode+0xa5/0x130 [ 3093.132231] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3093.132551] ext4_dirty_inode+0xa5/0x130 [ 3093.132829] __mark_inode_dirty+0x1aa/0xee0 [ 3093.133138] generic_write_end+0x319/0x3d0 [ 3093.133441] ext4_da_write_end+0x162/0x950 [ 3093.133747] generic_perform_write+0x318/0x580 [ 3093.134074] ? __pfx_generic_perform_write+0x10/0x10 [ 3093.134429] ? __pfx_file_modified_flags+0x10/0x10 [ 3093.134787] ext4_buffered_write_iter+0x164/0x460 [ 3093.135122] ext4_file_write_iter+0x3ff/0x1930 [ 3093.135441] ? lock_acquire.part.0+0xec/0x320 [ 3093.135758] ? ksys_write+0x12b/0x260 [ 3093.136051] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3093.136392] ? trace_lock_acquire+0x170/0x1e0 [ 3093.136710] ? ksys_write+0x12b/0x260 [ 3093.136983] ? lock_is_held_type+0x9f/0x120 [ 3093.137306] vfs_write+0x9b4/0xdc0 [ 3093.137583] ? __pfx_vfs_write+0x10/0x10 [ 3093.137892] ? __pfx___fget_files+0x10/0x10 [ 3093.138210] ? __fget_files+0x270/0x480 [ 3093.138519] ksys_write+0x12b/0x260 [ 3093.138798] ? __pfx_ksys_write+0x10/0x10 [ 3093.139113] ? rcu_read_lock_sched_held+0x42/0x80 [ 3093.139468] do_syscall_64+0x3f/0x90 [ 3093.139751] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3093.140135] RIP: 0033:0x7fd00c11db19 [ 3093.140404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3093.141649] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3093.142181] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3093.142675] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3093.143177] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3093.143684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3093.144189] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3093.144708] 05:50:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3106.470974] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 05:50:29 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x44401, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0xfd, 0x7, 0xcf, "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"}) 05:50:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x500) 05:50:29 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 52) 05:50:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xffff8000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:29 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x5904, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:29 executing program 0: r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x2c, 0xf8, 0x7, 0x0, 0x0, 0x90, 0x24450, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x809, 0x8, 0x6, 0x0, 0x100000001, 0x7, 0x3ff, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x4, 0x7, 0x3f, 0x8, 0x0, 0x2, 0x1220, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x6, 0xc0}, 0x8000, 0x6, 0x101, 0x8, 0x8, 0x7, 0x3, 0x0, 0x3ff, 0x0, 0x8}, 0xffffffffffffffff, 0x4, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) ftruncate(r2, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x2, &(0x7f0000000180)='/dev/sg#\x00') fspick(r1, &(0x7f0000000340)='./file0\x00', 0x0) 05:50:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x600) 05:50:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3106.611382] devtmpfs: Unknown parameter '/dev/sg#' [ 3106.618928] devtmpfs: Unknown parameter '/dev/sg#' 05:50:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfffff000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x700) 05:50:44 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 53) 05:50:44 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 3121.825323] FAULT_INJECTION: forcing a failure. [ 3121.825323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3121.826906] CPU: 1 PID: 35161 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3121.827463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3121.827993] Call Trace: [ 3121.828175] [ 3121.828336] dump_stack_lvl+0xc1/0xf0 [ 3121.828628] should_fail_ex+0x4b4/0x5b0 [ 3121.828908] copyin+0x19/0x120 [ 3121.829137] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3121.829487] ? ext4_da_write_begin+0x63e/0x9c0 [ 3121.829806] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3121.830177] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3121.830516] generic_perform_write+0x2cf/0x580 [ 3121.830836] ? __pfx_generic_perform_write+0x10/0x10 [ 3121.831173] ? __pfx_file_modified_flags+0x10/0x10 [ 3121.831517] ext4_buffered_write_iter+0x164/0x460 [ 3121.831848] ext4_file_write_iter+0x3ff/0x1930 [ 3121.832165] ? lock_acquire.part.0+0xec/0x320 [ 3121.832490] ? ksys_write+0x12b/0x260 [ 3121.832765] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3121.833093] ? trace_lock_acquire+0x170/0x1e0 [ 3121.833409] ? ksys_write+0x12b/0x260 [ 3121.833680] ? lock_is_held_type+0x9f/0x120 [ 3121.833977] vfs_write+0x9b4/0xdc0 [ 3121.834240] ? __pfx_vfs_write+0x10/0x10 [ 3121.834525] ? __pfx___fget_files+0x10/0x10 [ 3121.834822] ? __fget_files+0x270/0x480 [ 3121.835109] ksys_write+0x12b/0x260 [ 3121.835382] ? __pfx_ksys_write+0x10/0x10 [ 3121.835693] ? rcu_read_lock_sched_held+0x42/0x80 [ 3121.836037] do_syscall_64+0x3f/0x90 [ 3121.836314] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3121.836698] RIP: 0033:0x7fd00c11db19 [ 3121.836957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3121.838170] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3121.838686] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3121.839176] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3121.839664] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3121.840148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3121.840642] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3121.841149] [ 3121.844001] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:50:44 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x181000, 0x6d) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:50:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xffffff7f) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x900) 05:50:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3e00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:44 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x680d, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:44 executing program 0: fork() openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1274, 0x0) 05:50:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x66000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xffffff8c) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x210001, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:50:57 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 54) 05:50:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf00) 05:50:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x690d, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) ioctl$FIONCLEX(r1, 0x5450) 05:50:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3134.463449] FAULT_INJECTION: forcing a failure. [ 3134.463449] name failslab, interval 1, probability 0, space 0, times 0 [ 3134.464766] CPU: 1 PID: 35410 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3134.465323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3134.465850] Call Trace: [ 3134.466036] [ 3134.466199] dump_stack_lvl+0xc1/0xf0 [ 3134.466482] should_fail_ex+0x4b4/0x5b0 [ 3134.466767] ? jbd2__journal_start+0x194/0x6b0 [ 3134.467088] should_failslab+0x9/0x20 [ 3134.467358] kmem_cache_alloc+0x5a/0x320 [ 3134.467648] jbd2__journal_start+0x194/0x6b0 [ 3134.467961] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3134.468284] ? ext4_dirty_inode+0xa5/0x130 [ 3134.468595] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3134.468913] ext4_dirty_inode+0xa5/0x130 [ 3134.469195] __mark_inode_dirty+0x1aa/0xee0 [ 3134.469510] generic_write_end+0x319/0x3d0 [ 3134.469814] ext4_da_write_end+0x162/0x950 [ 3134.470117] generic_perform_write+0x318/0x580 [ 3134.470440] ? __pfx_generic_perform_write+0x10/0x10 [ 3134.470781] ? __pfx_file_modified_flags+0x10/0x10 [ 3134.471134] ext4_buffered_write_iter+0x164/0x460 [ 3134.471463] ext4_file_write_iter+0x3ff/0x1930 [ 3134.471778] ? lock_acquire.part.0+0xec/0x320 [ 3134.472106] ? ksys_write+0x12b/0x260 [ 3134.472386] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3134.472732] ? trace_lock_acquire+0x170/0x1e0 [ 3134.473055] ? ksys_write+0x12b/0x260 [ 3134.473330] ? lock_is_held_type+0x9f/0x120 [ 3134.473637] vfs_write+0x9b4/0xdc0 [ 3134.473898] ? __pfx_vfs_write+0x10/0x10 [ 3134.474185] ? __pfx___fget_files+0x10/0x10 [ 3134.474488] ? __fget_files+0x270/0x480 [ 3134.474781] ksys_write+0x12b/0x260 [ 3134.475044] ? __pfx_ksys_write+0x10/0x10 [ 3134.475340] ? rcu_read_lock_sched_held+0x42/0x80 [ 3134.475678] do_syscall_64+0x3f/0x90 [ 3134.475945] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3134.476311] RIP: 0033:0x7fd00c11db19 [ 3134.476588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3134.477810] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3134.478331] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3134.478811] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3134.479296] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3134.479785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3134.480273] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3134.480792] 05:50:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:50:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xd100) 05:50:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xffffffa1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:50:57 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:50:57 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x2) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x2) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r1) r2 = syz_open_dev$rtc(&(0x7f0000000080), 0xffffffffffffffc1, 0x218a40) pwritev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="bb2f001f8940ac7be1fb579c816d9b272ddc7e568d281c4145c1f5dc5421daceda65b2de", 0x24}, {&(0x7f0000000100)="05059bb6a3bf370a7a1e24e8ad03b24d2974bb4645f3", 0x16}], 0x2, 0x2, 0x9) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) 05:51:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf000) 05:51:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xffffffe4) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:51:12 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 55) 05:51:12 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:51:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:51:12 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x10000000000, 0x8002) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x0, 0x4f) ioctl(r1, 0x6, &(0x7f0000000000)="011e1a1fe6ead13b8a9b5c69b69219ba41e65bc1deac18947cb965d01d4b2699cdb02d5f9e0fc038def6daeff3b776f79bae92c76935249b5e18dcd28b7d09ad025d7a4d18c9f8162a1ee94d11a9f971900e9240755cb81f534d746ffe290d563c46e4ea7f1d19c32692e20c1c022af272aa5105600bcc33f75bf065a99ef72d47cae1b2723f21087c3dd92e6ba9530b8e9fe632152df678ee44") 05:51:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x30000) 05:51:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:51:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7c0d, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x34000) 05:51:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfffffff6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:51:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x34d8, 0x9, 0x869}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x20, 0x0, 0x4f) renameat2(r3, &(0x7f00000001c0)='./file1\x00', r0, &(0x7f0000000240)='./file1\x00', 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7000) r5 = fork() r6 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7fffffff}, 0x1c) write(r4, &(0x7f0000000440)="c84b1de6d50814db1ba14846dfb79ec756176b07431ddacb54197816f562f0e3ac858648ad6009c493dccbc5da592b68dcbb3f7c22d5a3d5ff3c6c52f7fd44aea82690e5e439cf154d18a9d65ba68080b344d004a9582a3563c7c67d74c7a17813ff6ab91ef7fc25f4c6f4bb61583d01026e48ea9da8107fd8d6a7b083d55afc9ed9cf35870bf4a1f2a82b6a34ce8e5eddb1c9c4af133f54a198f7118959a34aad568f994ee080c35723ecacfc9861774398db90b1c72f0860e233a0d3a84ac39b8378ee839124bf1a71af46ee49", 0xce) r7 = fork() fcntl$setownex(r6, 0xf, &(0x7f0000000140)={0x0, r7}) sendmsg$nl_netfilter(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)={0x30, 0x11, 0x3, 0x201, 0x70bd28, 0x25dfdbfd, {0xc, 0x0, 0x3}, [@nested={0x14, 0x1d, 0x0, 0x1, [@typed={0x8, 0xe, 0x0, 0x0, @pid=r5}, @typed={0x8, 0x84, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x16}}]}, @typed={0x8, 0x7, 0x0, 0x0, @pid=r7}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x51) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3d, 0x7f, 0x1, 0x1, 0x0, 0x1, 0x400, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x1}, 0x895, 0x3f, 0x7fff, 0x1, 0x7f, 0xca86, 0xf66e, 0x0, 0x400, 0x0, 0x6}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) 05:51:25 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 56) 05:51:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2fcffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x80000) 05:51:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfffffffb) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3163.262010] FAULT_INJECTION: forcing a failure. [ 3163.262010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3163.264311] CPU: 0 PID: 35796 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3163.265375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3163.266422] Call Trace: [ 3163.266768] [ 3163.267080] dump_stack_lvl+0xc1/0xf0 [ 3163.267617] should_fail_ex+0x4b4/0x5b0 [ 3163.268169] prepare_alloc_pages+0x178/0x500 [ 3163.268785] __alloc_pages+0x149/0x510 [ 3163.269331] ? __pfx___alloc_pages+0x10/0x10 [ 3163.269937] ? perf_trace_lock+0xc1/0x480 [ 3163.270504] ? __pfx_perf_trace_lock+0x10/0x10 [ 3163.271112] ? mark_lock.part.0+0xef/0x2f30 [ 3163.271722] alloc_pages+0x1a0/0x260 [ 3163.272235] filemap_alloc_folio+0x374/0x410 [ 3163.272833] ? __pfx_lock_release+0x10/0x10 [ 3163.273447] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 3163.274101] ? xas_load+0x6a/0x140 [ 3163.274611] __filemap_get_folio+0x32b/0xcd0 [ 3163.275220] ? __pfx___filemap_get_folio+0x10/0x10 [ 3163.275887] ? asm_exc_page_fault+0x26/0x30 [ 3163.276485] pagecache_get_page+0x2e/0x130 [ 3163.277069] ext4_da_write_begin+0x328/0x9c0 [ 3163.277690] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3163.278385] generic_perform_write+0x25a/0x580 [ 3163.279012] ? __pfx_generic_perform_write+0x10/0x10 [ 3163.279695] ? __pfx_file_modified_flags+0x10/0x10 [ 3163.280386] ext4_buffered_write_iter+0x164/0x460 [ 3163.281072] ext4_file_write_iter+0x3ff/0x1930 [ 3163.281700] ? lock_acquire.part.0+0xec/0x320 [ 3163.282333] ? ksys_write+0x12b/0x260 [ 3163.282895] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3163.283566] ? trace_lock_acquire+0x170/0x1e0 [ 3163.284208] ? ksys_write+0x12b/0x260 [ 3163.284751] ? lock_is_held_type+0x9f/0x120 [ 3163.285369] vfs_write+0x9b4/0xdc0 [ 3163.285896] ? __pfx_vfs_write+0x10/0x10 [ 3163.286468] ? __pfx___fget_files+0x10/0x10 [ 3163.287070] ? __fget_files+0x270/0x480 [ 3163.287652] ksys_write+0x12b/0x260 [ 3163.288182] ? __pfx_ksys_write+0x10/0x10 [ 3163.288775] ? rcu_read_lock_sched_held+0x42/0x80 [ 3163.289470] do_syscall_64+0x3f/0x90 [ 3163.289997] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3163.290699] RIP: 0033:0x7fd00c11db19 [ 3163.291205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3163.293549] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3163.294550] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3163.295489] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3163.296416] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3163.297357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3163.298292] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3163.299258] 05:51:39 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 57) 05:51:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x400300) 05:51:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xfffffffe) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:51:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8f0d, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:51:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000800)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) syncfs(r1) perf_event_open(&(0x7f0000000900)={0x3, 0x80, 0x64, 0x9, 0x91, 0x7f, 0x0, 0x7f, 0x300, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2df2, 0x0, @perf_config_ext={0x0, 0x7}, 0x10, 0x800, 0x3b6501fd, 0x9, 0x1, 0x7cdb, 0xac, 0x0, 0xffffffff, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x2) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)="92b4d39f1eafaee2eb5e35e3a0be5ace694933a77f02985fd0035aa04b86555b6982bc204fb99bdc39b5d8fcfef608b3f8ee684bda17035c3bdb832c4846313118f0ccac1d5e220ba6eb6bae6a2cdc7f5d3a010eeec7bfbcb273b544133d893a03141f5e8fe5fa0971", 0x69}, 0x1, 0x0, 0x0, 0x20000815}, 0x20040080) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x3ff]}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast1, @in=@initdev}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f00000007c0)=0xe8) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="34008ec5ddeb2fce", @ANYRES16=r6, @ANYBLOB="0100000000000000000001000000200001801400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=r8, @ANYBLOB], 0x34}}, 0x0) sendmmsg$inet(r4, &(0x7f00000008c0)=[{{&(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000240)="1ad8d743dadb92e7743cf5772a15259e7aa41801d7f4bef37aa01dd71c08938aa6fef87be622941fe8a3b62ae706479aa8c2fd56c8c29014f639b09d85ff6b1b84bbcc7605e2cbda0eec393783b3f1c18d677017904bd10a555116b91bca1ce23947afa3d1e29c3b01691724b2df6eebfabf4cbfc6ba05798cb6679a9b5ad0559449d2b5e418824e4410123337e057bb1387be86959376332e618337b7eaac7138fd2f1d101424704c7e9201f7d4b65f328f79d3de202675dea9e5110fda8a037026297387491b251f6a48c0737a854a484fbaffcb0132b5043723e0db5e4d", 0xdf}, {&(0x7f0000000180)="3ba2eb1873a230b934e20136b263b0fd9cdcf7b066f70a3815eac649980fc803a8cdc724566fb6322215e2309d47a90ed483622c6db3fd1f99ac898ced635336366bed6fb7dcfac11e6bc629e1dca7697bcd4689e8fcca84f5e8e0e504d7220ad3f0534012b224ba02ccd9b0", 0x6c}, {&(0x7f0000000340)="5de0bb318535592edd31bfb48632a0fdce167d1b1e64e8a56772d907e5339f52", 0x20}, {&(0x7f0000000380)="0975b7e7e6ade26bed0fe058fdefe82781f4251e0ecf5f4dffc617b6359bb63b4899eb226cf3bff41f95153b5cd2e28cefdfc61eb331f9e208ba454dbcbf538b8693d045c0061a6e3aacacb35e28982ccbcc89714ff6ad414ceb5db64cb6575b8b7715c8427e8c54675fe633b5752b395d050340a4cbf6df924e139244abf576a50038d23215b33d5323b820b58940936880cf4358f77448f8c3353fb3ad6202ec573bf8ce984a6645f12b427500145c071f36e7ab7bd00853b9343e11399a71c0bbdcf12ddd419ad7d3a1bbe2a7c19251c761f85a", 0xd5}, {&(0x7f0000000480)="64c3e65357f90972ddbed3abbf22e315dba78fba0ff8a0bb97c36da99623555bd4da25ad4415cfee72da11de89c33e8ee19b6fda9e4aa371f79e95a08b9dd8c97135aa891afa45b1ea11081c58bf6ce54d6be29b710112bc1e1373fa0ea62b42a71057a3a3cde972d8c0e91c6fc9ea14ad259d7e956b62246d23cfd2aed82bcc4ea997a772abe85ee7d0461528b790489b1c40f2ff1e", 0x96}, {&(0x7f0000000540)="0dc659d954b2c434bf1bfabb73fbc1cdd33931a12703aeca3fbf4c9074c9068aca718551c517aa120a83ebb02f5c1fb48ff6aeec3e08842382c7a666dd20ea4b087d5a621759bde1ca3c74912fffe05d39d43a1fcf5cac66a0eaa2aa4ddc868a345e0cab61c043d18a3751b97f83b943b7bf6c", 0x73}, {&(0x7f00000005c0)="dadffdd2af57ffc7d197342d8adde137c54578ee38c8e47b03e705776ac92fcfdee8c23e79e37b80bc5d2ab60ba0a72f04b8c27717431918eafadf9a5f258186b8ae750ccc93eeeb99f1fcc32dd65a8b4695eda203f952bd4342536da1d84066e0", 0x61}], 0x7, &(0x7f0000000980)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x400}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0xa8}}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:51:39 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) 05:51:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf0ffff) 05:51:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:51:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x1000000) 05:52:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x9704, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:01 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 58) 05:52:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x8000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x2000000) 05:52:01 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x84) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:52:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x3000000) 05:52:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1d, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0x7267}, 0x40, 0x3, 0x9, 0x7, 0x400, 0x9, 0x400, 0x0, 0x2, 0x0, 0x2601}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r1 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="da3e8dee7103774554ac98bcb78cd4635f43ebf3e72e27de634ab2cb30270be0c6cf12f3b274ea9ed7c2b88263a83e2e4ca52f357409d77a599df9053518ebc12e21e9469d734c5e099cc8665ad139792e2fc1f00d47b7912d964c44156275da36a99096bd0de373bbdfd8ee56a42d9811031f8e7de6a0f6653783f74c38fc5378b94b5abbf53bdd3ed3f53369c605cfacce7695afdebd", 0x97, 0xfffffffffffffff9) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0x0) keyctl$link(0x8, r1, r2) fsetxattr$security_ima(r0, &(0x7f00000001c0), &(0x7f0000000240)=@v2={0x5, 0x3, 0xd, 0x8001, 0x65, "55f242ba31180ad3d9c6c92b7c6cc07f9120eea947ac20f38b43dfe33c8f551f76883c8ecccd38af937898281174c2ff4547d5f1da99d308ab158a944e92d1977adc02b960c62435c86abf8830ce43a05a0283a288739a283c97ff46088b087028fa5da022"}, 0x6e, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x8000, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x20, 0x0, 0x4f) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f00000002c0)=',!\x00', &(0x7f0000000300)='./file0\x00', r0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:52:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x4000000) 05:52:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:01 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x9804, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x20000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:01 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:52:16 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x9904, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x10000000001ff, 0x721000) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:52:16 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 59) 05:52:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x5000000) 05:52:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x80ffff00000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 3213.678332] FAULT_INJECTION: forcing a failure. [ 3213.678332] name failslab, interval 1, probability 0, space 0, times 0 [ 3213.679915] CPU: 1 PID: 36517 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3213.680469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3213.681010] Call Trace: [ 3213.681189] [ 3213.681353] dump_stack_lvl+0xc1/0xf0 [ 3213.681641] should_fail_ex+0x4b4/0x5b0 [ 3213.681928] ? jbd2__journal_start+0x194/0x6b0 [ 3213.682256] should_failslab+0x9/0x20 [ 3213.682537] kmem_cache_alloc+0x5a/0x320 [ 3213.682826] jbd2__journal_start+0x194/0x6b0 [ 3213.683146] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3213.683475] ? ext4_dirty_inode+0xa5/0x130 [ 3213.683782] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3213.684102] ext4_dirty_inode+0xa5/0x130 [ 3213.684384] __mark_inode_dirty+0x1aa/0xee0 [ 3213.684695] generic_write_end+0x319/0x3d0 [ 3213.684992] ext4_da_write_end+0x162/0x950 [ 3213.685298] generic_perform_write+0x318/0x580 [ 3213.685638] ? __pfx_generic_perform_write+0x10/0x10 [ 3213.685984] ? __pfx_file_modified_flags+0x10/0x10 [ 3213.686339] ext4_buffered_write_iter+0x164/0x460 [ 3213.686680] ext4_file_write_iter+0x3ff/0x1930 [ 3213.687001] ? lock_acquire.part.0+0xec/0x320 [ 3213.687324] ? ksys_write+0x12b/0x260 [ 3213.687607] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3213.687971] ? trace_lock_acquire+0x170/0x1e0 [ 3213.688316] ? ksys_write+0x12b/0x260 [ 3213.688614] ? lock_is_held_type+0x9f/0x120 [ 3213.688936] vfs_write+0x9b4/0xdc0 [ 3213.689216] ? __pfx_vfs_write+0x10/0x10 [ 3213.689529] ? __pfx___fget_files+0x10/0x10 [ 3213.689842] ? __fget_files+0x270/0x480 [ 3213.690157] ksys_write+0x12b/0x260 [ 3213.690447] ? __pfx_ksys_write+0x10/0x10 [ 3213.690770] ? rcu_read_lock_sched_held+0x42/0x80 [ 3213.691134] do_syscall_64+0x3f/0x90 [ 3213.691423] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3213.691814] RIP: 0033:0x7fd00c11db19 [ 3213.692089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3213.693281] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3213.693830] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3213.694344] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3213.694853] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3213.695365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3213.695881] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3213.696419] 05:52:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x27cffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3e000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:16 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x21, 0xff, 0x4f) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:52:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x6000000) 05:52:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc0000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 3213.845182] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:52:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xf0ffffffffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa900, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7, 0xa, &(0x7f0000000740)=[{&(0x7f0000000140)="36542403dea0ea5cd6d48727b6fdccd0aa7ef408d98cac976fa2a6eae9f3b05ab755ec9c0eee40ab730a21dc169d6a790a6f7c0892b0e242ab924ebddec2652ce982d4df06f3b8a8950fd544d0063a1d5bc38b4cb1da61cf64d7b82c45e925adb3d26be14763d4a73fb8c4da2aeb3e137ecd0ffc0b856b65d813db6ff0fb72439571", 0x82, 0xfffffffffffff800}, {&(0x7f0000000240)='}', 0x1, 0x1}, {&(0x7f0000000280)="4742da737a6d944954560b199d43652b28fa0ebbdf906116cdf5e78410db0b64c520ef0f43981750f2b1a76263f4c2e7473eb10d5acfdbb5f814a85e", 0x3c, 0x800}, {&(0x7f00000002c0)="aea9251e815e5e4c1621a6e99032740b99d72aab8eb06e08c2937573664d65691017b56133d68c9bd369bae298421cfdcc462b910835c236afde0acfde121c12adf1d3e3eb2b0e9d7933378aea1888e68f2e2996f4242675ad0cfde7a56feb2098bebd2c1b69831d668eaebd6bf708ce03d23e2bd7681a27cda48c8387d3ab209b6a09857e75521d3e1aa0feefcf99a65da155513b00ec7fb4b738632f383d68339e01ec5945ad741370209120ec4c6583c242058b0009b9d0548b7dea1e7561524d", 0xc2, 0xbc}, {&(0x7f00000003c0)="8d924cdbb6469ab61a80db8e665f3b062365cb72ca12a38005bdba70cbba490aa9514e9f8fe69ab24f150d7369afd4700f4a380c0d39da42e624bc6ba2e83f4ea865dcf3", 0x44, 0xfffffffffffffff8}, {&(0x7f0000000440)="b3cf6bb7f1393fc997dea6dbf37805d630e9247de06aff7fd1172fe3213aa469de50abc49fec2a0d000c327ee57d4c1e51b23a871cc1d1601f07cacf788bafd584af69418362507b7070b60a09293f6ed0f8c51d5eb311868ad26e2dec5cc04faf299fb5e9d02b8fc68e96cad5b25a9f6f4bd0822c6de3aa7fa8c22007514f1fd01247f42caa863f3b4c488b490195b8416b51c527a4daab48890fb49f57d34f1df01b02d1736398dfb440a1046ab7e98c8db05b7f3693b38436961eaebd05edaa8c62971eef61b1b36e73e0a03f2d8f61d240836af70c0a2b8feccd6b44d0383ddab6558f15b726b26a568badc158a2e48b1bc8d16d581d3d", 0xf9, 0x10000}, {&(0x7f0000000540)="25869182d95760a843358f277e363c19fa93b1fff41f59f8f4", 0x19, 0x401}, {&(0x7f0000000580)="9dd0794218e8682194c89d085ea038f20251fa85dcdbc22b928ddb2a1e85154569dcbf940fc82de851d6e9fbeca55552d2b6d65c15479a6199ba974831646d3883ac197b97a288d060c2e85c2319e4814d2bed295c0db928d20a75914f4d55a0603f89f557707ca60c325fec990349d1df45326dcf6a76df7f6e280b664e69396b968ffb4407473ccf09dbf0b6ab9fd96dc87c329bb1f26c796c85deb7301933e252e1b34eef401c9d240f232cc42c6187ee89070f55c4c41ba02bad43180aa4b2a235753eca91d926b1f1444caefb48757c611caa75ad5b16adca1173391799b3efe3b96f8adfbd3fa4", 0xea, 0x7fffffff}, {&(0x7f0000000680)="909dfb5e5eb56ab5e59578201df97c72bf32fd79fa318b4bc8d0fc45f73bec6f0929b29bb737a13c07b83310473d3a5d07beb61ea84f4ff87e135dd3bdab45cfd28ef001494de9cf9dcb575c478c117f6d3bbb238eda9e90c83156e14ea3", 0x5e, 0x100}, {&(0x7f0000000700)="2cc7adce", 0x4, 0x5}], 0x1000800, &(0x7f00000008c0)={[{@uni_xlateno}, {@numtail}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'cp863'}}, {@numtail}], [{@dont_measure}]}) r2 = openat(r1, 0x0, 0x6880, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0xd4) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:52:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x7000000) 05:52:32 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 60) 05:52:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3229.573771] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:52:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffc02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x14) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:52:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x9000000) 05:52:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x100000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x6600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "047aa14f3197cec7aa85706271f2da06dcdd64b0a604c393dfa6a8acf23923a5fa23eb5cc3a249e4dbdde3d81d45f4e5df24d59f32731e266320b519f6d6a50a", 0x24}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r1) add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'}) connect(r2, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @local, 'ipvlan0\x00'}}, 0x80) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) 05:52:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x200000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:45 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 61) 05:52:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc2d6, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf000000) 05:52:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = open_tree(r0, &(0x7f0000000180)='./file0\x00', 0x8000) accept4$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x80800) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) keyctl$chown(0x4, r1, 0x0, r3) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000140)=0x3) [ 3243.105426] FAULT_INJECTION: forcing a failure. [ 3243.105426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3243.106843] CPU: 1 PID: 36995 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3243.107384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3243.108075] Call Trace: [ 3243.108263] [ 3243.108463] dump_stack_lvl+0xc1/0xf0 [ 3243.108815] should_fail_ex+0x4b4/0x5b0 [ 3243.109180] copyin+0x19/0x120 [ 3243.109476] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3243.109930] ? ext4_da_write_begin+0x63e/0x9c0 [ 3243.110349] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3243.110834] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3243.111282] generic_perform_write+0x2cf/0x580 [ 3243.111690] ? __pfx_generic_perform_write+0x10/0x10 [ 3243.112051] ? __pfx_file_modified_flags+0x10/0x10 [ 3243.112491] ext4_buffered_write_iter+0x164/0x460 [ 3243.112840] ext4_file_write_iter+0x3ff/0x1930 [ 3243.113241] ? lock_acquire.part.0+0x10f/0x320 [ 3243.113596] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3243.114015] ? trace_lock_acquire+0x170/0x1e0 [ 3243.114418] ? ksys_write+0x12b/0x260 [ 3243.114757] ? lock_is_held_type+0x9f/0x120 [ 3243.115133] vfs_write+0x9b4/0xdc0 [ 3243.115456] ? __pfx_vfs_write+0x10/0x10 [ 3243.115817] ? __pfx___fget_files+0x10/0x10 [ 3243.116205] ? __fget_files+0x270/0x480 [ 3243.116570] ksys_write+0x12b/0x260 [ 3243.116897] ? __pfx_ksys_write+0x10/0x10 [ 3243.117276] ? rcu_read_lock_sched_held+0x42/0x80 [ 3243.117707] do_syscall_64+0x3f/0x90 [ 3243.118064] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3243.118505] RIP: 0033:0x7fd00c11db19 [ 3243.118826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3243.120332] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3243.120972] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3243.121572] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3243.122182] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3243.122782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3243.123368] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3243.123984] 05:52:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x9effffff) 05:52:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x98) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x8b051000) 05:52:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xd1000000) 05:52:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf0ffffff) 05:52:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 62) 05:52:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff7c02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x300000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:59 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xd6c2, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:59 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x210180, 0x0) r1 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1274, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000001280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) stat(&(0x7f0000001280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, r8}}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r9}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq}, {@measure}]}}) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)={{0x2, r10, r9, r8, 0xee00, 0x8e, 0x6}, 0xd590, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r11, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000100), 0xac424, &(0x7f0000000440)={'trans=unix,', {[{@access_any}, {@access_uid={'access', 0x3d, r7}}, {@dfltgid={'dfltgid', 0x3d, r9}}, {@uname={'uname', 0x3d, '\x12{!(#/l)\\*'}}, {@dfltuid={'dfltuid', 0x3d, r11}}, {@access_uid={'access', 0x3d, r5}}, {@access_uid={'access', 0x3d, r10}}, {@mmap}, {@posixacl}, {@access_user}], [{@fowner_gt={'fowner>', r5}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, 'defcontext'}}, {@measure}]}}) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)={{0x2, r12, r6, r5, 0xee00, 0x8e, 0x6}, 0xd590, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}) keyctl$chown(0x4, r3, r4, r6) [ 3256.889241] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:52:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="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"]) 05:52:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xfffff000) 05:52:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x400000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:52:59 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf000, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:52:59 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa0001, 0x11) 05:52:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3257.085180] relay: one or more items not logged [item size (56) > sub-buffer size (1)] 05:52:59 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x1, 0x4, 0x505, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFULA_CFG_MODE={0xa, 0x2, {0x3f, 0x2}}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x3}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_CMD={0x5, 0x1, 0x7bc770d0e7654d61}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x1e}]}, 0x40}, 0x1, 0x0, 0x0, 0x3}, 0x14) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:53:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xffffff7f) 05:53:16 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 63) 05:53:16 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x11) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:53:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x500000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3273.472359] FAULT_INJECTION: forcing a failure. [ 3273.472359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3273.473798] CPU: 1 PID: 37394 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3273.474337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3273.474884] Call Trace: [ 3273.475063] [ 3273.475225] dump_stack_lvl+0xc1/0xf0 [ 3273.475501] should_fail_ex+0x4b4/0x5b0 [ 3273.475790] copyin+0x19/0x120 [ 3273.476026] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3273.476382] ? ext4_da_write_begin+0x63e/0x9c0 [ 3273.476701] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3273.477077] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3273.477423] generic_perform_write+0x2cf/0x580 [ 3273.477743] ? __pfx_generic_perform_write+0x10/0x10 [ 3273.478085] ? __pfx_file_modified_flags+0x10/0x10 [ 3273.478438] ext4_buffered_write_iter+0x164/0x460 [ 3273.478766] ? ext4_buffered_write_iter+0x2/0x460 [ 3273.479098] ext4_file_write_iter+0x3ff/0x1930 [ 3273.479417] ? lock_acquire.part.0+0xec/0x320 [ 3273.479737] ? ksys_write+0x12b/0x260 [ 3273.480016] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3273.480356] ? trace_lock_acquire+0x170/0x1e0 [ 3273.480675] ? ksys_write+0x12b/0x260 [ 3273.480954] ? lock_is_held_type+0x9f/0x120 [ 3273.481259] vfs_write+0x9b4/0xdc0 [ 3273.481507] ? __pfx_vfs_write+0x10/0x10 [ 3273.481795] ? __pfx___fget_files+0x10/0x10 [ 3273.482101] ? __fget_files+0x270/0x480 [ 3273.482387] ksys_write+0x12b/0x260 [ 3273.482656] ? __pfx_ksys_write+0x10/0x10 [ 3273.482952] ? rcu_read_lock_sched_held+0x42/0x80 [ 3273.483270] do_syscall_64+0x3f/0x90 [ 3273.483543] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3273.483880] RIP: 0033:0x7fd00c11db19 [ 3273.484138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3273.485224] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3273.485730] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3273.486170] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3273.486614] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3273.487049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3273.487481] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3273.487935] 05:53:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xffffff9e) 05:53:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:16 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x284200, 0x101) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 05:53:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xfffffff0) 05:53:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x600000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:32 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x4) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:53:32 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x3, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 64) 05:53:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2fcffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3289.383227] relay: one or more items not logged [item size (56) > sub-buffer size (3)] 05:53:32 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) openat(r0, &(0x7f0000000000)='./file0\x00', 0x10001, 0x148) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) 05:53:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x3000000000000) 05:53:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3289.449225] FAULT_INJECTION: forcing a failure. [ 3289.449225] name failslab, interval 1, probability 0, space 0, times 0 [ 3289.451320] CPU: 0 PID: 37526 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3289.452411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3289.453481] Call Trace: [ 3289.453838] [ 3289.454157] dump_stack_lvl+0xc1/0xf0 [ 3289.454747] should_fail_ex+0x4b4/0x5b0 [ 3289.455318] ? jbd2__journal_start+0x194/0x6b0 [ 3289.455966] should_failslab+0x9/0x20 [ 3289.456497] kmem_cache_alloc+0x5a/0x320 [ 3289.457076] jbd2__journal_start+0x194/0x6b0 [ 3289.457707] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3289.458367] ? ext4_dirty_inode+0xa5/0x130 [ 3289.458967] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3289.459610] ext4_dirty_inode+0xa5/0x130 [ 3289.460186] __mark_inode_dirty+0x1aa/0xee0 [ 3289.460810] generic_write_end+0x319/0x3d0 [ 3289.461404] ext4_da_write_end+0x162/0x950 [ 3289.462013] generic_perform_write+0x318/0x580 [ 3289.462670] ? __pfx_generic_perform_write+0x10/0x10 [ 3289.463361] ? __pfx_file_modified_flags+0x10/0x10 [ 3289.464069] ext4_buffered_write_iter+0x164/0x460 [ 3289.464735] ext4_file_write_iter+0x3ff/0x1930 [ 3289.465374] ? lock_acquire.part.0+0xec/0x320 [ 3289.466013] ? ksys_write+0x12b/0x260 [ 3289.466601] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3289.467286] ? trace_lock_acquire+0x170/0x1e0 [ 3289.467930] ? ksys_write+0x12b/0x260 [ 3289.468480] ? lock_is_held_type+0x9f/0x120 [ 3289.469094] vfs_write+0x9b4/0xdc0 [ 3289.469628] ? __pfx_vfs_write+0x10/0x10 [ 3289.470203] ? __pfx___fget_files+0x10/0x10 [ 3289.470825] ? __fget_files+0x270/0x480 [ 3289.471420] ksys_write+0x12b/0x260 [ 3289.471954] ? __pfx_ksys_write+0x10/0x10 [ 3289.472560] ? rcu_read_lock_sched_held+0x42/0x80 [ 3289.473244] do_syscall_64+0x3f/0x90 [ 3289.473778] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.474486] RIP: 0033:0x7fd00c11db19 [ 3289.475007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3289.477367] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3289.478385] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3289.479350] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3289.480293] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3289.481246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3289.482198] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3289.483179] 05:53:32 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x700000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x8000000000000) 05:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 65) 05:53:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x804000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x4f) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x97) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000140), 0x4, 0x18800) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000180)=ANY=[@ANYBLOB="9726471b4cdb58c8260b28df", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r4 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) fallocate(r5, 0x22, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x111001, 0xc2) close_range(r5, r1, 0x2) r6 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r2) r7 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r7, 0xee00, 0x0) keyctl$KEYCTL_MOVE(0x1e, r7, r6, r4, 0x1) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="2b5aa9f8339ab5de085d93a1d48ddc4f6396efc6575b3ad38df0d2c4fd0237f0eecd481515f649401a14e63de9bb11eebefdc0550d18d6de636606", 0x3b, r4) r8 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r8, 0x1274, 0x0) 05:53:46 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xa, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x40030000000000) 05:53:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {0x0, 0x2710}}) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x9, 0x40002) ioctl$BLKTRACETEARDOWN(r1, 0x1274, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x4f) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000000)=0x1) 05:53:46 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xe, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0xc00000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:46 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 66) 05:53:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r1) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r4 = request_key(&(0x7f0000000640)='trusted\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)='\'-(\x00', r2) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r2, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1274, 0x0) r5 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='keyring\x00', r2) r6 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="1d013db8476f4c9ca339b9efd16aef07a2380ed642ba62f86fb68cd24234495d755031699718fac03f044b2956fb8233bc771a1ac99b828ef1ff6f2918e75f742b882c553389a8d5a44d6c24bd80105485b3160be1c17409e91a0c9d", 0x5c, 0xffffffffffffffff) add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="bfe5cddbdc776d23a8f2de6b4fb067a262c64a796cde653a5f8446b8cff5fdfba0ada9a15b74063cbac78a1bff8fc4e4297c43960999a9994080e701dd1e81b2e1a4ce651784586d282b01c592a18905bf97255b1c3bad1ecf1622a80bb2203b508f4bcd9033f1316cbf30e34ea0dcfc52e54e84be984398c7d4", 0x7a, r6) r7 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r7, 0xee00, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)={0x3, 0x0, @d}, 0x18, r7) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) r8 = add_key(&(0x7f0000000580)='id_resolver\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="3db04755f9b21d2670f89227867caf017d7f569a2be16b012b320935dd19d564f06968cf965ca1271cfe", 0x2a, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r8) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000400)) 05:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:58 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 67) 05:53:58 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf0ffffffffffff) 05:53:59 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:53:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1000000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:53:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3316.352458] FAULT_INJECTION: forcing a failure. [ 3316.352458] name failslab, interval 1, probability 0, space 0, times 0 [ 3316.353559] CPU: 1 PID: 38017 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3316.354099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3316.354646] Call Trace: [ 3316.354831] [ 3316.355004] dump_stack_lvl+0xc1/0xf0 [ 3316.355292] should_fail_ex+0x4b4/0x5b0 [ 3316.355581] ? jbd2__journal_start+0x194/0x6b0 [ 3316.355908] should_failslab+0x9/0x20 [ 3316.356182] kmem_cache_alloc+0x5a/0x320 [ 3316.356479] jbd2__journal_start+0x194/0x6b0 [ 3316.356794] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3316.357128] ? ext4_dirty_inode+0xa5/0x130 [ 3316.357423] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3316.357757] ext4_dirty_inode+0xa5/0x130 [ 3316.358050] __mark_inode_dirty+0x1aa/0xee0 [ 3316.358366] generic_write_end+0x319/0x3d0 [ 3316.358675] ext4_da_write_end+0x162/0x950 [ 3316.358998] generic_perform_write+0x318/0x580 [ 3316.359324] ? __pfx_generic_perform_write+0x10/0x10 [ 3316.359679] ? __pfx_file_modified_flags+0x10/0x10 [ 3316.360042] ext4_buffered_write_iter+0x164/0x460 [ 3316.360373] ? ext4_buffered_write_iter+0x2/0x460 [ 3316.360710] ext4_file_write_iter+0x3ff/0x1930 [ 3316.361034] ? lock_acquire.part.0+0xec/0x320 [ 3316.361357] ? ksys_write+0x12b/0x260 [ 3316.361644] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3316.361981] ? trace_lock_acquire+0x170/0x1e0 [ 3316.362302] ? ksys_write+0x12b/0x260 [ 3316.362577] ? lock_is_held_type+0x9f/0x120 [ 3316.362885] vfs_write+0x9b4/0xdc0 [ 3316.363182] ? __pfx_vfs_write+0x10/0x10 [ 3316.363488] ? __pfx___fget_files+0x10/0x10 [ 3316.363815] ? __fget_files+0x270/0x480 [ 3316.364138] ksys_write+0x12b/0x260 [ 3316.364417] ? __pfx_ksys_write+0x10/0x10 [ 3316.364734] ? rcu_read_lock_sched_held+0x42/0x80 [ 3316.365097] do_syscall_64+0x3f/0x90 [ 3316.365383] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3316.365763] RIP: 0033:0x7fd00c11db19 [ 3316.366031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3316.367307] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3316.367846] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3316.368346] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3316.368848] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3316.369308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3316.369809] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3316.370332] 05:53:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:53:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x100000000000000) [ 3316.407200] blktrace: Concurrent blktraces are not allowed on sg0 05:54:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:14 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 68) 05:54:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3e00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1200000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:14 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x300, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:54:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x200000000000000) 05:54:14 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:54:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x300000000000000) [ 3332.297306] FAULT_INJECTION: forcing a failure. [ 3332.297306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3332.298758] CPU: 1 PID: 38145 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3332.299452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3332.300150] Call Trace: [ 3332.300378] [ 3332.300583] dump_stack_lvl+0xc1/0xf0 [ 3332.300940] should_fail_ex+0x4b4/0x5b0 [ 3332.301309] copyin+0x19/0x120 [ 3332.301603] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3332.302054] ? ext4_da_write_begin+0x63e/0x9c0 [ 3332.302449] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3332.302651] blktrace: Concurrent blktraces are not allowed on sg0 [ 3332.302922] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 3332.304209] generic_perform_write+0x2cf/0x580 [ 3332.304623] ? __pfx_generic_perform_write+0x10/0x10 [ 3332.305056] ? __pfx_file_modified_flags+0x10/0x10 [ 3332.305510] ext4_buffered_write_iter+0x164/0x460 [ 3332.305939] ext4_file_write_iter+0x3ff/0x1930 [ 3332.306339] ? lock_acquire.part.0+0xec/0x320 [ 3332.306736] ? ksys_write+0x12b/0x260 [ 3332.307093] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3332.307524] ? trace_lock_acquire+0x170/0x1e0 [ 3332.307934] ? ksys_write+0x12b/0x260 [ 3332.308277] ? lock_is_held_type+0x9f/0x120 [ 3332.308664] vfs_write+0x9b4/0xdc0 [ 3332.308997] ? __pfx_vfs_write+0x10/0x10 [ 3332.309351] ? __pfx___fget_files+0x10/0x10 [ 3332.309735] ? __fget_files+0x270/0x480 [ 3332.310101] ksys_write+0x12b/0x260 [ 3332.310431] ? __pfx_ksys_write+0x10/0x10 [ 3332.310802] ? rcu_read_lock_sched_held+0x42/0x80 [ 3332.311249] do_syscall_64+0x3f/0x90 [ 3332.311586] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3332.312037] RIP: 0033:0x7fd00c11db19 [ 3332.312372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3332.313891] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3332.314537] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3332.315144] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3332.315730] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3332.316329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3332.316935] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3332.317548] 05:54:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1201000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x400000000000000) [ 3332.463834] audit: type=1400 audit(1676440455.159:13): avc: denied { tracepoint } for pid=38268 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 05:54:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2800, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:54:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x500000000000000) 05:54:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1800000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 69) 05:54:29 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 3346.501944] FAULT_INJECTION: forcing a failure. [ 3346.501944] name failslab, interval 1, probability 0, space 0, times 0 [ 3346.503182] CPU: 1 PID: 38381 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3346.503730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3346.504257] Call Trace: [ 3346.504446] [ 3346.504606] dump_stack_lvl+0xc1/0xf0 [ 3346.504885] should_fail_ex+0x4b4/0x5b0 [ 3346.505168] ? jbd2__journal_start+0x194/0x6b0 [ 3346.505489] should_failslab+0x9/0x20 [ 3346.505751] kmem_cache_alloc+0x5a/0x320 [ 3346.506039] jbd2__journal_start+0x194/0x6b0 [ 3346.506357] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3346.506689] ? ext4_dirty_inode+0xa5/0x130 [ 3346.507004] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3346.507329] ext4_dirty_inode+0xa5/0x130 [ 3346.507622] __mark_inode_dirty+0x1aa/0xee0 [ 3346.507933] generic_write_end+0x319/0x3d0 [ 3346.508233] ext4_da_write_end+0x162/0x950 [ 3346.508539] generic_perform_write+0x318/0x580 [ 3346.508868] ? __pfx_generic_perform_write+0x10/0x10 [ 3346.509215] ? __pfx_file_modified_flags+0x10/0x10 [ 3346.509575] ext4_buffered_write_iter+0x164/0x460 [ 3346.509908] ext4_file_write_iter+0x3ff/0x1930 [ 3346.510216] ? lock_acquire.part.0+0xec/0x320 [ 3346.510531] ? ksys_write+0x12b/0x260 [ 3346.510812] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3346.511147] ? trace_lock_acquire+0x170/0x1e0 [ 3346.511481] ? ksys_write+0x12b/0x260 [ 3346.511751] ? lock_is_held_type+0x9f/0x120 [ 3346.512066] vfs_write+0x9b4/0xdc0 [ 3346.512347] ? __pfx_vfs_write+0x10/0x10 [ 3346.512657] ? __pfx___fget_files+0x10/0x10 [ 3346.512983] ? __fget_files+0x270/0x480 [ 3346.513299] ksys_write+0x12b/0x260 [ 3346.513579] ? __pfx_ksys_write+0x10/0x10 [ 3346.513896] ? rcu_read_lock_sched_held+0x42/0x80 [ 3346.514262] do_syscall_64+0x3f/0x90 [ 3346.514545] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3346.514921] RIP: 0033:0x7fd00c11db19 [ 3346.515193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3346.516483] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3346.517012] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3346.517516] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3346.518034] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3346.518534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3346.519038] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3346.519582] 05:54:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x600000000000000) 05:54:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1b30000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x700000000000000) 05:54:29 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 70) 05:54:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3350.389606] syz-executor.0 invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3350.391644] CPU: 1 PID: 266 Comm: syz-executor.0 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3350.392683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3350.393759] Call Trace: [ 3350.394108] [ 3350.394430] dump_stack_lvl+0xc1/0xf0 [ 3350.394964] dump_header+0x10a/0xd50 [ 3350.395526] oom_kill_process+0x25d/0x600 [ 3350.396088] out_of_memory+0x1365/0x1660 [ 3350.396663] ? __pfx_out_of_memory+0x10/0x10 [ 3350.397282] __alloc_pages_slowpath.constprop.0+0x19ce/0x2010 [ 3350.398104] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3350.398932] ? lock_is_held_type+0x9f/0x120 [ 3350.399551] ? prepare_alloc_pages+0x377/0x500 [ 3350.400185] __alloc_pages+0x430/0x510 [ 3350.400738] ? __pfx___alloc_pages+0x10/0x10 [ 3350.401358] ? perf_trace_lock+0xc1/0x480 [ 3350.401927] ? __alloc_pages+0x43d/0x510 [ 3350.402491] ? __pfx_perf_trace_lock+0x10/0x10 [ 3350.403099] ? __lock_acquire+0x1936/0x63b0 [ 3350.403724] alloc_pages+0x1a0/0x260 [ 3350.404251] filemap_alloc_folio+0x374/0x410 [ 3350.404854] ? __pfx_lock_release+0x10/0x10 [ 3350.405467] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 3350.406139] ? xas_load+0x6a/0x140 [ 3350.406661] __filemap_get_folio+0x32b/0xcd0 [ 3350.407281] ? __pfx___filemap_get_folio+0x10/0x10 [ 3350.407968] ? filemap_fault+0x1444/0x2120 [ 3350.408555] ? filemap_fault+0x1444/0x2120 [ 3350.409128] ? lock_acquire+0x32/0xc0 [ 3350.409670] ? filemap_fault+0x1444/0x2120 [ 3350.410263] filemap_fault+0x1484/0x2120 [ 3350.410840] ? __pfx_filemap_fault+0x10/0x10 [ 3350.411484] ? __pfx_filemap_map_pages+0x10/0x10 [ 3350.412133] __do_fault+0x10d/0x590 [ 3350.412649] ? __pfx_filemap_map_pages+0x10/0x10 [ 3350.413287] __handle_mm_fault+0x1287/0x31c0 [ 3350.413881] ? lock_acquire.part.0+0xec/0x320 [ 3350.414519] ? lock_is_held_type+0x9f/0x120 [ 3350.415121] ? __pfx___handle_mm_fault+0x10/0x10 [ 3350.415810] handle_mm_fault+0x1b8/0x860 [ 3350.416381] do_user_addr_fault+0x512/0x1320 [ 3350.417026] exc_page_fault+0x9c/0x1a0 [ 3350.417576] asm_exc_page_fault+0x26/0x30 [ 3350.418152] RIP: 0033:0x7ff1f1ad77e0 [ 3350.418665] Code: Unable to access opcode bytes at 0x7ff1f1ad77b6. [ 3350.419493] RSP: 002b:00007ffcc1b3b008 EFLAGS: 00010246 [ 3350.420207] RAX: 0000000000000000 RBX: 00000000000004a3 RCX: 0000000000000009 [ 3350.421149] RDX: 0000000000000859 RSI: 00000000000004a3 RDI: 00007ff1f1b95053 [ 3350.422089] RBP: 00007ffcc1b3b06c R08: 0000000000000d15 R09: 00007ffcc1b68080 [ 3350.423023] R10: 00007ffcc1b68090 R11: 00000000005df4c8 R12: 0000000000000064 [ 3350.423975] R13: 00000000003312a2 R14: 0000000000000009 R15: 00007ffcc1b3b0d0 [ 3350.424942] [ 3350.425424] Mem-Info: [ 3350.425808] active_anon:7443 inactive_anon:47815 isolated_anon:0 [ 3350.425808] active_file:10 inactive_file:27 isolated_file:1 [ 3350.425808] unevictable:0 dirty:0 writeback:0 [ 3350.425808] slab_reclaimable:10075 slab_unreclaimable:54202 [ 3350.425808] mapped:69655 shmem:91 pagetables:3719 [ 3350.425808] sec_pagetables:0 bounce:0 [ 3350.425808] kernel_misc_reclaimable:0 [ 3350.425808] free:3276 free_pcp:0 free_cma:0 [ 3350.430594] Node 0 active_anon:29772kB inactive_anon:191260kB active_file:40kB inactive_file:108kB unevictable:0kB isolated(anon):0kB isolated(file):4kB mapped:278620kB dirty:0kB writeback:0kB shmem:364kB writeback_tmp:0kB kernel_stack:6816kB pagetables:14876kB sec_pagetables:0kB all_unreclaimable? no [ 3350.433931] Node 0 DMA free:6464kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3350.437233] lowmem_reserve[]: 0 1606 1606 1606 [ 3350.437948] Node 0 DMA32 free:6640kB boost:2048kB min:7152kB low:8796kB high:10440kB reserved_highatomic:0KB active_anon:29772kB inactive_anon:191260kB active_file:192kB inactive_file:612kB unevictable:0kB writepending:0kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3350.441535] lowmem_reserve[]: 0 0 0 0 [ 3350.442103] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6464kB [ 3350.444020] Node 0 DMA32: 722*4kB (ME) 244*8kB (UME) 53*16kB (ME) 15*32kB (UME) 3*64kB (UM) 2*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6872kB [ 3350.446153] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3350.447288] 154 total pagecache pages [ 3350.447854] 0 pages in swap cache [ 3350.448325] Free swap = 0kB [ 3350.448785] Total swap = 0kB [ 3350.449204] 524158 pages RAM [ 3350.449660] 0 pages HighMem/MovableOnly [ 3350.450186] 106453 pages reserved [ 3350.450678] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0,global_oom,task_memcg=/syz0,task=syz-executor.0,pid=266,uid=0 [ 3350.453638] Out of memory (oom_kill_allocating_task): Killed process 266 (syz-executor.0) total-vm:93280kB, anon-rss:320kB, file-rss:34944kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 3350.473486] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 3350.474981] CPU: 0 PID: 38388 Comm: syz-executor.7 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3350.475808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3350.476611] Call Trace: [ 3350.476881] [ 3350.477132] dump_stack_lvl+0xc1/0xf0 [ 3350.477551] warn_alloc+0x214/0x370 [ 3350.477950] ? __pfx_warn_alloc+0x10/0x10 [ 3350.478386] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3350.478911] ? __alloc_pages_slowpath.constprop.0+0xafe/0x2010 [ 3350.479557] ? __pfx_out_of_memory+0x10/0x10 [ 3350.480041] __alloc_pages_slowpath.constprop.0+0x1bb7/0x2010 [ 3350.480667] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3350.481289] ? lock_is_held_type+0x9f/0x120 [ 3350.481761] ? prepare_alloc_pages+0x377/0x500 [ 3350.482235] ? lock_is_held_type+0x9f/0x120 [ 3350.482694] __alloc_pages+0x430/0x510 [ 3350.483108] ? __pfx___alloc_pages+0x10/0x10 [ 3350.483597] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3350.484155] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3350.484726] ? alloc_pages+0x165/0x260 [ 3350.485151] alloc_pages+0x1a0/0x260 [ 3350.485550] relay_open_buf.part.0+0x285/0xbc0 [ 3350.486050] ? _find_next_bit+0x11b/0x150 [ 3350.486496] relay_open+0x511/0xa30 [ 3350.486906] do_blk_trace_setup+0x4b0/0xbb0 [ 3350.487381] __blk_trace_setup+0xca/0x180 [ 3350.487838] ? __pfx___blk_trace_setup+0x10/0x10 [ 3350.488347] ? rcu_read_lock_sched_held+0x42/0x80 [ 3350.488857] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3350.489391] blk_trace_setup+0x47/0x70 [ 3350.489813] sg_ioctl+0x6a5/0x26a0 [ 3350.490200] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 3350.490825] ? __pfx_sg_ioctl+0x10/0x10 [ 3350.491245] ? __pfx___fget_files+0x10/0x10 [ 3350.491701] ? lock_acquire+0x32/0xc0 [ 3350.492108] ? __pfx___fget_files+0x10/0x10 [ 3350.492572] ? selinux_file_ioctl+0xba/0x270 [ 3350.493031] ? __pfx_sg_ioctl+0x10/0x10 [ 3350.493457] __x64_sys_ioctl+0x19e/0x210 [ 3350.493885] do_syscall_64+0x3f/0x90 [ 3350.494284] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3350.494807] RIP: 0033:0x7fa1dc9aab19 [ 3350.495205] Code: Unable to access opcode bytes at 0x7fa1dc9aaaef. [ 3350.495819] RSP: 002b:00007fa1d9f20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3350.496558] RAX: ffffffffffffffda RBX: 00007fa1dcabdf60 RCX: 00007fa1dc9aab19 [ 3350.497243] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 3350.497949] RBP: 00007fa1dca04f6d R08: 0000000000000000 R09: 0000000000000000 [ 3350.498632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3350.499328] R13: 00007fff93f4db4f R14: 00007fa1d9f20300 R15: 0000000000022000 [ 3350.500063] [ 3350.500381] Mem-Info: [ 3350.500672] active_anon:7443 inactive_anon:47815 isolated_anon:0 [ 3350.500672] active_file:31 inactive_file:5 isolated_file:1 [ 3350.500672] unevictable:0 dirty:0 writeback:0 [ 3350.500672] slab_reclaimable:10075 slab_unreclaimable:54202 [ 3350.500672] mapped:69655 shmem:91 pagetables:3719 [ 3350.500672] sec_pagetables:0 bounce:0 [ 3350.500672] kernel_misc_reclaimable:0 [ 3350.500672] free:3090 free_pcp:0 free_cma:0 [ 3350.504455] Node 0 active_anon:29772kB inactive_anon:191260kB active_file:124kB inactive_file:20kB unevictable:0kB isolated(anon):0kB isolated(file):4kB mapped:278620kB dirty:0kB writeback:0kB shmem:364kB writeback_tmp:0kB kernel_stack:6816kB pagetables:14876kB sec_pagetables:0kB all_unreclaimable? no [ 3350.506872] Node 0 DMA free:6448kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3350.510011] lowmem_reserve[]: 0 1606 1606 1606 [ 3350.510533] Node 0 DMA32 free:5912kB boost:0kB min:5104kB low:6748kB high:8392kB reserved_highatomic:0KB active_anon:29772kB inactive_anon:191260kB active_file:192kB inactive_file:612kB unevictable:0kB writepending:0kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3350.513952] lowmem_reserve[]: 0 0 0 0 [ 3350.514370] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6448kB [ 3350.516146] Node 0 DMA32: 722*4kB (UME) 243*8kB (UME) 52*16kB (UME) 6*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5856kB [ 3350.517547] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3350.518622] 154 total pagecache pages [ 3350.518986] 0 pages in swap cache [ 3350.519431] Free swap = 0kB [ 3350.519764] Total swap = 0kB [ 3350.520155] 524158 pages RAM [ 3350.520455] 0 pages HighMem/MovableOnly [ 3350.520981] 106453 pages reserved 05:54:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x900000000000000) 05:54:45 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:54:45 executing program 7: perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xc2d6, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 05:54:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:45 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 71) 05:54:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2103000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x27cffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3363.191227] FAULT_INJECTION: forcing a failure. [ 3363.191227] name failslab, interval 1, probability 0, space 0, times 0 [ 3363.192429] CPU: 1 PID: 38633 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3363.192991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3363.193535] Call Trace: [ 3363.193719] [ 3363.193880] dump_stack_lvl+0xc1/0xf0 [ 3363.194175] should_fail_ex+0x4b4/0x5b0 [ 3363.194465] ? jbd2__journal_start+0x194/0x6b0 [ 3363.194800] should_failslab+0x9/0x20 [ 3363.195067] kmem_cache_alloc+0x5a/0x320 [ 3363.195362] jbd2__journal_start+0x194/0x6b0 [ 3363.195693] __ext4_journal_start_sb+0x4c2/0x6f0 [ 3363.196022] ? ext4_dirty_inode+0xa5/0x130 [ 3363.196325] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 3363.196664] ext4_dirty_inode+0xa5/0x130 [ 3363.196953] __mark_inode_dirty+0x1aa/0xee0 [ 3363.197270] generic_write_end+0x319/0x3d0 [ 3363.197577] ext4_da_write_end+0x162/0x950 [ 3363.197889] generic_perform_write+0x318/0x580 [ 3363.198217] ? __pfx_generic_perform_write+0x10/0x10 [ 3363.198579] ? __pfx_file_modified_flags+0x10/0x10 [ 3363.198940] ext4_buffered_write_iter+0x164/0x460 [ 3363.199278] ? ext4_buffered_write_iter+0x2/0x460 [ 3363.199635] ext4_file_write_iter+0x3ff/0x1930 [ 3363.199945] ? lock_acquire.part.0+0xec/0x320 [ 3363.200266] ? ksys_write+0x12b/0x260 [ 3363.200574] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 3363.200941] ? trace_lock_acquire+0x170/0x1e0 [ 3363.201284] ? ksys_write+0x12b/0x260 [ 3363.201579] ? lock_is_held_type+0x9f/0x120 [ 3363.201905] vfs_write+0x9b4/0xdc0 [ 3363.202187] ? __pfx_vfs_write+0x10/0x10 [ 3363.202492] ? __pfx___fget_files+0x10/0x10 [ 3363.202819] ? __fget_files+0x270/0x480 [ 3363.203140] ksys_write+0x12b/0x260 [ 3363.203424] ? __pfx_ksys_write+0x10/0x10 [ 3363.203750] ? rcu_read_lock_sched_held+0x42/0x80 [ 3363.204121] do_syscall_64+0x3f/0x90 [ 3363.204408] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3363.204799] RIP: 0033:0x7fd00c11db19 [ 3363.205075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3363.206375] RSP: 002b:00007fd009693188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3363.206929] RAX: ffffffffffffffda RBX: 00007fd00c230f60 RCX: 00007fd00c11db19 [ 3363.207444] RDX: 00000000000292e9 RSI: 0000000020000080 RDI: 0000000000000004 [ 3363.207964] RBP: 00007fd0096931d0 R08: 0000000000000000 R09: 0000000000000000 [ 3363.208485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3363.208989] R13: 00007ffff7b108ff R14: 00007fd009693300 R15: 0000000000022000 [ 3363.209517] 05:54:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0xf00000000000000) 05:54:46 executing program 5: syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000028c0)=ANY=[@ANYBLOB="0b010305c60000003b000000050000005f0100005646a41e00000000000000008f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000307914000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077439709e85035abe7b6f23209d07c66cddb0fd926362969f3a1b6d8827e33444e5c239040790eeb3530dc3387185e1ef225ac6b31852178f1f22232e97a53b396cd7c68c1276e8d7a02c3339ab84e53eb15569a52e3d6443a502b7d30be87a414d0066cd66998aa4dbdddd0ca8552022dd1bfc80460a29629c1ec17e49e38a242314f627c22edf3d5c576b05c2f4ed755e748854d0ae4c1913e0cc9e045ca74d393529e4a32939168c2baef37c5fee5cd10a0d3153bb18cacfb92f9a65a524b82e6fdfd79613c10b6524a1a7eb1bca041"], 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f00)=[0x0, &(0x7f0000000000)='-\x00', &(0x7f0000000300)='[\xb8/%\x00', 0x0, 0x0], &(0x7f0000001080)=[&(0x7f00000010c0)='\x8c\xd7M\xcfhL\xa5\xeb\x9ea!\v\x124\xfa\ns\xdeZ\xb4\xae\xa7\xd9\xa6N\x1a\x93\x9c-\x90\xfaBT\xf8\xc1\xf0\xb7.\x84\x990\x14\xcf9P\x9d\xdb\xdfo%Z&\xd2@\xc8\xe2\xc5\x7fT\xb6XE\xfa\xd3\xf6\xbe\v\xfe\xe2\x86\r$2\xe2\xa4e\xcfF\xc2\xd0~\xb2\xe5\x17L\xac\x82\x91\x03-11\x92\x89/\x01P\xdb\xf5lN\x00\x00\x06\x00'/117, &(0x7f0000000fc0)='@^\x00', &(0x7f0000001040)=')*\x00']) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r2, &(0x7f0000000080)="01", 0x292e9) (fail_nth: 72) 05:54:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x2400000000000000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 05:54:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:54:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}}, 0x9effffff00000000) 05:54:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x87, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3364.439987] syz-fuzzer invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3364.440710] CPU: 1 PID: 239 Comm: syz-fuzzer Not tainted 6.2.0-rc8-next-20230214 #1 [ 3364.441173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3364.441665] Call Trace: [ 3364.441837] [ 3364.441988] dump_stack_lvl+0xc1/0xf0 [ 3364.442249] dump_header+0x10a/0xd50 [ 3364.442496] oom_kill_process+0x25d/0x600 [ 3364.442762] out_of_memory+0x1365/0x1660 [ 3364.443030] ? __pfx_out_of_memory+0x10/0x10 [ 3364.443321] __alloc_pages_slowpath.constprop.0+0x19ce/0x2010 [ 3364.443721] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3364.444102] ? lock_is_held_type+0x9f/0x120 [ 3364.444388] ? prepare_alloc_pages+0x377/0x500 [ 3364.444688] __alloc_pages+0x430/0x510 [ 3364.444944] ? __pfx___alloc_pages+0x10/0x10 [ 3364.445233] ? perf_trace_lock+0xc1/0x480 [ 3364.445495] ? __alloc_pages+0x43d/0x510 [ 3364.445759] ? __pfx_perf_trace_lock+0x10/0x10 [ 3364.446046] ? __lock_acquire+0x1936/0x63b0 [ 3364.446337] alloc_pages+0x1a0/0x260 [ 3364.446581] filemap_alloc_folio+0x374/0x410 [ 3364.446864] ? __pfx_lock_release+0x10/0x10 [ 3364.447146] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 3364.447453] ? xas_load+0x6a/0x140 [ 3364.447702] __filemap_get_folio+0x32b/0xcd0 [ 3364.447999] ? __pfx___filemap_get_folio+0x10/0x10 [ 3364.448308] ? filemap_fault+0x1444/0x2120 [ 3364.448588] ? filemap_fault+0x1444/0x2120 [ 3364.448858] ? lock_acquire+0x32/0xc0 [ 3364.449114] ? filemap_fault+0x1444/0x2120 [ 3364.449394] filemap_fault+0x1484/0x2120 [ 3364.449665] ? __pfx_filemap_fault+0x10/0x10 [ 3364.449965] ? __pfx_filemap_map_pages+0x10/0x10 [ 3364.450265] __do_fault+0x10d/0x590 [ 3364.450514] ? __pfx_filemap_map_pages+0x10/0x10 [ 3364.450817] __handle_mm_fault+0x1287/0x31c0 [ 3364.451098] ? lock_acquire.part.0+0xec/0x320 [ 3364.451396] ? lock_is_held_type+0x9f/0x120 [ 3364.451685] ? __pfx___handle_mm_fault+0x10/0x10 [ 3364.452007] handle_mm_fault+0x1b8/0x860 [ 3364.452274] do_user_addr_fault+0x512/0x1320 [ 3364.452573] exc_page_fault+0x9c/0x1a0 [ 3364.452829] asm_exc_page_fault+0x26/0x30 [ 3364.453102] RIP: 0033:0x42fdb0 [ 3364.453317] Code: Unable to access opcode bytes at 0x42fd86. [ 3364.453664] RSP: 002b:000000c00003ff30 EFLAGS: 00010246 [ 3364.453996] RAX: 0000030f3f676c55 RBX: 0000000000000039 RCX: 0000000001f20d01 [ 3364.454430] RDX: 0000030f4028138f RSI: 0000030f3f676c55 RDI: 0000030f400002d5 [ 3364.454862] RBP: 000000c00003ffa0 R08: 0000030f68289624 R09: 00007ffd3c2d5080 [ 3364.455292] R10: 00007ffd3c2d5090 R11: 00000000005e5f68 R12: 0000000000438880 [ 3364.455734] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 3364.456180] [ 3364.456387] Mem-Info: [ 3364.456571] active_anon:4359 inactive_anon:47565 isolated_anon:0 [ 3364.456571] active_file:29 inactive_file:8 isolated_file:21 [ 3364.456571] unevictable:0 dirty:0 writeback:0 [ 3364.456571] slab_reclaimable:10046 slab_unreclaimable:50224 [ 3364.456571] mapped:60953 shmem:87 pagetables:3493 [ 3364.456571] sec_pagetables:0 bounce:0 [ 3364.456571] kernel_misc_reclaimable:0 [ 3364.456571] free:3213 free_pcp:14 free_cma:0 [ 3364.458915] Node 0 active_anon:17436kB inactive_anon:190260kB active_file:116kB inactive_file:32kB unevictable:0kB isolated(anon):0kB isolated(file):84kB mapped:243812kB dirty:0kB writeback:0kB shmem:348kB writeback_tmp:0kB kernel_stack:6592kB pagetables:13972kB sec_pagetables:0kB all_unreclaimable? no [ 3364.460479] Node 0 DMA free:6448kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3364.462182] lowmem_reserve[]: 0 1606 1606 1606 [ 3364.462565] Node 0 DMA32 free:6404kB boost:0kB min:5104kB low:6748kB high:8392kB reserved_highatomic:2048KB active_anon:17436kB inactive_anon:190260kB active_file:556kB inactive_file:224kB unevictable:0kB writepending:0kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:56kB local_pcp:0kB free_cma:0kB [ 3364.464392] lowmem_reserve[]: 0 0 0 0 [ 3364.464702] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6448kB [ 3364.465643] Node 0 DMA32: 697*4kB (UMEH) 211*8kB (UMH) 53*16kB (UMH) 5*32kB (MH) 3*64kB (H) 5*128kB (H) 2*256kB (H) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6828kB [ 3364.466736] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3364.467297] 156 total pagecache pages [ 3364.467580] 0 pages in swap cache [ 3364.467817] Free swap = 0kB [ 3364.468040] Total swap = 0kB [ 3364.468253] 524158 pages RAM [ 3364.468462] 0 pages HighMem/MovableOnly [ 3364.468749] 106453 pages reserved [ 3364.468987] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=239,uid=0 [ 3364.470348] Out of memory (oom_kill_allocating_task): Killed process 238 (syz-fuzzer) total-vm:1170888kB, anon-rss:166656kB, file-rss:128kB, shmem-rss:0kB, UID:0 pgtables:804kB oom_score_adj:0 [ 3365.886210] warn_alloc: 1 callbacks suppressed [ 3365.886228] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 3365.887457] CPU: 1 PID: 38657 Comm: syz-executor.7 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3365.888043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3365.888624] Call Trace: [ 3365.888811] [ 3365.888981] dump_stack_lvl+0xc1/0xf0 [ 3365.889278] warn_alloc+0x214/0x370 [ 3365.889558] ? __pfx_warn_alloc+0x10/0x10 [ 3365.889862] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3365.890234] ? __alloc_pages_slowpath.constprop.0+0xafe/0x2010 [ 3365.890668] ? __pfx_out_of_memory+0x10/0x10 [ 3365.890998] __alloc_pages_slowpath.constprop.0+0x1bb7/0x2010 [ 3365.891440] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3365.891891] ? lock_is_held_type+0x9f/0x120 [ 3365.892215] ? prepare_alloc_pages+0x377/0x500 [ 3365.892549] ? lock_is_held_type+0x9f/0x120 [ 3365.892867] __alloc_pages+0x430/0x510 [ 3365.893156] ? __pfx___alloc_pages+0x10/0x10 [ 3365.893481] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3365.893875] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3365.894274] ? alloc_pages+0x19/0x260 [ 3365.894560] alloc_pages+0x1a0/0x260 [ 3365.894838] relay_open_buf.part.0+0x285/0xbc0 [ 3365.895163] ? _find_next_bit+0x11b/0x150 [ 3365.895460] relay_open+0x511/0xa30 [ 3365.895743] do_blk_trace_setup+0x4b0/0xbb0 [ 3365.896056] __blk_trace_setup+0xca/0x180 [ 3365.896345] ? __pfx___blk_trace_setup+0x10/0x10 [ 3365.896680] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3365.897038] blk_trace_setup+0x47/0x70 [ 3365.897316] sg_ioctl+0x6a5/0x26a0 [ 3365.897581] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 3365.897989] ? __pfx_sg_ioctl+0x10/0x10 [ 3365.898270] ? __pfx___fget_files+0x10/0x10 [ 3365.898567] ? lock_acquire+0x32/0xc0 [ 3365.898839] ? __pfx___fget_files+0x10/0x10 [ 3365.899139] ? selinux_file_ioctl+0xba/0x270 [ 3365.899448] ? __pfx_sg_ioctl+0x10/0x10 [ 3365.899739] __x64_sys_ioctl+0x19e/0x210 [ 3365.900023] do_syscall_64+0x3f/0x90 [ 3365.900287] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3365.900636] RIP: 0033:0x7fa1dc9aab19 [ 3365.900895] Code: Unable to access opcode bytes at 0x7fa1dc9aaaef. [ 3365.901295] RSP: 002b:00007fa1d9f20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3365.901788] RAX: ffffffffffffffda RBX: 00007fa1dcabdf60 RCX: 00007fa1dc9aab19 [ 3365.902249] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 3365.902719] RBP: 00007fa1dca04f6d R08: 0000000000000000 R09: 0000000000000000 [ 3365.903190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3365.903728] R13: 00007fff93f4db4f R14: 00007fa1d9f20300 R15: 0000000000022000 [ 3365.904331] [ 3365.904546] Mem-Info: [ 3365.904724] active_anon:1783 inactive_anon:22395 isolated_anon:0 [ 3365.904724] active_file:33 inactive_file:33 isolated_file:3 [ 3365.904724] unevictable:0 dirty:9 writeback:0 [ 3365.904724] slab_reclaimable:8491 slab_unreclaimable:48624 [ 3365.904724] mapped:8718 shmem:86 pagetables:502 [ 3365.904724] sec_pagetables:0 bounce:0 [ 3365.904724] kernel_misc_reclaimable:0 [ 3365.904724] free:9204 free_pcp:140 free_cma:0 [ 3365.907528] Node 0 active_anon:7132kB inactive_anon:89580kB active_file:132kB inactive_file:300kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:34872kB dirty:36kB writeback:0kB shmem:344kB writeback_tmp:0kB kernel_stack:3072kB pagetables:2008kB sec_pagetables:0kB all_unreclaimable? no [ 3365.909429] Node 0 DMA free:6448kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3365.911084] lowmem_reserve[]: 0 1606 1606 1606 [ 3365.911582] Node 0 DMA32 free:31880kB boost:10240kB min:15344kB low:16988kB high:18632kB reserved_highatomic:2048KB active_anon:6964kB inactive_anon:88488kB active_file:208kB inactive_file:716kB unevictable:0kB writepending:120kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:672kB local_pcp:0kB free_cma:0kB [ 3365.913685] lowmem_reserve[]: 0 0 0 0 [ 3365.913997] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 0*64kB 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6448kB [ 3365.914984] Node 0 DMA32: 847*4kB (UMEH) 330*8kB (UMEH) 102*16kB (UMH) 49*32kB (UMH) 33*64kB (UMH) 19*128kB (UM) 19*256kB (UM) 10*512kB (UM) 8*1024kB (U) 0*2048kB 0*4096kB = 31948kB [ 3365.916281] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3365.916905] 298 total pagecache pages [ 3365.917175] 0 pages in swap cache [ 3365.917424] Free swap = 0kB [ 3365.917672] Total swap = 0kB [ 3365.917901] 524158 pages RAM [ 3365.918127] 0 pages HighMem/MovableOnly [ 3365.918410] 106453 pages reserved [ 3366.453105] oom_reaper: reaped process 38657 (syz-executor.7), now anon-rss:24kB, file-rss:34944kB, shmem-rss:0kB [ 3367.009136] sshd invoked oom-killer: gfp_mask=0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), order=0, oom_score_adj=0 [ 3367.010034] CPU: 1 PID: 38870 Comm: sshd Not tainted 6.2.0-rc8-next-20230214 #1 [ 3367.010492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3367.010983] Call Trace: [ 3367.011152] [ 3367.011300] dump_stack_lvl+0xc1/0xf0 [ 3367.011565] dump_header+0x10a/0xd50 [ 3367.011820] oom_kill_process+0x25d/0x600 [ 3367.012086] out_of_memory+0x1365/0x1660 [ 3367.012355] ? __pfx_out_of_memory+0x10/0x10 [ 3367.012649] __alloc_pages_slowpath.constprop.0+0x19ce/0x2010 [ 3367.013033] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3367.013417] ? lock_is_held_type+0x9f/0x120 [ 3367.013705] ? prepare_alloc_pages+0x377/0x500 [ 3367.013999] ? find_held_lock+0x2c/0x110 [ 3367.014267] __alloc_pages+0x430/0x510 [ 3367.014526] ? __pfx___alloc_pages+0x10/0x10 [ 3367.014809] ? lock_release+0x1e3/0x710 [ 3367.015075] ? __pfx_lock_release+0x10/0x10 [ 3367.015366] ? up_write+0x196/0x510 [ 3367.015618] vma_alloc_folio+0xe2/0x440 [ 3367.015877] __handle_mm_fault+0x71d/0x31c0 [ 3367.016153] ? lock_acquire.part.0+0xec/0x320 [ 3367.016448] ? lock_is_held_type+0x9f/0x120 [ 3367.016726] ? __pfx___handle_mm_fault+0x10/0x10 [ 3367.017044] handle_mm_fault+0x1b8/0x860 [ 3367.017309] do_user_addr_fault+0x512/0x1320 [ 3367.017609] exc_page_fault+0x9c/0x1a0 [ 3367.017864] asm_exc_page_fault+0x26/0x30 [ 3367.018136] RIP: 0033:0x7f4127c9516a [ 3367.018372] Code: 40 48 39 ca 75 e4 f3 c3 66 48 0f 7e c1 80 fa 08 73 0f 80 fa 04 73 13 80 fa 01 77 15 72 02 88 0f c3 48 89 4c 17 f8 48 89 0f c3 <89> 4c 17 fc 89 0f c3 66 89 4c 17 fe 66 89 0f c3 66 0f 1f 44 00 00 [ 3367.019440] RSP: 002b:00007ffe3f39d238 EFLAGS: 00010246 [ 3367.019780] RAX: 00007f4127c3100c RBX: 0000000000000004 RCX: 0000000000000000 [ 3367.020212] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 00007f4127c3100c [ 3367.020642] RBP: 00007ffe3f39d540 R08: 00007f4127c3100c R09: 000000000000f000 [ 3367.021070] R10: 00007f4127c31010 R11: 0000000000000003 R12: 00007f4127c6fa20 [ 3367.021503] R13: 00007ffe3f39d240 R14: 00007ffe3f39d2d0 R15: 00007ffe3f39d5d0 [ 3367.021947] [ 3367.022154] Mem-Info: [ 3367.022317] active_anon:45 inactive_anon:7354 isolated_anon:0 [ 3367.022317] active_file:1100 inactive_file:756 isolated_file:4 [ 3367.022317] unevictable:0 dirty:33 writeback:0 [ 3367.022317] slab_reclaimable:8223 slab_unreclaimable:47669 [ 3367.022317] mapped:10388 shmem:80 pagetables:315 [ 3367.022317] sec_pagetables:0 bounce:0 [ 3367.022317] kernel_misc_reclaimable:0 [ 3367.022317] free:4036 free_pcp:208 free_cma:0 [ 3367.024671] Node 0 active_anon:180kB inactive_anon:29416kB active_file:4208kB inactive_file:3108kB unevictable:0kB isolated(anon):0kB isolated(file):16kB mapped:41552kB dirty:132kB writeback:0kB shmem:320kB writeback_tmp:0kB kernel_stack:2976kB pagetables:1260kB sec_pagetables:0kB all_unreclaimable? no [ 3367.026337] Node 0 DMA free:6448kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3367.027980] lowmem_reserve[]: 0 1606 1606 1606 [ 3367.028311] Node 0 DMA32 free:9696kB boost:0kB min:5104kB low:6748kB high:8392kB reserved_highatomic:2048KB active_anon:180kB inactive_anon:29356kB active_file:4936kB inactive_file:3460kB unevictable:0kB writepending:468kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:920kB local_pcp:0kB free_cma:0kB [ 3367.030091] lowmem_reserve[]: 0 0 0 0 [ 3367.030370] Node 0 DMA: 0*4kB 2*8kB (UM) 2*16kB (UM) 2*32kB (UM) 1*64kB (M) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6448kB [ 3367.031477] Node 0 DMA32: 850*4kB (UMEH) 374*8kB (UME) 202*16kB (ME) 18*32kB (ME) 3*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 10392kB [ 3367.032578] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3367.033120] 1844 total pagecache pages [ 3367.033378] 0 pages in swap cache [ 3367.033630] Free swap = 0kB [ 3367.033837] Total swap = 0kB [ 3367.034041] 524158 pages RAM [ 3367.034249] 0 pages HighMem/MovableOnly [ 3367.034527] 106453 pages reserved [ 3367.034762] Unreclaimable slab info: [ 3367.035191] Name Used Total [ 3367.035623] pid_3 7KB 7KB [ 3367.035975] pid_2 115KB 183KB [ 3367.036324] IEEE-802.15.4-MAC 63KB 63KB [ 3367.036695] IEEE-802.15.4-RAW 31KB 31KB [ 3367.037051] fib6_nodes 28KB 28KB [ 3367.037398] ip6_dst_cache 30KB 30KB [ 3367.037765] RAWv6 123KB 123KB [ 3367.038111] UDPLITEv6 96KB 96KB [ 3367.038466] UDPv6 64KB 64KB [ 3367.038848] tw_sock_TCPv6 7KB 7KB [ 3367.039208] TCPv6 62KB 62KB [ 3367.039583] scsi_sense_cache 8KB 8KB [ 3367.039936] virtio_scsi_cmd 16KB 16KB [ 3367.040288] bio-120 7KB 7KB [ 3367.040801] io_kiocb 11KB 11KB [ 3367.041215] mqueue_inode_cache 60KB 60KB [ 3367.041646] nfs_commit_data 15KB 15KB [ 3367.042126] nfs_write_data 47KB 47KB [ 3367.042606] jbd2_inode 11KB 11KB [ 3367.042977] ext4_system_zone 3KB 3KB [ 3367.043445] ext4_io_end_vec 7KB 7KB [ 3367.043849] kioctx 31KB 31KB [ 3367.044221] aio_kiocb 7KB 7KB [ 3367.044610] fasync_cache 7KB 7KB [ 3367.044978] pid_namespace 7KB 7KB [ 3367.045341] posix_timers_cache 7KB 7KB [ 3367.045739] rpc_buffers 31KB 31KB [ 3367.046105] rpc_tasks 3KB 3KB [ 3367.046477] UNIX-STREAM 148KB 384KB [ 3367.046866] UNIX 198KB 288KB [ 3367.047234] UDP-Lite 30KB 30KB [ 3367.047624] tcp_bind2_bucket 8KB 8KB [ 3367.047990] tcp_bind_bucket 8KB 8KB [ 3367.048357] xfrm_state 16KB 16KB [ 3367.048744] ip_fib_trie 8KB 8KB [ 3367.049111] ip_fib_alias 15KB 15KB [ 3367.049475] ip_dst_cache 8KB 8KB [ 3367.049921] PING 30KB 30KB [ 3367.050331] RAW 61KB 61KB [ 3367.050718] UDP 203KB 369KB [ 3367.051155] request_sock_TCP 15KB 15KB [ 3367.051608] TCP 60KB 60KB [ 3367.051978] hugetlbfs_inode_cache 31KB 31KB [ 3367.052361] bio-248 11KB 11KB [ 3367.052741] ep_head 8KB 8KB [ 3367.053117] eventpoll_pwq 19KB 19KB [ 3367.053510] eventpoll_epi 47KB 55KB [ 3367.053875] inotify_inode_mark 39KB 39KB [ 3367.054252] sgpool-128 59KB 59KB [ 3367.054644] sgpool-64 63KB 63KB [ 3367.055014] sgpool-32 276KB 346KB [ 3367.055375] sgpool-16 142KB 142KB [ 3367.055774] sgpool-8 123KB 123KB [ 3367.056143] request_queue 61KB 61KB [ 3367.056561] blkdev_ioc 20KB 36KB [ 3367.057021] bio-184 36KB 36KB [ 3367.057394] biovec-max 782KB 782KB [ 3367.057786] biovec-128 31KB 31KB [ 3367.058152] biovec-64 571KB 645KB [ 3367.058547] biovec-16 67KB 67KB [ 3367.059001] uid_cache 7KB 7KB [ 3367.059477] dmaengine-unmap-2 4KB 4KB [ 3367.059869] audit_buffer 7KB 7KB [ 3367.060242] skbuff_small_head 425KB 425KB [ 3367.060658] skbuff_fclone_cache 30KB 60KB [ 3367.061134] skbuff_head_cache 292KB 292KB [ 3367.061539] file_lock_cache 35KB 35KB [ 3367.062003] file_lock_ctx 7KB 7KB [ 3367.062454] fsnotify_mark_connector 20KB 20KB [ 3367.062884] taskstats 87KB 87KB [ 3367.063286] proc_dir_entry 315KB 352KB [ 3367.063769] pde_opener 7KB 7KB [ 3367.064144] seq_file 52KB 52KB [ 3367.064541] sigqueue 31KB 31KB [ 3367.064910] shmem_inode_cache 1276KB 1454KB [ 3367.065386] kernfs_iattrs_cache 261KB 261KB [ 3367.065805] kernfs_node_cache 4956KB 5014KB [ 3367.066178] mnt_cache 180KB 196KB [ 3367.066594] filp 1213KB 1687KB [ 3367.067077] names_cache 7488KB 8597KB [ 3367.067449] net_namespace 82KB 82KB [ 3367.067882] hashtab_node 274KB 274KB [ 3367.068339] ebitmap_node 1149KB 1149KB [ 3367.068737] avtab_node 4976KB 4976KB [ 3367.069106] avc_node 35KB 35KB [ 3367.069665] lsm_inode_cache 2647KB 3130KB [ 3367.070044] lsm_file_cache 67KB 160KB [ 3367.070413] key_jar 76KB 86KB [ 3367.070920] uts_namespace 15KB 15KB [ 3367.071287] nsproxy 7KB 7KB [ 3367.071761] vm_area_struct 1562KB 1740KB [ 3367.072194] fs_cache 58KB 72KB [ 3367.072594] files_cache 193KB 255KB [ 3367.072977] signal_cache 389KB 516KB [ 3367.073425] sighand_cache 328KB 450KB [ 3367.073833] task_struct 2427KB 3397KB [ 3367.074204] cred_jar 142KB 184KB [ 3367.074612] anon_vma_chain 473KB 543KB [ 3367.075014] anon_vma 171KB 207KB [ 3367.075529] pid 51KB 56KB [ 3367.075911] Acpi-Operand 69KB 110KB [ 3367.076284] Acpi-ParseExt 27KB 27KB [ 3367.076680] Acpi-Parse 39KB 55KB [ 3367.077073] Acpi-State 51KB 66KB [ 3367.077555] Acpi-Namespace 24KB 24KB [ 3367.077938] numa_policy 7KB 7KB [ 3367.078330] perf_event 203KB 279KB [ 3367.078851] trace_event_file 179KB 179KB [ 3367.079219] ftrace_event_field 434KB 434KB [ 3367.079621] pool_workqueue 40KB 40KB [ 3367.079991] maple_node 3075KB 3144KB [ 3367.080468] task_group 16KB 16KB [ 3367.080872] mm_struct 407KB 598KB [ 3367.081249] vmap_area 48KB 63KB [ 3367.081751] page->ptl 392KB 539KB [ 3367.082118] kmemleak_scan_area 35KB 39KB [ 3367.084173] kmemleak_object 94951KB 106912KB [ 3367.084631] kmalloc-cg-8k 64KB 64KB [ 3367.084999] kmalloc-cg-4k 2472KB 2592KB [ 3367.085368] kmalloc-cg-2k 1956KB 2272KB [ 3367.085877] kmalloc-cg-1k 416KB 480KB [ 3367.086247] kmalloc-cg-512 568KB 656KB [ 3367.086641] kmalloc-cg-256 48KB 48KB [ 3367.087007] kmalloc-cg-192 48KB 48KB [ 3367.087370] kmalloc-cg-128 40KB 40KB [ 3367.087874] kmalloc-cg-96 53KB 60KB [ 3367.088330] kmalloc-cg-64 52KB 52KB [ 3367.088743] kmalloc-cg-32 49KB 68KB [ 3367.089116] kmalloc-cg-16 8KB 8KB [ 3367.089480] kmalloc-cg-8 19KB 19KB [ 3367.089892] kmalloc-8k 1616KB 1760KB [ 3367.090421] kmalloc-4k 4200KB 4448KB [ 3367.090828] kmalloc-2k 3276KB 3360KB [ 3367.091202] kmalloc-1k 1570KB 2144KB [ 3367.091605] kmalloc-512 1605KB 1792KB [ 3367.091979] kmalloc-256 1003KB 1064KB [ 3367.092462] kmalloc-192 698KB 720KB [ 3367.092945] kmalloc-128 266KB 324KB [ 3367.093360] kmalloc-96 446KB 560KB [ 3367.093774] kmalloc-64 695KB 844KB [ 3367.094158] kmalloc-32 490KB 556KB [ 3367.094568] kmalloc-16 316KB 336KB [ 3367.095052] kmalloc-8 270KB 286KB [ 3367.095514] kmem_cache_node 51KB 51KB [ 3367.095896] kmem_cache 82KB 82KB [ 3367.096265] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=38870,uid=0 [ 3367.098469] Out of memory (oom_kill_allocating_task): Killed process 38870 (sshd) total-vm:1564kB, anon-rss:0kB, file-rss:256kB, shmem-rss:0kB, UID:0 pgtables:40kB oom_score_adj:0 [ 3367.263891] syz-executor.7 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3367.264708] CPU: 1 PID: 38862 Comm: syz-executor.7 Not tainted 6.2.0-rc8-next-20230214 #1 [ 3367.265241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3367.265768] Call Trace: [ 3367.265946] [ 3367.266109] dump_stack_lvl+0xc1/0xf0 [ 3367.266377] dump_header+0x10a/0xd50 [ 3367.266638] oom_kill_process+0x25d/0x600 [ 3367.266922] out_of_memory+0x1365/0x1660 [ 3367.267199] ? __pfx_out_of_memory+0x10/0x10 [ 3367.267507] __alloc_pages_slowpath.constprop.0+0x19ce/0x2010 [ 3367.267920] ? __pfx___alloc_pages_slowpath.constprop.0+0x10/0x10 [ 3367.268335] ? lock_is_held_type+0x9f/0x120 [ 3367.268636] ? prepare_alloc_pages+0x377/0x500 [ 3367.268956] ? lock_is_held_type+0x9f/0x120 [ 3367.269267] __alloc_pages+0x430/0x510 [ 3367.269541] ? __pfx___alloc_pages+0x10/0x10 [ 3367.269844] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3367.270204] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3367.270594] ? alloc_pages+0x39/0x260 [ 3367.270861] alloc_pages+0x1a0/0x260 [ 3367.271125] relay_open_buf.part.0+0x285/0xbc0 [ 3367.271447] ? _find_next_bit+0x11b/0x150 [ 3367.271746] relay_open+0x511/0xa30 [ 3367.272009] do_blk_trace_setup+0x4b0/0xbb0 [ 3367.272317] __blk_trace_setup+0xca/0x180 [ 3367.272616] ? __pfx___blk_trace_setup+0x10/0x10 [ 3367.272957] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3367.273312] blk_trace_setup+0x47/0x70 [ 3367.273590] sg_ioctl+0x6a5/0x26a0 [ 3367.273852] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 3367.274289] ? __pfx_sg_ioctl+0x10/0x10 [ 3367.274585] ? __pfx___fget_files+0x10/0x10 [ 3367.274900] ? lock_acquire+0x32/0xc0 [ 3367.275183] ? __pfx___fget_files+0x10/0x10 [ 3367.275501] ? selinux_file_ioctl+0xba/0x270 [ 3367.275836] ? __pfx_sg_ioctl+0x10/0x10 [ 3367.276131] __x64_sys_ioctl+0x19e/0x210 [ 3367.276431] do_syscall_64+0x3f/0x90 [ 3367.276709] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3367.277084] RIP: 0033:0x7fa1dc9aab19 [ 3367.277358] Code: Unable to access opcode bytes at 0x7fa1dc9aaaef. [ 3367.277781] RSP: 002b:00007fa1d9ede188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3367.278302] RAX: ffffffffffffffda RBX: 00007fa1dcabe0e0 RCX: 00007fa1dc9aab19 [ 3367.278799] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 3367.279288] RBP: 00007fa1dca04f6d R08: 0000000000000000 R09: 0000000000000000 [ 3367.279791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3367.280291] R13: 00007fff93f4db4f R14: 00007fa1d9ede300 R15: 0000000000022000 [ 3367.280808] [ 3367.281049] Mem-Info: [ 3367.281230] active_anon:34 inactive_anon:7368 isolated_anon:0 [ 3367.281230] active_file:32 inactive_file:55 isolated_file:0 [ 3367.281230] unevictable:0 dirty:0 writeback:0 [ 3367.281230] slab_reclaimable:8189 slab_unreclaimable:47589 [ 3367.281230] mapped:8720 shmem:63 pagetables:322 [ 3367.281230] sec_pagetables:0 bounce:0 [ 3367.281230] kernel_misc_reclaimable:0 [ 3367.281230] free:2619 free_pcp:62 free_cma:0 [ 3367.283806] Node 0 active_anon:136kB inactive_anon:29472kB active_file:212kB inactive_file:220kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34880kB dirty:0kB writeback:0kB shmem:252kB writeback_tmp:0kB kernel_stack:2976kB pagetables:1288kB sec_pagetables:0kB all_unreclaimable? no [ 3367.285575] Node 0 DMA free:6448kB boost:0kB min:44kB low:56kB high:68kB reserved_highatomic:0KB active_anon:0kB inactive_anon:8kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3367.287300] lowmem_reserve[]: 0 1606 1606 1606 [ 3367.287701] Node 0 DMA32 free:4028kB boost:0kB min:5104kB low:6748kB high:8392kB reserved_highatomic:2048KB active_anon:136kB inactive_anon:29464kB active_file:356kB inactive_file:8kB unevictable:0kB writepending:68kB present:2080640kB managed:1655460kB mlocked:0kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 3367.289607] lowmem_reserve[]: 0 0 0 0 [ 3367.289905] Node 0 DMA: 0*4kB 2*8kB (UM) 2*16kB (UM) 2*32kB (UM) 1*64kB (M) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6448kB [ 3367.291047] Node 0 DMA32: 364*4kB (UMEH) 205*8kB (UMEH) 68*16kB (UMEH) 1*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4216kB [ 3367.292102] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3367.292705] 151 total pagecache pages [ 3367.292971] 0 pages in swap cache [ 3367.293211] Free swap = 0kB [ 3367.293430] Total swap = 0kB [ 3367.293667] 524158 pages RAM [ 3367.293882] 0 pages HighMem/MovableOnly [ 3367.294160] 106453 pages reserved [ 3367.294403] Unreclaimable slab info: [ 3367.294830] Name Used Total [ 3367.295266] pid_3 7KB 7KB [ 3367.295667] pid_2 114KB 180KB [ 3367.296044] IEEE-802.15.4-MAC 63KB 63KB [ 3367.296411] IEEE-802.15.4-RAW 31KB 31KB [ 3367.296807] fib6_nodes 28KB 28KB [ 3367.297166] ip6_dst_cache 30KB 30KB [ 3367.297551] RAWv6 123KB 123KB [ 3367.297917] UDPLITEv6 96KB 96KB [ 3367.298288] UDPv6 64KB 64KB [ 3367.298671] tw_sock_TCPv6 7KB 7KB [ 3367.299045] TCPv6 62KB 62KB [ 3367.299412] scsi_sense_cache 8KB 8KB [ 3367.299816] virtio_scsi_cmd 16KB 16KB [ 3367.300187] bio-120 7KB 7KB [ 3367.300579] io_kiocb 11KB 11KB [ 3367.300949] mqueue_inode_cache 60KB 60KB [ 3367.301329] nfs_commit_data 15KB 15KB [ 3367.301715] nfs_write_data 47KB 47KB [ 3367.302080] jbd2_inode 11KB 11KB [ 3367.302446] ext4_system_zone 3KB 3KB [ 3367.302837] ext4_io_end_vec 7KB 7KB [ 3367.303205] kioctx 31KB 31KB [ 3367.303598] aio_kiocb 7KB 7KB [ 3367.303972] fasync_cache 7KB 7KB [ 3367.304348] pid_namespace 7KB 7KB [ 3367.304739] posix_timers_cache 7KB 7KB [ 3367.305113] rpc_buffers 31KB 31KB [ 3367.305482] rpc_tasks 3KB 3KB [ 3367.305872] UNIX-STREAM 148KB 384KB [ 3367.306240] UNIX 198KB 288KB [ 3367.306635] UDP-Lite 30KB 30KB [ 3367.307000] tcp_bind2_bucket 8KB 8KB [ 3367.307365] tcp_bind_bucket 8KB 8KB [ 3367.307794] xfrm_state 16KB 16KB [ 3367.308165] ip_fib_trie 8KB 8KB [ 3367.308552] ip_fib_alias 15KB 15KB [ 3367.308915] ip_dst_cache 8KB 8KB [ 3367.309281] PING 30KB 30KB [ 3367.309663] RAW 61KB 61KB [ 3367.310031] UDP 203KB 369KB [ 3367.310403] request_sock_TCP 15KB 15KB [ 3367.310789] TCP 60KB 60KB [ 3367.311161] hugetlbfs_inode_cache 31KB 31KB [ 3367.311570] bio-248 11KB 11KB [ 3367.311945] ep_head 8KB 8KB [ 3367.312309] eventpoll_pwq 19KB 19KB [ 3367.312689] eventpoll_epi 47KB 55KB [ 3367.313056] inotify_inode_mark 39KB 39KB [ 3367.313435] sgpool-128 59KB 59KB [ 3367.313827] sgpool-64 63KB 63KB [ 3367.314200] sgpool-32 333KB 346KB [ 3367.314585] sgpool-16 142KB 142KB [ 3367.314953] sgpool-8 123KB 123KB [ 3367.315330] request_queue 61KB 61KB [ 3367.315727] blkdev_ioc 20KB 36KB [ 3367.316092] bio-184 36KB 36KB [ 3367.316458] biovec-max 811KB 811KB [ 3367.316846] biovec-128 31KB 31KB [ 3367.317216] biovec-64 571KB 645KB [ 3367.317599] biovec-16 67KB 67KB [ 3367.317972] uid_cache 7KB 7KB [ 3367.318337] dmaengine-unmap-2 4KB 4KB [ 3367.318732] audit_buffer 7KB 7KB [ 3367.319102] skbuff_small_head 425KB 425KB [ 3367.319463] skbuff_fclone_cache 30KB 60KB [ 3367.319864] skbuff_head_cache 292KB 292KB [ 3367.320236] file_lock_cache 35KB 35KB [ 3367.320626] file_lock_ctx 7KB 7KB [ 3367.320990] fsnotify_mark_connector 20KB 20KB [ 3367.321395] taskstats 87KB 87KB [ 3367.321786] proc_dir_entry 315KB 352KB [ 3367.322156] pde_opener 7KB 7KB [ 3367.322544] seq_file 52KB 52KB [ 3367.322915] sigqueue 31KB 31KB [ 3367.323291] shmem_inode_cache 1276KB 1454KB [ 3367.323691] kernfs_iattrs_cache 261KB 261KB [ 3367.324069] kernfs_node_cache 4956KB 5014KB [ 3367.324439] mnt_cache 180KB 196KB [ 3367.324824] filp 1208KB 1680KB [ 3367.325199] names_cache 7093KB 8597KB [ 3367.325589] net_namespace 82KB 82KB [ 3367.325965] hashtab_node 274KB 274KB [ 3367.326337] ebitmap_node 1149KB 1149KB [ 3367.326722] avtab_node 4976KB 4976KB [ 3367.327083] avc_node 35KB 35KB [ 3367.327460] lsm_inode_cache 2643KB 3130KB [ 3367.327848] lsm_file_cache 66KB 160KB [ 3367.328220] key_jar 76KB 86KB [ 3367.328607] uts_namespace 15KB 15KB [ 3367.328979] nsproxy 7KB 7KB [ 3367.329353] vm_area_struct 1535KB 1736KB [ 3367.329734] fs_cache 58KB 72KB [ 3367.330099] files_cache 191KB 255KB [ 3367.330467] signal_cache 389KB 516KB [ 3367.330851] sighand_cache 328KB 450KB [ 3367.331217] task_struct 2387KB 3370KB [ 3367.331615] cred_jar 142KB 184KB [ 3367.331986] anon_vma_chain 466KB 543KB [ 3367.332350] anon_vma 171KB 207KB [ 3367.332740] pid 51KB 56KB [ 3367.333108] Acpi-Operand 69KB 110KB [ 3367.333474] Acpi-ParseExt 27KB 27KB [ 3367.333864] Acpi-Parse 39KB 55KB [ 3367.334230] Acpi-State 51KB 66KB [ 3367.334620] Acpi-Namespace 24KB 24KB [ 3367.334992] numa_policy 7KB 7KB [ 3367.335357] perf_event 203KB 279KB [ 3367.335744] trace_event_file 179KB 179KB [ 3367.336115] ftrace_event_field 434KB 434KB [ 3367.336487] pool_workqueue 40KB 40KB [ 3367.336881] maple_node 3064KB 3136KB [ 3367.337249] task_group 16KB 16KB [ 3367.337635] mm_struct 407KB 598KB [ 3367.337998] vmap_area 48KB 63KB [ 3367.338370] page->ptl 385KB 539KB [ 3367.338755] kmemleak_scan_area 35KB 39KB [ 3367.339432] kmemleak_object 94719KB 106827KB [ 3367.339839] kmalloc-cg-8k 64KB 64KB [ 3367.340212] kmalloc-cg-4k 2472KB 2592KB [ 3367.340590] kmalloc-cg-2k 1952KB 2272KB [ 3367.340957] kmalloc-cg-1k 416KB 480KB [ 3367.341324] kmalloc-cg-512 568KB 656KB [ 3367.341707] kmalloc-cg-256 48KB 48KB [ 3367.342084] kmalloc-cg-192 48KB 48KB [ 3367.342449] kmalloc-cg-128 40KB 40KB [ 3367.342839] kmalloc-cg-96 53KB 60KB [ 3367.343206] kmalloc-cg-64 52KB 52KB [ 3367.343592] kmalloc-cg-32 49KB 68KB [ 3367.343966] kmalloc-cg-16 8KB 8KB [ 3367.344332] kmalloc-cg-8 19KB 19KB [ 3367.344727] kmalloc-8k 1616KB 1760KB [ 3367.345096] kmalloc-4k 4184KB 4448KB [ 3367.345455] kmalloc-2k 3252KB 3360KB [ 3367.345840] kmalloc-1k 1570KB 2144KB [ 3367.346210] kmalloc-512 1602KB 1792KB [ 3367.346604] kmalloc-256 1002KB 1064KB [ 3367.346966] kmalloc-192 699KB 720KB [ 3367.347337] kmalloc-128 266KB 324KB [ 3367.347725] kmalloc-96 445KB 560KB [ 3367.348102] kmalloc-64 678KB 844KB [ 3367.348471] kmalloc-32 487KB 556KB [ 3367.348852] kmalloc-16 316KB 336KB [ 3367.349220] kmalloc-8 270KB 286KB [ 3367.349607] kmem_cache_node 51KB 51KB [ 3367.349979] kmem_cache 82KB 82KB [ 3367.350344] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz7,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=38862,uid=0 [ 3367.351851] Out of memory (oom_kill_allocating_task): Killed process 38862 (syz-executor.7) total-vm:93808kB, anon-rss:24kB, file-rss:34944kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 VM DIAGNOSIS: 05:54:49 Registers: info registers vcpu 0 RAX=0000000000000008 RBX=0000000000000008 RCX=0000000000000000 RDX=000000000001c060 RSI=ffffffff8218f828 RDI=0000000000000007 RBP=ffff888009628000 RSP=ffff88806ce09de8 R8 =0000000000000007 R9 =0000000000010000 R10=000000000001c060 R11=0000000000000001 R12=000000000001c060 R13=ffff88800962c068 R14=ffff888009628234 R15=0000000000000001 RIP=ffffffff8218f82e RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe7af54d9000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe7af54d7000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fca3fdebc30 CR3=0000000008d6e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffff00000000 XMM01=696e752f646d65747379732f6e75722f XMM02=00000000000000000000000000000000 XMM03=003a6e6f697461636f766e692f737469 XMM04=000000000000008a00007fff5b83e0e0 XMM05=ffffffffffffff00ffff000000000000 XMM06=0000000000000073000045494649544e XMM07=00000000000000000000000000000000 XMM08=74696e752f646d65747379732f6e7572 XMM09=00000000000000000000000000000000 XMM10=00002000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff812d54aa RDX=fffffbfff0ba4883 RSI=0000000000000008 RDI=ffffffff85d24410 RBP=1ffff11003123f03 RSP=ffff88801891f808 R8 =0000000000000000 R9 =ffffffff85d24417 R10=fffffbfff0ba4882 R11=0000000000000001 R12=ffffffff8560a940 R13=ffffffff8181a860 R14=ffff888016c07cb8 R15=0000000000000001 RIP=ffffffff812d54b2 RFL=00000247 [---Z-PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc653ad8900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe638994f000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe638994d000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc65447d0b0 CR3=000000000dbf2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000000000000000000000000000ff XMM02=000000000000000000000000000000ff XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=736f6c63206e6f697463656e6e6f4300 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000