{}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:32:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x6000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 2963.476066] FAULT_INJECTION: forcing a failure. [ 2963.476066] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.477412] CPU: 0 PID: 59385 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2963.478206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2963.479145] Call Trace: [ 2963.479454] dump_stack+0x107/0x167 [ 2963.479876] should_fail.cold+0x5/0xa [ 2963.480312] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2963.480918] ? create_object.isra.0+0x3a/0xa20 [ 2963.481439] should_failslab+0x5/0x20 [ 2963.481873] kmem_cache_alloc+0x5b/0x310 [ 2963.482335] ? mark_held_locks+0x9e/0xe0 [ 2963.482799] create_object.isra.0+0x3a/0xa20 [ 2963.483300] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2963.483878] kmem_cache_alloc_node+0x169/0x330 [ 2963.484406] __alloc_skb+0x6d/0x5b0 [ 2963.484843] skb_segment+0x9d8/0x3aa0 [ 2963.485283] ? __lock_acquire+0xbb1/0x5b00 [ 2963.485789] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2963.486359] ? lock_acquire+0x197/0x470 [ 2963.486819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2963.487419] __udp_gso_segment+0x11c6/0x1830 [ 2963.487932] ? __sk_receive_skb+0x830/0x830 [ 2963.488431] udp4_ufo_fragment+0x528/0x720 [ 2963.488918] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2963.489485] inet_gso_segment+0x4fb/0x11a0 [ 2963.489971] skb_mac_gso_segment+0x273/0x570 [ 2963.490478] ? inet_sock_destruct+0x840/0x840 [ 2963.490983] ? skb_network_protocol+0x650/0x650 [ 2963.491511] ? skb_crc32c_csum_help+0x80/0x80 [ 2963.492014] ? lock_acquire+0x197/0x470 [ 2963.492461] ? __dev_queue_xmit+0x1c6/0x2690 [ 2963.492975] __skb_gso_segment+0x32d/0x6d0 [ 2963.493453] ? mark_lock+0xf5/0x2df0 [ 2963.493886] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2963.494476] ? lock_chain_count+0x20/0x20 [ 2963.494948] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2963.495470] __dev_queue_xmit+0x825/0x2690 [ 2963.495958] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2963.496542] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2963.497081] ? mark_held_locks+0x9e/0xe0 [ 2963.497547] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2963.498152] neigh_connected_output+0x382/0x4d0 [ 2963.498693] ip_finish_output2+0x6f1/0x21f0 [ 2963.499191] ? nf_hook_slow+0xfc/0x1e0 [ 2963.499634] ? ip_frag_next+0x9e0/0x9e0 [ 2963.500086] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2963.500662] __ip_finish_output.part.0+0x5f3/0xb50 [ 2963.501234] ? ip_fragment.constprop.0+0x240/0x240 [ 2963.501792] ? netif_rx_ni+0xe7/0x300 [ 2963.502227] ip_mc_output+0x401/0xa30 [ 2963.502669] ip_send_skb+0xdd/0x260 [ 2963.503087] udp_send_skb+0x6da/0x11d0 [ 2963.503543] udp_sendmsg+0x139a/0x2160 [ 2963.503986] ? mark_lock+0xf5/0x2df0 [ 2963.504412] ? ip_frag_init+0x350/0x350 [ 2963.504874] ? lock_chain_count+0x20/0x20 [ 2963.505345] ? udp_setsockopt+0xc0/0xc0 [ 2963.505796] ? mark_lock+0xf5/0x2df0 [ 2963.506217] ? lock_acquire+0x197/0x470 [ 2963.506676] ? lock_chain_count+0x20/0x20 [ 2963.507145] ? mark_lock+0xf5/0x2df0 [ 2963.507577] ? mark_lock+0xf5/0x2df0 [ 2963.508000] ? lock_chain_count+0x20/0x20 [ 2963.508472] ? __lock_acquire+0xbb1/0x5b00 [ 2963.508972] ? lock_chain_count+0x20/0x20 [ 2963.509452] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2963.510059] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2963.510532] ? udp_v6_push_pending_frames+0x360/0x360 [ 2963.511123] ? mark_lock+0xf5/0x2df0 [ 2963.511552] ? lock_acquire+0x197/0x470 [ 2963.512006] ? find_held_lock+0x2c/0x110 [ 2963.512472] ? __might_fault+0xd3/0x180 [ 2963.512939] ? lock_downgrade+0x6d0/0x6d0 [ 2963.513418] ? lock_downgrade+0x6d0/0x6d0 [ 2963.513896] ? sock_has_perm+0x1ea/0x280 [ 2963.514357] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2963.514954] ? _copy_from_user+0xfb/0x1b0 [ 2963.515430] ? __import_iovec+0x458/0x590 [ 2963.515902] ? udp_v6_push_pending_frames+0x360/0x360 [ 2963.516499] inet6_sendmsg+0x105/0x140 [ 2963.516954] ? inet6_compat_ioctl+0x320/0x320 [ 2963.517468] __sock_sendmsg+0xf2/0x190 [ 2963.517912] ____sys_sendmsg+0x70d/0x870 [ 2963.518375] ? sock_write_iter+0x3d0/0x3d0 [ 2963.518858] ? do_recvmmsg+0x6d0/0x6d0 [ 2963.519306] ? lock_downgrade+0x6d0/0x6d0 [ 2963.519778] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2963.520381] ___sys_sendmsg+0xf3/0x170 [ 2963.520838] ? sendmsg_copy_msghdr+0x160/0x160 [ 2963.521366] ? __fget_files+0x2cf/0x520 [ 2963.521821] ? lock_downgrade+0x6d0/0x6d0 [ 2963.522291] ? find_held_lock+0x2c/0x110 [ 2963.522760] ? __fget_files+0x2f8/0x520 [ 2963.523216] ? __fget_light+0xea/0x290 [ 2963.523670] __sys_sendmsg+0xe5/0x1b0 [ 2963.524106] ? __sys_sendmsg_sock+0x40/0x40 [ 2963.524597] ? rcu_read_lock_any_held+0x75/0xa0 [ 2963.525143] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2963.525739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2963.526321] ? trace_hardirqs_on+0x5b/0x180 [ 2963.526820] do_syscall_64+0x33/0x40 [ 2963.527242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2963.527831] RIP: 0033:0x7f3e899f4b19 [ 2963.528251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2963.530343] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2963.531212] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 2963.532026] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2963.532843] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2963.533659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2963.534469] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:33:03 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x5}]}]}, 0x24}}, 0x0) 05:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:33:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x69a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:33:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 67) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:03 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x3}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:33:03 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:33:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 21) 05:33:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x600, 0x0) [ 2981.058134] FAULT_INJECTION: forcing a failure. [ 2981.058134] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.060482] CPU: 1 PID: 59501 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2981.061865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.063517] Call Trace: [ 2981.064053] dump_stack+0x107/0x167 [ 2981.064775] should_fail.cold+0x5/0xa [ 2981.065552] should_failslab+0x5/0x20 [ 2981.066295] FAULT_INJECTION: forcing a failure. [ 2981.066295] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.068507] __kmalloc_node_track_caller+0x74/0x3b0 [ 2981.069524] ? skb_segment+0x9d8/0x3aa0 [ 2981.070336] __alloc_skb+0xb1/0x5b0 [ 2981.071056] skb_segment+0x9d8/0x3aa0 [ 2981.071844] ? __lock_acquire+0xbb1/0x5b00 [ 2981.072770] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2981.073802] ? lock_acquire+0x197/0x470 [ 2981.074598] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.075650] __udp_gso_segment+0x11c6/0x1830 [ 2981.076530] ? __sk_receive_skb+0x830/0x830 [ 2981.077389] udp4_ufo_fragment+0x528/0x720 [ 2981.078255] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2981.079254] inet_gso_segment+0x4fb/0x11a0 [ 2981.080117] skb_mac_gso_segment+0x273/0x570 [ 2981.080994] ? inet_sock_destruct+0x840/0x840 [ 2981.081899] ? skb_network_protocol+0x650/0x650 [ 2981.082815] ? skb_crc32c_csum_help+0x80/0x80 [ 2981.083713] ? lock_acquire+0x197/0x470 [ 2981.084493] ? __dev_queue_xmit+0x1c6/0x2690 [ 2981.085357] __skb_gso_segment+0x32d/0x6d0 [ 2981.086199] ? mark_lock+0xf5/0x2df0 [ 2981.086940] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2981.087982] ? lock_chain_count+0x20/0x20 [ 2981.088803] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2981.089724] __dev_queue_xmit+0x825/0x2690 [ 2981.090579] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2981.091603] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2981.092506] ? mark_held_locks+0x9e/0xe0 [ 2981.093321] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2981.094376] neigh_connected_output+0x382/0x4d0 [ 2981.095303] ip_finish_output2+0x6f1/0x21f0 [ 2981.096153] ? nf_hook_slow+0xfc/0x1e0 [ 2981.096917] ? ip_frag_next+0x9e0/0x9e0 [ 2981.097713] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2981.098701] __ip_finish_output.part.0+0x5f3/0xb50 [ 2981.099680] ? ip_fragment.constprop.0+0x240/0x240 [ 2981.100640] ? netif_rx_ni+0xe7/0x300 [ 2981.101396] ip_mc_output+0x401/0xa30 [ 2981.102166] ip_send_skb+0xdd/0x260 [ 2981.102887] udp_send_skb+0x6da/0x11d0 [ 2981.103658] udp_sendmsg+0x139a/0x2160 [ 2981.104425] ? mark_lock+0xf5/0x2df0 [ 2981.105169] ? ip_frag_init+0x350/0x350 [ 2981.105961] ? lock_chain_count+0x20/0x20 [ 2981.106779] ? udp_setsockopt+0xc0/0xc0 [ 2981.107558] ? mark_lock+0xf5/0x2df0 [ 2981.108286] ? lock_acquire+0x197/0x470 [ 2981.109070] ? lock_chain_count+0x20/0x20 [ 2981.109893] ? mark_lock+0xf5/0x2df0 [ 2981.110629] ? mark_lock+0xf5/0x2df0 [ 2981.111368] ? lock_chain_count+0x20/0x20 [ 2981.112185] ? __lock_acquire+0xbb1/0x5b00 [ 2981.113016] ? lock_chain_count+0x20/0x20 [ 2981.113856] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.114903] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2981.115713] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.116732] ? mark_lock+0xf5/0x2df0 [ 2981.117487] ? lock_acquire+0x197/0x470 [ 2981.118266] ? find_held_lock+0x2c/0x110 [ 2981.119070] ? __might_fault+0xd3/0x180 [ 2981.119868] ? lock_downgrade+0x6d0/0x6d0 [ 2981.120682] ? lock_downgrade+0x6d0/0x6d0 [ 2981.121502] ? sock_has_perm+0x1ea/0x280 [ 2981.122296] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2981.123314] ? _copy_from_user+0xfb/0x1b0 [ 2981.124135] ? __import_iovec+0x458/0x590 [ 2981.124947] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.125862] inet6_sendmsg+0x105/0x140 [ 2981.126517] ? inet6_compat_ioctl+0x320/0x320 [ 2981.127272] __sock_sendmsg+0xf2/0x190 [ 2981.127936] ____sys_sendmsg+0x70d/0x870 [ 2981.128619] ? sock_write_iter+0x3d0/0x3d0 [ 2981.129329] ? do_recvmmsg+0x6d0/0x6d0 [ 2981.129992] ? lock_downgrade+0x6d0/0x6d0 [ 2981.130700] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.131597] ___sys_sendmsg+0xf3/0x170 [ 2981.132261] ? sendmsg_copy_msghdr+0x160/0x160 [ 2981.133039] ? __fget_files+0x2cf/0x520 [ 2981.133714] ? lock_downgrade+0x6d0/0x6d0 [ 2981.134419] ? find_held_lock+0x2c/0x110 [ 2981.135111] ? __fget_files+0x2f8/0x520 [ 2981.135791] ? __fget_light+0xea/0x290 [ 2981.136476] __sys_sendmsg+0xe5/0x1b0 [ 2981.137123] ? __sys_sendmsg_sock+0x40/0x40 [ 2981.137903] ? rcu_read_lock_any_held+0x75/0xa0 [ 2981.138706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.139593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.140471] ? trace_hardirqs_on+0x5b/0x180 [ 2981.141215] do_syscall_64+0x33/0x40 [ 2981.141860] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.142732] RIP: 0033:0x7f3e899f4b19 [ 2981.143371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.146486] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2981.147770] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 2981.148984] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2981.150208] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2981.151422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.152627] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 2981.154038] CPU: 0 PID: 59504 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2981.155500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.157179] Call Trace: [ 2981.157733] dump_stack+0x107/0x167 [ 2981.158483] should_fail.cold+0x5/0xa [ 2981.159270] should_failslab+0x5/0x20 [ 2981.160049] __kmalloc_track_caller+0x79/0x370 [ 2981.160978] ? v9fs_session_init+0xa7/0x1680 [ 2981.161876] ? kernel_text_address+0xf2/0x120 [ 2981.162796] kstrdup+0x36/0x70 [ 2981.163451] v9fs_session_init+0xa7/0x1680 [ 2981.164308] ? lock_release+0x680/0x680 [ 2981.165114] ? find_held_lock+0x2c/0x110 [ 2981.165952] ? kmem_cache_alloc_trace+0x151/0x320 [ 2981.166925] ? v9fs_show_options+0x690/0x690 [ 2981.167838] ? trace_hardirqs_on+0x5b/0x180 [ 2981.168719] ? kasan_unpoison_shadow+0x33/0x50 [ 2981.169663] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2981.170699] v9fs_mount+0x79/0x8f0 [ 2981.171436] ? v9fs_write_inode+0x60/0x60 [ 2981.172280] legacy_get_tree+0x105/0x220 [ 2981.173109] vfs_get_tree+0x8e/0x300 [ 2981.173128] path_mount+0x1429/0x2120 [ 2981.173151] ? strncpy_from_user+0x9e/0x470 [ 2981.173169] ? finish_automount+0xa90/0xa90 [ 2981.173199] ? getname_flags.part.0+0x1dd/0x4f0 [ 2981.177262] ? _copy_from_user+0xfb/0x1b0 [ 2981.178130] __x64_sys_mount+0x282/0x300 [ 2981.178954] ? copy_mnt_ns+0xa00/0xa00 [ 2981.179745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.180807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.181877] do_syscall_64+0x33/0x40 [ 2981.182632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.183666] RIP: 0033:0x7fbfa6f6fb19 [ 2981.184419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.188150] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2981.189709] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 2981.191162] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 2981.192612] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 2981.194062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.195514] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 2981.205006] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=59498 comm=syz-executor.0 [ 2981.207614] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=59498 comm=syz-executor.0 [ 2981.210956] 9pnet_virtio: no channels available for device [ 2981.246501] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2981.260051] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 68) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:03 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x6}]}]}, 0x24}}, 0x0) 05:33:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 22) 05:33:03 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x4}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 2981.352092] FAULT_INJECTION: forcing a failure. [ 2981.352092] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.354598] CPU: 0 PID: 59711 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2981.356111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.357941] Call Trace: [ 2981.358496] dump_stack+0x107/0x167 [ 2981.359250] should_fail.cold+0x5/0xa [ 2981.360035] ? create_object.isra.0+0x3a/0xa20 [ 2981.360974] should_failslab+0x5/0x20 [ 2981.361784] kmem_cache_alloc+0x5b/0x310 [ 2981.362635] create_object.isra.0+0x3a/0xa20 [ 2981.363540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2981.364597] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2981.365658] ? skb_segment+0x9d8/0x3aa0 [ 2981.366483] __alloc_skb+0xb1/0x5b0 [ 2981.367236] skb_segment+0x9d8/0x3aa0 [ 2981.368029] ? __lock_acquire+0xbb1/0x5b00 [ 2981.368937] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2981.369965] ? lock_acquire+0x197/0x470 [ 2981.370786] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.371866] __udp_gso_segment+0x11c6/0x1830 [ 2981.372764] ? __sk_receive_skb+0x830/0x830 [ 2981.373702] udp4_ufo_fragment+0x528/0x720 [ 2981.374576] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2981.375591] inet_gso_segment+0x4fb/0x11a0 [ 2981.376472] skb_mac_gso_segment+0x273/0x570 [ 2981.377370] ? inet_sock_destruct+0x840/0x840 [ 2981.378286] ? skb_network_protocol+0x650/0x650 [ 2981.379230] ? skb_crc32c_csum_help+0x80/0x80 [ 2981.380147] ? lock_acquire+0x197/0x470 [ 2981.380960] ? __dev_queue_xmit+0x1c6/0x2690 [ 2981.381883] __skb_gso_segment+0x32d/0x6d0 [ 2981.382754] ? mark_lock+0xf5/0x2df0 [ 2981.383524] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2981.384603] ? lock_chain_count+0x20/0x20 [ 2981.385453] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2981.386408] __dev_queue_xmit+0x825/0x2690 [ 2981.387283] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2981.388337] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2981.389288] ? mark_held_locks+0x9e/0xe0 [ 2981.390140] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2981.391216] neigh_connected_output+0x382/0x4d0 [ 2981.392422] ip_finish_output2+0x6f1/0x21f0 [ 2981.393332] ? nf_hook_slow+0xfc/0x1e0 [ 2981.394177] ? ip_frag_next+0x9e0/0x9e0 [ 2981.394988] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2981.396014] __ip_finish_output.part.0+0x5f3/0xb50 [ 2981.397025] ? ip_fragment.constprop.0+0x240/0x240 [ 2981.398041] ? netif_rx_ni+0xe7/0x300 [ 2981.398837] ip_mc_output+0x401/0xa30 [ 2981.399630] ip_send_skb+0xdd/0x260 [ 2981.400383] udp_send_skb+0x6da/0x11d0 [ 2981.401196] udp_sendmsg+0x139a/0x2160 [ 2981.402051] ? mark_lock+0xf5/0x2df0 [ 2981.402833] ? ip_frag_init+0x350/0x350 [ 2981.403652] ? lock_chain_count+0x20/0x20 [ 2981.404719] ? udp_setsockopt+0xc0/0xc0 [ 2981.405631] ? mark_lock+0xf5/0x2df0 [ 2981.406404] ? lock_acquire+0x197/0x470 [ 2981.407222] ? lock_chain_count+0x20/0x20 [ 2981.408080] ? mark_lock+0xf5/0x2df0 [ 2981.408850] ? mark_lock+0xf5/0x2df0 [ 2981.409633] ? lock_chain_count+0x20/0x20 [ 2981.410484] ? __lock_acquire+0xbb1/0x5b00 [ 2981.411351] ? lock_chain_count+0x20/0x20 [ 2981.412219] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.413302] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2981.414169] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.415236] ? mark_lock+0xf5/0x2df0 [ 2981.416008] ? lock_acquire+0x197/0x470 [ 2981.416820] ? find_held_lock+0x2c/0x110 [ 2981.417675] ? __might_fault+0xd3/0x180 [ 2981.418493] ? lock_downgrade+0x6d0/0x6d0 [ 2981.419354] ? lock_downgrade+0x6d0/0x6d0 [ 2981.420205] ? sock_has_perm+0x1ea/0x280 [ 2981.421037] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2981.422113] ? _copy_from_user+0xfb/0x1b0 [ 2981.422975] ? __import_iovec+0x458/0x590 [ 2981.423822] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.424885] inet6_sendmsg+0x105/0x140 [ 2981.425702] ? inet6_compat_ioctl+0x320/0x320 [ 2981.426614] __sock_sendmsg+0xf2/0x190 [ 2981.427412] ____sys_sendmsg+0x70d/0x870 [ 2981.428253] ? sock_write_iter+0x3d0/0x3d0 [ 2981.429121] ? do_recvmmsg+0x6d0/0x6d0 [ 2981.429944] ? lock_downgrade+0x6d0/0x6d0 [ 2981.430797] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.431879] ___sys_sendmsg+0xf3/0x170 [ 2981.432682] ? sendmsg_copy_msghdr+0x160/0x160 [ 2981.433633] ? __fget_files+0x2cf/0x520 [ 2981.434454] ? lock_downgrade+0x6d0/0x6d0 [ 2981.435305] ? find_held_lock+0x2c/0x110 [ 2981.436146] ? __fget_files+0x2f8/0x520 [ 2981.436981] ? __fget_light+0xea/0x290 [ 2981.438000] __sys_sendmsg+0xe5/0x1b0 [ 2981.438981] ? __sys_sendmsg_sock+0x40/0x40 [ 2981.440095] ? rcu_read_lock_any_held+0x75/0xa0 [ 2981.441074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.442446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.443495] ? trace_hardirqs_on+0x5b/0x180 [ 2981.444607] do_syscall_64+0x33/0x40 [ 2981.445494] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.446545] RIP: 0033:0x7f3e899f4b19 [ 2981.447311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.451034] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2981.452596] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 2981.454064] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2981.455515] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2981.456961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.458425] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 2981.477124] FAULT_INJECTION: forcing a failure. [ 2981.477124] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.478761] CPU: 1 PID: 59727 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2981.479732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.480892] Call Trace: [ 2981.481281] dump_stack+0x107/0x167 [ 2981.481814] should_fail.cold+0x5/0xa 05:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 2981.482365] ? create_object.isra.0+0x3a/0xa20 [ 2981.483115] should_failslab+0x5/0x20 [ 2981.483693] kmem_cache_alloc+0x5b/0x310 [ 2981.484260] create_object.isra.0+0x3a/0xa20 [ 2981.484872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2981.485599] __kmalloc_track_caller+0x177/0x370 [ 2981.486247] ? v9fs_session_init+0xa7/0x1680 [ 2981.486858] ? kernel_text_address+0xf2/0x120 [ 2981.487487] kstrdup+0x36/0x70 [ 2981.487942] v9fs_session_init+0xa7/0x1680 [ 2981.488535] ? lock_release+0x680/0x680 [ 2981.489090] ? find_held_lock+0x2c/0x110 [ 2981.489667] ? kmem_cache_alloc_trace+0x151/0x320 [ 2981.490337] ? v9fs_show_options+0x690/0x690 [ 2981.490955] ? trace_hardirqs_on+0x5b/0x180 [ 2981.491555] ? kasan_unpoison_shadow+0x33/0x50 [ 2981.492190] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2981.492903] v9fs_mount+0x79/0x8f0 [ 2981.493404] ? v9fs_write_inode+0x60/0x60 [ 2981.494011] legacy_get_tree+0x105/0x220 [ 2981.494580] vfs_get_tree+0x8e/0x300 [ 2981.495108] path_mount+0x1429/0x2120 [ 2981.495669] ? strncpy_from_user+0x9e/0x470 [ 2981.496273] ? finish_automount+0xa90/0xa90 [ 2981.496874] ? getname_flags.part.0+0x1dd/0x4f0 [ 2981.497534] ? _copy_from_user+0xfb/0x1b0 [ 2981.498120] __x64_sys_mount+0x282/0x300 [ 2981.498689] ? copy_mnt_ns+0xa00/0xa00 [ 2981.499249] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.499986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.500715] do_syscall_64+0x33/0x40 05:33:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x7000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 2981.501237] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.502069] RIP: 0033:0x7fbfa6f6fb19 [ 2981.502639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.505200] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2981.505486] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=59730 comm=syz-executor.0 [ 2981.506277] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 2981.506288] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 2981.506304] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 2981.508733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=59730 comm=syz-executor.0 [ 2981.509703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.509711] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 2981.525128] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x700, 0x0) 05:33:03 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) 05:33:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 69) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 2981.612629] 9pnet_virtio: no channels available for device 05:33:03 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x5}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 2981.637063] FAULT_INJECTION: forcing a failure. [ 2981.637063] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.638709] CPU: 1 PID: 59752 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2981.639669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.640828] Call Trace: [ 2981.641199] dump_stack+0x107/0x167 [ 2981.641718] should_fail.cold+0x5/0xa [ 2981.642245] ? trace_hardirqs_on+0x5b/0x180 [ 2981.642867] ? __alloc_skb+0x6d/0x5b0 [ 2981.643400] should_failslab+0x5/0x20 [ 2981.643937] kmem_cache_alloc_node+0x55/0x330 [ 2981.644572] __alloc_skb+0x6d/0x5b0 [ 2981.645091] skb_segment+0x9d8/0x3aa0 [ 2981.645647] ? __lock_acquire+0xbb1/0x5b00 [ 2981.646264] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2981.646956] ? lock_acquire+0x197/0x470 [ 2981.647514] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.648248] __udp_gso_segment+0x11c6/0x1830 [ 2981.648877] ? __sk_receive_skb+0x830/0x830 [ 2981.649497] udp4_ufo_fragment+0x528/0x720 [ 2981.650090] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2981.650789] inet_gso_segment+0x4fb/0x11a0 [ 2981.651407] skb_mac_gso_segment+0x273/0x570 [ 2981.652028] ? inet_sock_destruct+0x840/0x840 [ 2981.652657] ? skb_network_protocol+0x650/0x650 [ 2981.653313] ? skb_crc32c_csum_help+0x80/0x80 [ 2981.653955] ? lock_acquire+0x197/0x470 [ 2981.654518] ? __dev_queue_xmit+0x1c6/0x2690 [ 2981.655131] __skb_gso_segment+0x32d/0x6d0 [ 2981.655722] ? mark_lock+0xf5/0x2df0 [ 2981.656245] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2981.656974] ? lock_chain_count+0x20/0x20 [ 2981.657578] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2981.658232] __dev_queue_xmit+0x825/0x2690 [ 2981.658831] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2981.659548] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2981.659839] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=59794 comm=syz-executor.0 [ 2981.660200] ? mark_held_locks+0x9e/0xe0 [ 2981.660223] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2981.662742] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=59794 comm=syz-executor.0 [ 2981.663265] neigh_connected_output+0x382/0x4d0 [ 2981.666599] ip_finish_output2+0x6f1/0x21f0 [ 2981.667204] ? nf_hook_slow+0xfc/0x1e0 [ 2981.667743] ? ip_frag_next+0x9e0/0x9e0 [ 2981.668290] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2981.668984] __ip_finish_output.part.0+0x5f3/0xb50 [ 2981.669675] ? ip_fragment.constprop.0+0x240/0x240 [ 2981.670370] ? netif_rx_ni+0xe7/0x300 [ 2981.670910] ip_mc_output+0x401/0xa30 [ 2981.671453] ip_send_skb+0xdd/0x260 [ 2981.671962] udp_send_skb+0x6da/0x11d0 [ 2981.672523] udp_sendmsg+0x139a/0x2160 [ 2981.673066] ? mark_lock+0xf5/0x2df0 [ 2981.673602] ? ip_frag_init+0x350/0x350 [ 2981.674159] ? lock_chain_count+0x20/0x20 [ 2981.674743] ? udp_setsockopt+0xc0/0xc0 [ 2981.675297] ? mark_lock+0xf5/0x2df0 [ 2981.675820] ? lock_acquire+0x197/0x470 [ 2981.676381] ? lock_chain_count+0x20/0x20 [ 2981.676953] ? mark_lock+0xf5/0x2df0 [ 2981.677485] ? mark_lock+0xf5/0x2df0 [ 2981.677999] ? lock_chain_count+0x20/0x20 [ 2981.678584] ? __lock_acquire+0xbb1/0x5b00 [ 2981.679177] ? lock_chain_count+0x20/0x20 [ 2981.679772] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.680519] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2981.681099] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.681712] ? mark_lock+0xf5/0x2df0 [ 2981.682136] ? lock_acquire+0x197/0x470 [ 2981.682588] ? find_held_lock+0x2c/0x110 [ 2981.683055] ? __might_fault+0xd3/0x180 [ 2981.683512] ? lock_downgrade+0x6d0/0x6d0 [ 2981.683984] ? lock_downgrade+0x6d0/0x6d0 [ 2981.684459] ? sock_has_perm+0x1ea/0x280 [ 2981.684918] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2981.685516] ? _copy_from_user+0xfb/0x1b0 [ 2981.685990] ? __import_iovec+0x458/0x590 [ 2981.686467] ? udp_v6_push_pending_frames+0x360/0x360 [ 2981.687060] inet6_sendmsg+0x105/0x140 [ 2981.687502] ? inet6_compat_ioctl+0x320/0x320 [ 2981.688009] __sock_sendmsg+0xf2/0x190 [ 2981.688454] ____sys_sendmsg+0x70d/0x870 [ 2981.688918] ? sock_write_iter+0x3d0/0x3d0 [ 2981.689398] ? do_recvmmsg+0x6d0/0x6d0 [ 2981.689849] ? lock_downgrade+0x6d0/0x6d0 [ 2981.690318] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.690912] ___sys_sendmsg+0xf3/0x170 [ 2981.691357] ? sendmsg_copy_msghdr+0x160/0x160 [ 2981.691872] ? __fget_files+0x2cf/0x520 [ 2981.692323] ? lock_downgrade+0x6d0/0x6d0 [ 2981.692786] ? find_held_lock+0x2c/0x110 [ 2981.693250] ? __fget_files+0x2f8/0x520 [ 2981.693715] ? __fget_light+0xea/0x290 [ 2981.694156] __sys_sendmsg+0xe5/0x1b0 [ 2981.694592] ? __sys_sendmsg_sock+0x40/0x40 [ 2981.695076] ? rcu_read_lock_any_held+0x75/0xa0 [ 2981.695615] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.696199] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.696781] ? trace_hardirqs_on+0x5b/0x180 [ 2981.697267] do_syscall_64+0x33/0x40 [ 2981.697699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.698283] RIP: 0033:0x7f3e899f4b19 [ 2981.698710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.700782] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2981.701659] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 2981.702462] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2981.703274] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2981.704078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.704880] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 2981.775126] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2981.794911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1020, 0x0) [ 2999.509825] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=59967 comm=syz-executor.0 [ 2999.511859] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=59967 comm=syz-executor.0 [ 2999.515845] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2999.522368] FAULT_INJECTION: forcing a failure. [ 2999.522368] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.523622] CPU: 1 PID: 59976 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2999.524364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2999.525259] Call Trace: [ 2999.525557] dump_stack+0x107/0x167 [ 2999.525976] should_fail.cold+0x5/0xa [ 2999.526589] ? trace_hardirqs_on+0x5b/0x180 [ 2999.527085] ? __alloc_skb+0x6d/0x5b0 [ 2999.527528] should_failslab+0x5/0x20 05:33:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x79a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:33:21 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:33:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 23) 05:33:21 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x7}]}]}, 0x24}}, 0x0) 05:33:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 70) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:21 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x6}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:33:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 2999.527966] kmem_cache_alloc_node+0x55/0x330 [ 2999.528588] __alloc_skb+0x6d/0x5b0 [ 2999.529011] skb_segment+0x9d8/0x3aa0 [ 2999.529453] ? __lock_acquire+0xbb1/0x5b00 [ 2999.529958] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2999.530556] ? lock_acquire+0x197/0x470 [ 2999.531017] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2999.531629] __udp_gso_segment+0x11c6/0x1830 [ 2999.532135] ? __sk_receive_skb+0x830/0x830 [ 2999.532614] udp4_ufo_fragment+0x528/0x720 [ 2999.533101] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2999.533675] inet_gso_segment+0x4fb/0x11a0 [ 2999.534180] skb_mac_gso_segment+0x273/0x570 [ 2999.534681] ? inet_sock_destruct+0x840/0x840 [ 2999.535195] ? skb_network_protocol+0x650/0x650 [ 2999.535727] ? skb_crc32c_csum_help+0x80/0x80 [ 2999.536240] ? lock_acquire+0x197/0x470 [ 2999.536694] ? __dev_queue_xmit+0x1c6/0x2690 [ 2999.537205] __skb_gso_segment+0x32d/0x6d0 [ 2999.537693] ? mark_lock+0xf5/0x2df0 [ 2999.538129] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2999.538730] ? lock_chain_count+0x20/0x20 [ 2999.539206] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2999.539728] __dev_queue_xmit+0x825/0x2690 [ 2999.540223] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2999.540810] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2999.541339] ? mark_held_locks+0x9e/0xe0 [ 2999.541806] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2999.542415] neigh_connected_output+0x382/0x4d0 [ 2999.542957] ip_finish_output2+0x6f1/0x21f0 [ 2999.543453] ? nf_hook_slow+0xfc/0x1e0 [ 2999.543901] ? ip_frag_next+0x9e0/0x9e0 [ 2999.544355] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2999.544931] __ip_finish_output.part.0+0x5f3/0xb50 [ 2999.545492] ? ip_fragment.constprop.0+0x240/0x240 [ 2999.546053] ? netif_rx_ni+0xe7/0x300 [ 2999.546508] ip_mc_output+0x401/0xa30 [ 2999.546947] ip_send_skb+0xdd/0x260 [ 2999.547351] udp_send_skb+0x6da/0x11d0 [ 2999.547806] udp_sendmsg+0x139a/0x2160 [ 2999.548250] ? mark_lock+0xf5/0x2df0 [ 2999.548679] ? ip_frag_init+0x350/0x350 [ 2999.549137] ? lock_chain_count+0x20/0x20 [ 2999.549593] ? udp_setsockopt+0xc0/0xc0 [ 2999.550048] ? mark_lock+0xf5/0x2df0 [ 2999.550462] ? lock_acquire+0x197/0x470 [ 2999.550898] ? lock_chain_count+0x20/0x20 [ 2999.551345] ? mark_lock+0xf5/0x2df0 [ 2999.551756] ? mark_lock+0xf5/0x2df0 [ 2999.552157] ? lock_chain_count+0x20/0x20 [ 2999.552636] ? __lock_acquire+0xbb1/0x5b00 [ 2999.553118] ? lock_chain_count+0x20/0x20 [ 2999.553575] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2999.554198] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2999.554675] ? udp_v6_push_pending_frames+0x360/0x360 [ 2999.555273] ? mark_lock+0xf5/0x2df0 [ 2999.555704] ? lock_acquire+0x197/0x470 [ 2999.556157] ? find_held_lock+0x2c/0x110 [ 2999.556629] ? __might_fault+0xd3/0x180 [ 2999.557085] ? lock_downgrade+0x6d0/0x6d0 [ 2999.557563] ? lock_downgrade+0x6d0/0x6d0 [ 2999.558037] ? sock_has_perm+0x1ea/0x280 [ 2999.558511] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2999.559078] ? _copy_from_user+0xfb/0x1b0 [ 2999.559559] ? __import_iovec+0x458/0x590 [ 2999.560010] ? udp_v6_push_pending_frames+0x360/0x360 [ 2999.560608] inet6_sendmsg+0x105/0x140 [ 2999.561035] ? inet6_compat_ioctl+0x320/0x320 [ 2999.561552] __sock_sendmsg+0xf2/0x190 [ 2999.561976] ____sys_sendmsg+0x70d/0x870 [ 2999.562454] ? sock_write_iter+0x3d0/0x3d0 [ 2999.562936] ? do_recvmmsg+0x6d0/0x6d0 [ 2999.563368] ? lock_downgrade+0x6d0/0x6d0 [ 2999.563821] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2999.564420] ___sys_sendmsg+0xf3/0x170 [ 2999.564869] ? sendmsg_copy_msghdr+0x160/0x160 [ 2999.565395] ? __fget_files+0x2cf/0x520 [ 2999.565852] ? lock_downgrade+0x6d0/0x6d0 [ 2999.566307] ? find_held_lock+0x2c/0x110 [ 2999.566782] ? __fget_files+0x2f8/0x520 [ 2999.567245] ? __fget_light+0xea/0x290 [ 2999.567693] __sys_sendmsg+0xe5/0x1b0 [ 2999.568127] ? __sys_sendmsg_sock+0x40/0x40 [ 2999.568621] ? rcu_read_lock_any_held+0x75/0xa0 [ 2999.569163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2999.569737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2999.570334] ? trace_hardirqs_on+0x5b/0x180 [ 2999.570801] do_syscall_64+0x33/0x40 [ 2999.571229] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2999.571824] RIP: 0033:0x7f3e899f4b19 [ 2999.572253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2999.574364] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2999.575238] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 2999.576064] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2999.576884] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2999.577696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2999.578525] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 2999.582691] FAULT_INJECTION: forcing a failure. [ 2999.582691] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.583997] CPU: 1 PID: 59978 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2999.584781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2999.585731] Call Trace: [ 2999.586040] dump_stack+0x107/0x167 [ 2999.586465] should_fail.cold+0x5/0xa [ 2999.586906] should_failslab+0x5/0x20 [ 2999.587345] __kmalloc_track_caller+0x79/0x370 [ 2999.587869] ? v9fs_session_init+0xe9/0x1680 [ 2999.588369] ? kernel_text_address+0xf2/0x120 [ 2999.588889] kstrdup+0x36/0x70 [ 2999.589258] v9fs_session_init+0xe9/0x1680 [ 2999.589741] ? lock_release+0x680/0x680 [ 2999.590200] ? find_held_lock+0x2c/0x110 [ 2999.590671] ? kmem_cache_alloc_trace+0x151/0x320 [ 2999.591219] ? v9fs_show_options+0x690/0x690 [ 2999.591727] ? trace_hardirqs_on+0x5b/0x180 [ 2999.592223] ? kasan_unpoison_shadow+0x33/0x50 [ 2999.592741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2999.593318] v9fs_mount+0x79/0x8f0 [ 2999.593724] ? v9fs_write_inode+0x60/0x60 [ 2999.594215] legacy_get_tree+0x105/0x220 [ 2999.594680] vfs_get_tree+0x8e/0x300 [ 2999.595103] path_mount+0x1429/0x2120 [ 2999.595547] ? strncpy_from_user+0x9e/0x470 [ 2999.596041] ? finish_automount+0xa90/0xa90 [ 2999.596535] ? getname_flags.part.0+0x1dd/0x4f0 [ 2999.597066] ? _copy_from_user+0xfb/0x1b0 [ 2999.597542] __x64_sys_mount+0x282/0x300 [ 2999.598008] ? copy_mnt_ns+0xa00/0xa00 [ 2999.598464] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2999.599064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2999.599654] do_syscall_64+0x33/0x40 [ 2999.600080] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2999.600668] RIP: 0033:0x7fbfa6f6fb19 [ 2999.601095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2999.603201] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2999.604067] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 2999.604885] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 2999.605697] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 2999.606518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2999.607331] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 2999.615062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 2999.628393] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=60095 comm=syz-executor.0 [ 2999.630042] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=60095 comm=syz-executor.0 05:33:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000, 0x0) 05:33:21 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x8}]}]}, 0x24}}, 0x0) [ 3017.526030] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:39 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:33:39 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x7}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:33:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2010, 0x0) 05:33:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 71) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:33:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 24) 05:33:39 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x9}]}]}, 0x24}}, 0x0) 05:33:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3017.548009] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3017.556881] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=60316 comm=syz-executor.0 [ 3017.557963] FAULT_INJECTION: forcing a failure. [ 3017.557963] name failslab, interval 1, probability 0, space 0, times 0 [ 3017.559799] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=60316 comm=syz-executor.0 [ 3017.562266] CPU: 1 PID: 60322 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3017.566438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3017.567489] FAULT_INJECTION: forcing a failure. [ 3017.567489] name failslab, interval 1, probability 0, space 0, times 0 [ 3017.568293] Call Trace: [ 3017.568323] dump_stack+0x107/0x167 [ 3017.568348] should_fail.cold+0x5/0xa [ 3017.573032] should_failslab+0x5/0x20 [ 3017.573898] __kmalloc_node_track_caller+0x74/0x3b0 [ 3017.575031] ? skb_segment+0x9d8/0x3aa0 [ 3017.575939] __alloc_skb+0xb1/0x5b0 [ 3017.576763] skb_segment+0x9d8/0x3aa0 [ 3017.577629] ? __lock_acquire+0xbb1/0x5b00 [ 3017.578626] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3017.579765] ? lock_acquire+0x197/0x470 [ 3017.580661] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3017.581855] __udp_gso_segment+0x11c6/0x1830 [ 3017.582862] ? __sk_receive_skb+0x830/0x830 [ 3017.583851] udp4_ufo_fragment+0x528/0x720 [ 3017.584812] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3017.585941] inet_gso_segment+0x4fb/0x11a0 [ 3017.586920] skb_mac_gso_segment+0x273/0x570 [ 3017.587914] ? inet_sock_destruct+0x840/0x840 [ 3017.588928] ? skb_network_protocol+0x650/0x650 [ 3017.589975] ? skb_crc32c_csum_help+0x80/0x80 [ 3017.590989] ? lock_acquire+0x197/0x470 [ 3017.591889] ? __dev_queue_xmit+0x1c6/0x2690 [ 3017.592884] __skb_gso_segment+0x32d/0x6d0 [ 3017.593838] ? mark_lock+0xf5/0x2df0 [ 3017.594682] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3017.595875] ? lock_chain_count+0x20/0x20 [ 3017.596808] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3017.597844] __dev_queue_xmit+0x825/0x2690 [ 3017.598818] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3017.599984] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3017.601022] ? mark_held_locks+0x9e/0xe0 [ 3017.601951] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3017.603146] neigh_connected_output+0x382/0x4d0 [ 3017.604213] ip_finish_output2+0x6f1/0x21f0 [ 3017.605184] ? nf_hook_slow+0xfc/0x1e0 [ 3017.606065] ? ip_frag_next+0x9e0/0x9e0 [ 3017.606968] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3017.608111] __ip_finish_output.part.0+0x5f3/0xb50 [ 3017.609220] ? ip_fragment.constprop.0+0x240/0x240 [ 3017.610329] ? netif_rx_ni+0xe7/0x300 [ 3017.611153] ip_mc_output+0x401/0xa30 [ 3017.611916] ip_send_skb+0xdd/0x260 [ 3017.612638] udp_send_skb+0x6da/0x11d0 [ 3017.613422] udp_sendmsg+0x139a/0x2160 [ 3017.614193] ? mark_lock+0xf5/0x2df0 [ 3017.614938] ? ip_frag_init+0x350/0x350 [ 3017.615735] ? lock_chain_count+0x20/0x20 [ 3017.616562] ? udp_setsockopt+0xc0/0xc0 [ 3017.617359] ? mark_lock+0xf5/0x2df0 [ 3017.618101] ? __lockdep_reset_lock+0x180/0x180 [ 3017.619030] ? lock_chain_count+0x20/0x20 [ 3017.619852] ? mark_lock+0xf5/0x2df0 [ 3017.620591] ? mark_lock+0xf5/0x2df0 [ 3017.621329] ? lock_chain_count+0x20/0x20 [ 3017.622146] ? __lock_acquire+0xbb1/0x5b00 [ 3017.622992] ? lock_chain_count+0x20/0x20 [ 3017.623827] ? perf_trace_lock+0xac/0x490 [ 3017.624653] ? __lockdep_reset_lock+0x180/0x180 [ 3017.625584] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3017.626410] ? udp_v6_push_pending_frames+0x360/0x360 [ 3017.627443] ? mark_lock+0xf5/0x2df0 [ 3017.628184] ? lock_acquire+0x197/0x470 [ 3017.628965] ? find_held_lock+0x2c/0x110 [ 3017.629788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3017.630833] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3017.631894] ? trace_hardirqs_on+0x5b/0x180 [ 3017.632747] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3017.633828] ? sock_has_perm+0x1ea/0x280 [ 3017.634629] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3017.635671] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 3017.636606] ? _copy_from_user+0xfb/0x1b0 [ 3017.637439] ? __import_iovec+0x458/0x590 [ 3017.638248] ? udp_v6_push_pending_frames+0x360/0x360 [ 3017.639286] inet6_sendmsg+0x105/0x140 [ 3017.640047] ? inet6_compat_ioctl+0x320/0x320 [ 3017.640935] __sock_sendmsg+0xf2/0x190 [ 3017.641695] ____sys_sendmsg+0x70d/0x870 [ 3017.642501] ? sock_write_iter+0x3d0/0x3d0 [ 3017.643341] ? do_recvmmsg+0x6d0/0x6d0 [ 3017.644118] ? lock_downgrade+0x6d0/0x6d0 [ 3017.644930] ? __lockdep_reset_lock+0x180/0x180 [ 3017.645861] ___sys_sendmsg+0xf3/0x170 [ 3017.646623] ? sendmsg_copy_msghdr+0x160/0x160 [ 3017.647544] ? __fget_files+0x2cf/0x520 [ 3017.648327] ? lock_downgrade+0x6d0/0x6d0 [ 3017.649149] ? find_held_lock+0x2c/0x110 [ 3017.649953] ? __fget_files+0x2f8/0x520 [ 3017.650749] ? __fget_light+0xea/0x290 [ 3017.651527] __sys_sendmsg+0xe5/0x1b0 [ 3017.652285] ? __sys_sendmsg_sock+0x40/0x40 [ 3017.653125] ? rcu_read_lock_any_held+0x75/0xa0 [ 3017.654068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3017.655121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3017.656125] ? trace_hardirqs_on+0x5b/0x180 [ 3017.656978] do_syscall_64+0x33/0x40 [ 3017.657709] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3017.658727] RIP: 0033:0x7f3e899f4b19 [ 3017.659483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3017.663113] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3017.664594] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3017.665999] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3017.667415] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3017.668824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3017.670232] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3017.671691] CPU: 0 PID: 60319 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3017.673298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3017.675197] Call Trace: [ 3017.675817] dump_stack+0x107/0x167 [ 3017.676653] should_fail.cold+0x5/0xa [ 3017.677515] ? create_object.isra.0+0x3a/0xa20 [ 3017.678544] should_failslab+0x5/0x20 [ 3017.679412] kmem_cache_alloc+0x5b/0x310 [ 3017.680349] create_object.isra.0+0x3a/0xa20 [ 3017.681340] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3017.682514] __kmalloc_track_caller+0x177/0x370 [ 3017.683592] ? v9fs_session_init+0xe9/0x1680 [ 3017.684608] kstrdup+0x36/0x70 [ 3017.685347] v9fs_session_init+0xe9/0x1680 [ 3017.686322] ? lock_release+0x680/0x680 [ 3017.687241] ? find_held_lock+0x2c/0x110 [ 3017.688179] ? kmem_cache_alloc_trace+0x151/0x320 [ 3017.689285] ? v9fs_show_options+0x690/0x690 [ 3017.690316] ? trace_hardirqs_on+0x5b/0x180 [ 3017.691442] ? kasan_unpoison_shadow+0x33/0x50 [ 3017.692722] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3017.694147] v9fs_mount+0x79/0x8f0 [ 3017.695165] ? v9fs_write_inode+0x60/0x60 [ 3017.696336] legacy_get_tree+0x105/0x220 [ 3017.697497] vfs_get_tree+0x8e/0x300 [ 3017.698552] path_mount+0x1429/0x2120 [ 3017.699660] ? strncpy_from_user+0x9e/0x470 [ 3017.700844] ? finish_automount+0xa90/0xa90 [ 3017.702002] ? getname_flags.part.0+0x1dd/0x4f0 [ 3017.703282] ? _copy_from_user+0xfb/0x1b0 [ 3017.704412] __x64_sys_mount+0x282/0x300 [ 3017.705526] ? copy_mnt_ns+0xa00/0xa00 [ 3017.706588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3017.708040] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3017.709424] do_syscall_64+0x33/0x40 [ 3017.710444] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3017.711837] RIP: 0033:0x7fbfa6f6fb19 [ 3017.712864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3017.717827] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3017.719758] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3017.721374] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3017.723015] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3017.724623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3017.726223] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:33:39 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf}]}]}, 0x24}}, 0x0) 05:33:39 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x9}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:33:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:33:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xedc0, 0x0) 05:33:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 72) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3017.945910] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=60539 comm=syz-executor.0 [ 3017.949489] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=60539 comm=syz-executor.0 [ 3017.966370] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3017.984305] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:33:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x89a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:33:40 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf0}]}]}, 0x24}}, 0x0) 05:33:40 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3018.069353] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3018.082175] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3018.139378] FAULT_INJECTION: forcing a failure. [ 3018.139378] name failslab, interval 1, probability 0, space 0, times 0 [ 3018.141991] CPU: 0 PID: 60546 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3018.143917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3018.145797] Call Trace: [ 3018.146546] dump_stack+0x107/0x167 [ 3018.147597] should_fail.cold+0x5/0xa [ 3018.148675] ? create_object.isra.0+0x3a/0xa20 [ 3018.149969] should_failslab+0x5/0x20 [ 3018.151042] kmem_cache_alloc+0x5b/0x310 [ 3018.152197] create_object.isra.0+0x3a/0xa20 [ 3018.153428] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3018.154872] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3018.156277] ? skb_segment+0x9d8/0x3aa0 [ 3018.157405] __alloc_skb+0xb1/0x5b0 [ 3018.158429] skb_segment+0x9d8/0x3aa0 [ 3018.159527] ? __lock_acquire+0xbb1/0x5b00 [ 3018.160762] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3018.162152] ? lock_acquire+0x197/0x470 [ 3018.163199] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3018.164675] __udp_gso_segment+0x11c6/0x1830 [ 3018.165896] ? __sk_receive_skb+0x830/0x830 [ 3018.167134] udp4_ufo_fragment+0x528/0x720 [ 3018.168338] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3018.169738] inet_gso_segment+0x4fb/0x11a0 [ 3018.170952] skb_mac_gso_segment+0x273/0x570 [ 3018.172201] ? inet_sock_destruct+0x840/0x840 [ 3018.173464] ? skb_network_protocol+0x650/0x650 [ 3018.174797] ? skb_crc32c_csum_help+0x80/0x80 [ 3018.176063] ? lock_acquire+0x197/0x470 [ 3018.177157] ? __dev_queue_xmit+0x1c6/0x2690 [ 3018.178410] __skb_gso_segment+0x32d/0x6d0 [ 3018.179610] ? mark_lock+0xf5/0x2df0 [ 3018.180673] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3018.182170] ? lock_chain_count+0x20/0x20 [ 3018.183357] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3018.184648] __dev_queue_xmit+0x825/0x2690 [ 3018.185849] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3018.187248] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3018.188306] ? mark_held_locks+0x9e/0xe0 [ 3018.189236] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3018.190408] neigh_connected_output+0x382/0x4d0 [ 3018.191473] ip_finish_output2+0x6f1/0x21f0 [ 3018.192433] ? nf_hook_slow+0xfc/0x1e0 [ 3018.193310] ? ip_frag_next+0x9e0/0x9e0 [ 3018.194197] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3018.195331] __ip_finish_output.part.0+0x5f3/0xb50 [ 3018.196429] ? ip_fragment.constprop.0+0x240/0x240 [ 3018.197519] ? netif_rx_ni+0xe7/0x300 [ 3018.198376] ip_mc_output+0x401/0xa30 [ 3018.199235] ip_send_skb+0xdd/0x260 [ 3018.200051] udp_send_skb+0x6da/0x11d0 [ 3018.200930] udp_sendmsg+0x139a/0x2160 [ 3018.201794] ? mark_lock+0xf5/0x2df0 [ 3018.202628] ? ip_frag_init+0x350/0x350 [ 3018.203522] ? lock_chain_count+0x20/0x20 [ 3018.204458] ? udp_setsockopt+0xc0/0xc0 [ 3018.205345] ? mark_lock+0xf5/0x2df0 [ 3018.206176] ? lock_acquire+0x197/0x470 [ 3018.207075] ? lock_chain_count+0x20/0x20 [ 3018.208000] ? mark_lock+0xf5/0x2df0 [ 3018.208834] ? mark_lock+0xf5/0x2df0 [ 3018.209663] ? lock_chain_count+0x20/0x20 [ 3018.210620] ? __lock_acquire+0xbb1/0x5b00 [ 3018.211604] ? lock_chain_count+0x20/0x20 [ 3018.212579] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3018.213808] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3018.214769] ? udp_v6_push_pending_frames+0x360/0x360 [ 3018.215983] ? mark_lock+0xf5/0x2df0 [ 3018.216854] ? lock_acquire+0x197/0x470 [ 3018.217770] ? find_held_lock+0x2c/0x110 [ 3018.218720] ? __might_fault+0xd3/0x180 [ 3018.219649] ? lock_downgrade+0x6d0/0x6d0 [ 3018.220613] ? lock_downgrade+0x6d0/0x6d0 [ 3018.221537] ? sock_has_perm+0x1ea/0x280 [ 3018.222477] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3018.223666] ? _copy_from_user+0xfb/0x1b0 [ 3018.224628] ? __import_iovec+0x458/0x590 [ 3018.225577] ? udp_v6_push_pending_frames+0x360/0x360 [ 3018.226756] inet6_sendmsg+0x105/0x140 [ 3018.227651] ? inet6_compat_ioctl+0x320/0x320 [ 3018.228675] __sock_sendmsg+0xf2/0x190 [ 3018.229564] ____sys_sendmsg+0x70d/0x870 [ 3018.230498] ? sock_write_iter+0x3d0/0x3d0 [ 3018.231470] ? do_recvmmsg+0x6d0/0x6d0 [ 3018.232370] ? lock_downgrade+0x6d0/0x6d0 [ 3018.233323] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3018.234527] ___sys_sendmsg+0xf3/0x170 [ 3018.235436] ? sendmsg_copy_msghdr+0x160/0x160 [ 3018.236496] ? __fget_files+0x2cf/0x520 [ 3018.237401] ? lock_downgrade+0x6d0/0x6d0 [ 3018.238346] ? find_held_lock+0x2c/0x110 [ 3018.239295] ? __fget_files+0x2f8/0x520 [ 3018.240210] ? __fget_light+0xea/0x290 [ 3018.241112] __sys_sendmsg+0xe5/0x1b0 [ 3018.241985] ? __sys_sendmsg_sock+0x40/0x40 [ 3018.242978] ? rcu_read_lock_any_held+0x75/0xa0 [ 3018.244061] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3018.245259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3018.246436] ? trace_hardirqs_on+0x5b/0x180 [ 3018.247436] do_syscall_64+0x33/0x40 [ 3018.248272] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3018.249441] RIP: 0033:0x7f3e899f4b19 [ 3018.250279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3018.254422] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3018.256126] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3018.257729] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3018.259336] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3018.260929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3018.262521] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:33:56 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x11e}]}]}, 0x24}}, 0x0) 05:33:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:33:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf000, 0x0) 05:33:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x9000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:33:56 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:33:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:33:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 25) 05:33:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0xf}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3034.260942] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=60775 comm=syz-executor.0 [ 3034.263349] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=60775 comm=syz-executor.0 [ 3034.285034] FAULT_INJECTION: forcing a failure. [ 3034.285034] name failslab, interval 1, probability 0, space 0, times 0 [ 3034.287153] CPU: 0 PID: 60781 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3034.288449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3034.289979] Call Trace: [ 3034.290470] dump_stack+0x107/0x167 [ 3034.291141] should_fail.cold+0x5/0xa [ 3034.291903] ? p9_client_create+0xaf/0x1230 [ 3034.292705] should_failslab+0x5/0x20 [ 3034.293404] kmem_cache_alloc_trace+0x55/0x320 [ 3034.294244] ? find_held_lock+0x2c/0x110 [ 3034.294993] p9_client_create+0xaf/0x1230 [ 3034.295760] ? lock_downgrade+0x6d0/0x6d0 [ 3034.296536] ? p9_client_flush+0x430/0x430 [ 3034.297317] ? trace_hardirqs_on+0x5b/0x180 [ 3034.298100] ? lockdep_init_map_type+0x2c7/0x780 [ 3034.298973] ? __raw_spin_lock_init+0x36/0x110 [ 3034.299844] v9fs_session_init+0x1dd/0x1680 [ 3034.300651] ? lock_release+0x680/0x680 [ 3034.301396] ? kmem_cache_alloc_trace+0x151/0x320 [ 3034.302290] ? v9fs_show_options+0x690/0x690 [ 3034.303108] ? trace_hardirqs_on+0x5b/0x180 [ 3034.303907] ? kasan_unpoison_shadow+0x33/0x50 [ 3034.304744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3034.305666] v9fs_mount+0x79/0x8f0 [ 3034.306320] ? v9fs_write_inode+0x60/0x60 [ 3034.307090] legacy_get_tree+0x105/0x220 [ 3034.307851] vfs_get_tree+0x8e/0x300 [ 3034.308539] path_mount+0x1429/0x2120 [ 3034.309246] ? strncpy_from_user+0x9e/0x470 [ 3034.310041] ? finish_automount+0xa90/0xa90 [ 3034.310822] ? getname_flags.part.0+0x1dd/0x4f0 [ 3034.311670] ? _copy_from_user+0xfb/0x1b0 [ 3034.312435] __x64_sys_mount+0x282/0x300 [ 3034.313170] ? copy_mnt_ns+0xa00/0xa00 [ 3034.313883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3034.314844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3034.315781] do_syscall_64+0x33/0x40 [ 3034.316464] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3034.317392] RIP: 0033:0x7fbfa6f6fb19 [ 3034.318069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3034.321382] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3034.322765] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3034.324070] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3034.325365] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3034.326666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3034.327964] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3034.350344] FAULT_INJECTION: forcing a failure. [ 3034.350344] name failslab, interval 1, probability 0, space 0, times 0 [ 3034.352375] CPU: 0 PID: 60786 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3034.353600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3034.355078] Call Trace: [ 3034.355563] dump_stack+0x107/0x167 [ 3034.356213] should_fail.cold+0x5/0xa [ 3034.356908] should_failslab+0x5/0x20 [ 3034.357591] __kmalloc_node_track_caller+0x74/0x3b0 [ 3034.358482] ? skb_segment+0x9d8/0x3aa0 [ 3034.359199] __alloc_skb+0xb1/0x5b0 [ 3034.359867] skb_segment+0x9d8/0x3aa0 [ 3034.360544] ? __lock_acquire+0xbb1/0x5b00 [ 3034.361324] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3034.362210] ? lock_acquire+0x197/0x470 [ 3034.362926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3034.363882] __udp_gso_segment+0x11c6/0x1830 [ 3034.364665] ? __sk_receive_skb+0x830/0x830 [ 3034.365436] udp4_ufo_fragment+0x528/0x720 [ 3034.366195] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3034.367080] inet_gso_segment+0x4fb/0x11a0 [ 3034.367841] skb_mac_gso_segment+0x273/0x570 [ 3034.368615] ? inet_sock_destruct+0x840/0x840 [ 3034.369403] ? skb_network_protocol+0x650/0x650 [ 3034.370214] ? skb_crc32c_csum_help+0x80/0x80 [ 3034.371001] ? lock_acquire+0x197/0x470 [ 3034.371712] ? __dev_queue_xmit+0x1c6/0x2690 [ 3034.372499] __skb_gso_segment+0x32d/0x6d0 [ 3034.373246] ? mark_lock+0xf5/0x2df0 [ 3034.373916] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3034.374837] ? lock_chain_count+0x20/0x20 [ 3034.375569] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3034.376380] __dev_queue_xmit+0x825/0x2690 [ 3034.377147] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3034.378061] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3034.378869] ? mark_held_locks+0x9e/0xe0 [ 3034.379593] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3034.380534] neigh_connected_output+0x382/0x4d0 [ 3034.381366] ip_finish_output2+0x6f1/0x21f0 [ 3034.382129] ? nf_hook_slow+0xfc/0x1e0 [ 3034.382816] ? ip_frag_next+0x9e0/0x9e0 [ 3034.383524] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3034.384410] __ip_finish_output.part.0+0x5f3/0xb50 [ 3034.385277] ? ip_fragment.constprop.0+0x240/0x240 [ 3034.386137] ? netif_rx_ni+0xe7/0x300 [ 3034.386806] ip_mc_output+0x401/0xa30 [ 3034.387479] ip_send_skb+0xdd/0x260 [ 3034.388120] udp_send_skb+0x6da/0x11d0 [ 3034.388814] udp_sendmsg+0x139a/0x2160 [ 3034.389496] ? mark_lock+0xf5/0x2df0 [ 3034.390149] ? ip_frag_init+0x350/0x350 [ 3034.390843] ? lock_chain_count+0x20/0x20 [ 3034.391576] ? lock_chain_count+0x20/0x20 [ 3034.392296] ? udp_setsockopt+0xc0/0xc0 [ 3034.392985] ? mark_lock+0xf5/0x2df0 [ 3034.393634] ? lock_acquire+0x197/0x470 [ 3034.394333] ? lock_chain_count+0x20/0x20 [ 3034.395063] ? mark_lock+0xf5/0x2df0 [ 3034.395719] ? mark_lock+0xf5/0x2df0 [ 3034.396378] ? lock_chain_count+0x20/0x20 [ 3034.397107] ? lock_chain_count+0x20/0x20 [ 3034.397841] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3034.398750] ? mark_lock+0xf5/0x2df0 [ 3034.399412] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3034.400130] ? udp_v6_push_pending_frames+0x360/0x360 [ 3034.401025] ? lock_downgrade+0x6d0/0x6d0 [ 3034.401750] ? mark_lock+0xf5/0x2df0 [ 3034.402401] ? lock_acquire+0x197/0x470 [ 3034.403080] ? find_held_lock+0x2c/0x110 [ 3034.403793] ? __might_fault+0xd3/0x180 [ 3034.404483] ? lock_downgrade+0x6d0/0x6d0 [ 3034.405208] ? lock_downgrade+0x6d0/0x6d0 [ 3034.405920] ? sock_has_perm+0x1ea/0x280 [ 3034.406207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3034.406621] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3034.406643] ? _copy_from_user+0xfb/0x1b0 [ 3034.406667] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3034.411000] ? trace_hardirqs_on+0x5b/0x180 [ 3034.411754] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3034.412691] ? udp_v6_push_pending_frames+0x360/0x360 [ 3034.413586] inet6_sendmsg+0x105/0x140 [ 3034.414257] ? inet6_compat_ioctl+0x320/0x320 [ 3034.414986] __sock_sendmsg+0xf2/0x190 [ 3034.415677] ____sys_sendmsg+0x70d/0x870 [ 3034.416380] ? sock_write_iter+0x3d0/0x3d0 [ 3034.417117] ? do_recvmmsg+0x6d0/0x6d0 [ 3034.417809] ___sys_sendmsg+0xf3/0x170 [ 3034.418477] ? sendmsg_copy_msghdr+0x160/0x160 [ 3034.419267] ? __fget_files+0x2cf/0x520 [ 3034.419945] ? lock_downgrade+0x6d0/0x6d0 [ 3034.420655] ? find_held_lock+0x2c/0x110 [ 3034.421352] ? __fget_files+0x2f8/0x520 [ 3034.422040] ? __fget_light+0xea/0x290 [ 3034.422705] __sys_sendmsg+0xe5/0x1b0 [ 3034.423369] ? __sys_sendmsg_sock+0x40/0x40 [ 3034.424104] ? ksys_write+0x19b/0x260 [ 3034.424760] ? ksys_write+0x203/0x260 [ 3034.425417] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3034.426311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3034.427189] ? trace_hardirqs_on+0x5b/0x180 [ 3034.427947] do_syscall_64+0x33/0x40 [ 3034.428582] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3034.429458] RIP: 0033:0x7f3e899f4b19 [ 3034.430088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3034.433232] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3034.434509] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3034.435729] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3034.436933] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3034.438140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3034.439354] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:33:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 26) 05:33:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x80000, 0x0) 05:33:56 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x300}]}]}, 0x24}}, 0x0) 05:33:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:33:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x99a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3034.595510] FAULT_INJECTION: forcing a failure. [ 3034.595510] name failslab, interval 1, probability 0, space 0, times 0 [ 3034.598160] CPU: 1 PID: 61004 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3034.599717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3034.601560] Call Trace: [ 3034.602165] dump_stack+0x107/0x167 [ 3034.602995] should_fail.cold+0x5/0xa [ 3034.603868] ? create_object.isra.0+0x3a/0xa20 [ 3034.604902] should_failslab+0x5/0x20 [ 3034.605757] kmem_cache_alloc+0x5b/0x310 [ 3034.606673] ? kernel_text_address+0xf2/0x120 [ 3034.607701] create_object.isra.0+0x3a/0xa20 [ 3034.608693] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3034.609868] kmem_cache_alloc_trace+0x151/0x320 [ 3034.611166] ? find_held_lock+0x2c/0x110 [ 3034.612135] p9_client_create+0xaf/0x1230 [ 3034.613276] ? lock_downgrade+0x6d0/0x6d0 [ 3034.614207] ? p9_client_flush+0x430/0x430 [ 3034.615379] ? trace_hardirqs_on+0x5b/0x180 [ 3034.616396] ? lockdep_init_map_type+0x2c7/0x780 [ 3034.617457] ? __raw_spin_lock_init+0x36/0x110 [ 3034.618696] v9fs_session_init+0x1dd/0x1680 [ 3034.619658] ? lock_release+0x680/0x680 [ 3034.620761] ? kmem_cache_alloc_trace+0x151/0x320 [ 3034.621816] ? v9fs_show_options+0x690/0x690 [ 3034.623039] ? trace_hardirqs_on+0x5b/0x180 [ 3034.624009] ? kasan_unpoison_shadow+0x33/0x50 [ 3034.625252] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3034.626361] v9fs_mount+0x79/0x8f0 [ 3034.627325] ? v9fs_write_inode+0x60/0x60 [ 3034.628277] legacy_get_tree+0x105/0x220 [ 3034.629287] vfs_get_tree+0x8e/0x300 [ 3034.630299] path_mount+0x1429/0x2120 [ 3034.631136] ? strncpy_from_user+0x9e/0x470 [ 3034.632318] ? finish_automount+0xa90/0xa90 [ 3034.633252] ? getname_flags.part.0+0x1dd/0x4f0 [ 3034.634523] ? _copy_from_user+0xfb/0x1b0 [ 3034.635444] __x64_sys_mount+0x282/0x300 [ 3034.636535] ? copy_mnt_ns+0xa00/0xa00 [ 3034.637488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3034.638904] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3034.640021] do_syscall_64+0x33/0x40 [ 3034.641031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3034.642128] RIP: 0033:0x7fbfa6f6fb19 [ 3034.643134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3034.647060] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3034.648692] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3034.650208] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3034.651758] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3034.653252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3034.654753] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3034.661872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3034.661919] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61204 comm=syz-executor.0 [ 3034.665745] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61204 comm=syz-executor.0 05:34:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 27) [ 3051.148578] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:34:13 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 74) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:34:13 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x500}]}]}, 0x24}}, 0x0) 05:34:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x48}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:34:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:34:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf0ffff, 0x0) 05:34:13 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3051.168819] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61232 comm=syz-executor.0 [ 3051.171939] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61232 comm=syz-executor.0 [ 3051.174710] FAULT_INJECTION: forcing a failure. [ 3051.174710] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.177693] CPU: 0 PID: 61228 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3051.179249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3051.181122] Call Trace: [ 3051.181732] dump_stack+0x107/0x167 [ 3051.182566] should_fail.cold+0x5/0xa [ 3051.183428] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3051.184625] ? create_object.isra.0+0x3a/0xa20 [ 3051.185904] should_failslab+0x5/0x20 [ 3051.186770] kmem_cache_alloc+0x5b/0x310 [ 3051.187915] ? mark_held_locks+0x9e/0xe0 [ 3051.188863] create_object.isra.0+0x3a/0xa20 [ 3051.190089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3051.191251] kmem_cache_alloc_node+0x169/0x330 [ 3051.192547] __alloc_skb+0x6d/0x5b0 [ 3051.193435] skb_segment+0x9d8/0x3aa0 [ 3051.194505] ? __lock_acquire+0xbb1/0x5b00 [ 3051.195510] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3051.196926] ? lock_acquire+0x197/0x470 [ 3051.197835] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.199333] __udp_gso_segment+0x11c6/0x1830 [ 3051.200393] ? __sk_receive_skb+0x830/0x830 [ 3051.201537] udp4_ufo_fragment+0x528/0x720 [ 3051.202497] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3051.203604] inet_gso_segment+0x4fb/0x11a0 [ 3051.204591] skb_mac_gso_segment+0x273/0x570 [ 3051.205558] ? inet_sock_destruct+0x840/0x840 [ 3051.206558] ? skb_network_protocol+0x650/0x650 [ 3051.207594] ? skb_crc32c_csum_help+0x80/0x80 [ 3051.208610] ? lock_acquire+0x197/0x470 [ 3051.209497] ? __dev_queue_xmit+0x1c6/0x2690 [ 3051.210488] __skb_gso_segment+0x32d/0x6d0 [ 3051.211433] ? mark_lock+0xf5/0x2df0 [ 3051.212287] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3051.213457] ? lock_chain_count+0x20/0x20 [ 3051.214381] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3051.215402] __dev_queue_xmit+0x825/0x2690 [ 3051.216360] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3051.217519] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3051.218551] ? mark_held_locks+0x9e/0xe0 [ 3051.219466] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3051.220653] neigh_connected_output+0x382/0x4d0 [ 3051.221708] ip_finish_output2+0x6f1/0x21f0 [ 3051.222674] ? nf_hook_slow+0xfc/0x1e0 [ 3051.223549] ? ip_frag_next+0x9e0/0x9e0 [ 3051.224452] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3051.225574] __ip_finish_output.part.0+0x5f3/0xb50 [ 3051.226688] ? ip_fragment.constprop.0+0x240/0x240 [ 3051.227783] ? netif_rx_ni+0xe7/0x300 [ 3051.228650] ip_mc_output+0x401/0xa30 [ 3051.229508] ip_send_skb+0xdd/0x260 [ 3051.230326] udp_send_skb+0x6da/0x11d0 [ 3051.231211] udp_sendmsg+0x139a/0x2160 [ 3051.232091] ? mark_lock+0xf5/0x2df0 [ 3051.232931] ? ip_frag_init+0x350/0x350 [ 3051.233824] ? lock_chain_count+0x20/0x20 [ 3051.234757] ? udp_setsockopt+0xc0/0xc0 [ 3051.235642] ? mark_lock+0xf5/0x2df0 [ 3051.236502] ? lock_acquire+0x197/0x470 [ 3051.237394] ? lock_chain_count+0x20/0x20 [ 3051.238319] ? mark_lock+0xf5/0x2df0 [ 3051.239153] ? mark_lock+0xf5/0x2df0 [ 3051.239997] ? lock_chain_count+0x20/0x20 [ 3051.240924] ? __lock_acquire+0xbb1/0x5b00 [ 3051.241871] ? lock_chain_count+0x20/0x20 [ 3051.242836] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.244033] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3051.244971] ? udp_v6_push_pending_frames+0x360/0x360 [ 3051.246131] ? mark_lock+0xf5/0x2df0 [ 3051.246996] ? lock_acquire+0x197/0x470 [ 3051.247893] ? find_held_lock+0x2c/0x110 [ 3051.248840] ? __might_fault+0xd3/0x180 [ 3051.249741] ? lock_downgrade+0x6d0/0x6d0 [ 3051.250678] ? lock_downgrade+0x6d0/0x6d0 [ 3051.251618] ? sock_has_perm+0x1ea/0x280 [ 3051.252547] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3051.253728] ? _copy_from_user+0xfb/0x1b0 [ 3051.254668] ? __import_iovec+0x458/0x590 [ 3051.255606] ? udp_v6_push_pending_frames+0x360/0x360 [ 3051.256799] inet6_sendmsg+0x105/0x140 [ 3051.257685] ? inet6_compat_ioctl+0x320/0x320 [ 3051.258700] __sock_sendmsg+0xf2/0x190 [ 3051.259590] ____sys_sendmsg+0x70d/0x870 [ 3051.260523] ? sock_write_iter+0x3d0/0x3d0 [ 3051.261479] ? do_recvmmsg+0x6d0/0x6d0 [ 3051.262375] ? lock_downgrade+0x6d0/0x6d0 [ 3051.263319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.264509] ___sys_sendmsg+0xf3/0x170 [ 3051.265396] ? sendmsg_copy_msghdr+0x160/0x160 [ 3051.266422] ? __fget_files+0x2cf/0x520 [ 3051.267416] ? lock_downgrade+0x6d0/0x6d0 [ 3051.268423] ? find_held_lock+0x2c/0x110 [ 3051.269431] ? __fget_files+0x2f8/0x520 [ 3051.270399] ? __fget_light+0xea/0x290 [ 3051.271369] __sys_sendmsg+0xe5/0x1b0 [ 3051.272305] ? __sys_sendmsg_sock+0x40/0x40 [ 3051.273368] ? rcu_read_lock_any_held+0x75/0xa0 [ 3051.274521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3051.275804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3051.277043] ? trace_hardirqs_on+0x5b/0x180 [ 3051.278111] do_syscall_64+0x33/0x40 [ 3051.279002] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3051.280249] RIP: 0033:0x7f3e899f4b19 [ 3051.281095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3051.285288] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3051.287029] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3051.288675] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3051.290288] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3051.291917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3051.293657] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3051.300514] FAULT_INJECTION: forcing a failure. [ 3051.300514] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.303280] CPU: 1 PID: 61236 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3051.304976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3051.306967] Call Trace: [ 3051.307616] dump_stack+0x107/0x167 [ 3051.308503] should_fail.cold+0x5/0xa [ 3051.309443] ? create_object.isra.0+0x3a/0xa20 [ 3051.310534] should_failslab+0x5/0x20 [ 3051.311467] kmem_cache_alloc+0x5b/0x310 [ 3051.312458] ? kernel_text_address+0xf2/0x120 [ 3051.313559] create_object.isra.0+0x3a/0xa20 [ 3051.314620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3051.315867] kmem_cache_alloc_trace+0x151/0x320 [ 3051.316981] ? find_held_lock+0x2c/0x110 [ 3051.317973] p9_client_create+0xaf/0x1230 [ 3051.318960] ? lock_downgrade+0x6d0/0x6d0 [ 3051.319994] ? p9_client_flush+0x430/0x430 [ 3051.321007] ? trace_hardirqs_on+0x5b/0x180 [ 3051.322056] ? lockdep_init_map_type+0x2c7/0x780 [ 3051.323184] ? __raw_spin_lock_init+0x36/0x110 [ 3051.324301] v9fs_session_init+0x1dd/0x1680 [ 3051.325329] ? lock_release+0x680/0x680 [ 3051.326298] ? kmem_cache_alloc_trace+0x151/0x320 [ 3051.327459] ? v9fs_show_options+0x690/0x690 [ 3051.328546] ? trace_hardirqs_on+0x5b/0x180 [ 3051.329587] ? kasan_unpoison_shadow+0x33/0x50 [ 3051.330690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3051.331899] v9fs_mount+0x79/0x8f0 [ 3051.332770] ? v9fs_write_inode+0x60/0x60 [ 3051.333755] legacy_get_tree+0x105/0x220 [ 3051.334738] vfs_get_tree+0x8e/0x300 [ 3051.335622] path_mount+0x1429/0x2120 [ 3051.336550] ? strncpy_from_user+0x9e/0x470 [ 3051.337574] ? finish_automount+0xa90/0xa90 [ 3051.338616] ? getname_flags.part.0+0x1dd/0x4f0 [ 3051.339702] ? _copy_from_user+0xfb/0x1b0 [ 3051.340713] __x64_sys_mount+0x282/0x300 [ 3051.341656] ? copy_mnt_ns+0xa00/0xa00 [ 3051.342589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3051.343825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3051.345053] do_syscall_64+0x33/0x40 [ 3051.345930] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3051.347153] RIP: 0033:0x7fbfa6f6fb19 [ 3051.348044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3051.352405] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3051.354205] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3051.355897] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3051.357604] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3051.359306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3051.360989] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:34:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1000000, 0x0) 05:34:13 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x600}]}]}, 0x24}}, 0x0) 05:34:13 executing program 0: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x4c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3051.602966] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61390 comm=syz-executor.0 [ 3051.608001] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61390 comm=syz-executor.0 [ 3051.626894] 9pnet_virtio: no channels available for device 05:34:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 75) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:34:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 28) [ 3051.724760] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:34:13 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x700}]}]}, 0x24}}, 0x0) [ 3051.756225] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3051.763241] FAULT_INJECTION: forcing a failure. [ 3051.763241] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.766066] CPU: 0 PID: 61526 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3051.767744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3051.769763] Call Trace: [ 3051.770407] dump_stack+0x107/0x167 [ 3051.771293] should_fail.cold+0x5/0xa [ 3051.772244] ? create_object.isra.0+0x3a/0xa20 [ 3051.773359] should_failslab+0x5/0x20 [ 3051.774288] kmem_cache_alloc+0x5b/0x310 [ 3051.775279] ? lock_downgrade+0x6d0/0x6d0 [ 3051.776303] create_object.isra.0+0x3a/0xa20 [ 3051.777372] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3051.778608] __kmalloc_track_caller+0x177/0x370 [ 3051.779741] ? p9_client_create+0x41d/0x1230 [ 3051.780835] kstrdup+0x36/0x70 [ 3051.781620] p9_client_create+0x41d/0x1230 [ 3051.782650] ? lock_downgrade+0x6d0/0x6d0 [ 3051.783667] ? p9_client_flush+0x430/0x430 [ 3051.784722] ? trace_hardirqs_on+0x5b/0x180 [ 3051.785775] ? lockdep_init_map_type+0x2c7/0x780 [ 3051.786930] ? __raw_spin_lock_init+0x36/0x110 [ 3051.788060] v9fs_session_init+0x1dd/0x1680 [ 3051.789113] ? lock_release+0x680/0x680 [ 3051.790096] ? kmem_cache_alloc_trace+0x151/0x320 [ 3051.791266] ? v9fs_show_options+0x690/0x690 [ 3051.792354] ? trace_hardirqs_on+0x5b/0x180 [ 3051.793404] ? kasan_unpoison_shadow+0x33/0x50 [ 3051.794513] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3051.795738] v9fs_mount+0x79/0x8f0 [ 3051.796609] ? v9fs_write_inode+0x60/0x60 [ 3051.797605] legacy_get_tree+0x105/0x220 [ 3051.798570] vfs_get_tree+0x8e/0x300 [ 3051.799450] path_mount+0x1429/0x2120 [ 3051.800371] ? strncpy_from_user+0x9e/0x470 [ 3051.801353] ? finish_automount+0xa90/0xa90 [ 3051.802332] ? getname_flags.part.0+0x1dd/0x4f0 [ 3051.803373] ? _copy_from_user+0xfb/0x1b0 [ 3051.804328] __x64_sys_mount+0x282/0x300 [ 3051.805229] ? copy_mnt_ns+0xa00/0xa00 [ 3051.806118] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3051.807287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3051.808462] do_syscall_64+0x33/0x40 [ 3051.809308] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3051.810459] RIP: 0033:0x7fbfa6f6fb19 [ 3051.811462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3051.815888] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3051.817884] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3051.819526] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3051.821154] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3051.822785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3051.824365] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3051.829734] FAULT_INJECTION: forcing a failure. [ 3051.829734] name failslab, interval 1, probability 0, space 0, times 0 [ 3051.832288] CPU: 1 PID: 61537 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3051.833753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3051.835626] Call Trace: [ 3051.836191] dump_stack+0x107/0x167 [ 3051.837031] should_fail.cold+0x5/0xa [ 3051.837932] should_failslab+0x5/0x20 [ 3051.838815] __kmalloc_node_track_caller+0x74/0x3b0 [ 3051.839895] ? skb_segment+0x9d8/0x3aa0 [ 3051.840879] __alloc_skb+0xb1/0x5b0 [ 3051.841685] skb_segment+0x9d8/0x3aa0 [ 3051.842525] ? __lock_acquire+0xbb1/0x5b00 [ 3051.843444] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3051.844559] ? lock_acquire+0x197/0x470 [ 3051.845478] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.846615] __udp_gso_segment+0x11c6/0x1830 [ 3051.847632] ? __sk_receive_skb+0x830/0x830 [ 3051.848638] udp4_ufo_fragment+0x528/0x720 [ 3051.849558] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3051.850648] inet_gso_segment+0x4fb/0x11a0 [ 3051.851642] skb_mac_gso_segment+0x273/0x570 [ 3051.852561] ? inet_sock_destruct+0x840/0x840 [ 3051.853544] ? skb_network_protocol+0x650/0x650 [ 3051.854532] ? skb_crc32c_csum_help+0x80/0x80 [ 3051.855504] ? lock_acquire+0x197/0x470 [ 3051.856355] ? __dev_queue_xmit+0x1c6/0x2690 [ 3051.857355] __skb_gso_segment+0x32d/0x6d0 [ 3051.858225] ? mark_lock+0xf5/0x2df0 [ 3051.859016] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3051.860113] ? lock_chain_count+0x20/0x20 [ 3051.860980] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3051.861949] __dev_queue_xmit+0x825/0x2690 [ 3051.862849] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3051.863918] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3051.864898] ? mark_held_locks+0x9e/0xe0 [ 3051.865743] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3051.866857] neigh_connected_output+0x382/0x4d0 [ 3051.867839] ip_finish_output2+0x6f1/0x21f0 [ 3051.868764] ? nf_hook_slow+0xfc/0x1e0 [ 3051.869582] ? ip_frag_next+0x9e0/0x9e0 [ 3051.870388] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3051.871470] __ip_finish_output.part.0+0x5f3/0xb50 [ 3051.872539] ? ip_fragment.constprop.0+0x240/0x240 [ 3051.873559] ? netif_rx_ni+0xe7/0x300 [ 3051.874474] ip_mc_output+0x401/0xa30 [ 3051.875271] ip_send_skb+0xdd/0x260 [ 3051.876057] udp_send_skb+0x6da/0x11d0 [ 3051.876876] udp_sendmsg+0x139a/0x2160 [ 3051.877694] ? mark_lock+0xf5/0x2df0 [ 3051.878463] ? ip_frag_init+0x350/0x350 [ 3051.879273] ? lock_chain_count+0x20/0x20 [ 3051.880157] ? udp_setsockopt+0xc0/0xc0 [ 3051.880971] ? mark_lock+0xf5/0x2df0 [ 3051.881730] ? lock_acquire+0x197/0x470 [ 3051.882556] ? lock_chain_count+0x20/0x20 [ 3051.883401] ? mark_lock+0xf5/0x2df0 [ 3051.884192] ? mark_lock+0xf5/0x2df0 [ 3051.884958] ? lock_chain_count+0x20/0x20 [ 3051.885810] ? __lock_acquire+0xbb1/0x5b00 [ 3051.886680] ? lock_chain_count+0x20/0x20 [ 3051.887541] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.888641] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3051.889481] ? udp_v6_push_pending_frames+0x360/0x360 [ 3051.890526] ? mark_lock+0xf5/0x2df0 [ 3051.891274] ? lock_acquire+0x197/0x470 [ 3051.892095] ? find_held_lock+0x2c/0x110 [ 3051.892952] ? __might_fault+0xd3/0x180 [ 3051.893766] ? lock_downgrade+0x6d0/0x6d0 [ 3051.894609] ? lock_downgrade+0x6d0/0x6d0 [ 3051.895453] ? sock_has_perm+0x1ea/0x280 [ 3051.896287] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3051.897341] ? _copy_from_user+0xfb/0x1b0 [ 3051.898201] ? __import_iovec+0x458/0x590 [ 3051.899044] ? udp_v6_push_pending_frames+0x360/0x360 [ 3051.900107] inet6_sendmsg+0x105/0x140 [ 3051.900940] ? inet6_compat_ioctl+0x320/0x320 [ 3051.901933] __sock_sendmsg+0xf2/0x190 [ 3051.902814] ____sys_sendmsg+0x70d/0x870 [ 3051.903718] ? sock_write_iter+0x3d0/0x3d0 [ 3051.904772] ? do_recvmmsg+0x6d0/0x6d0 [ 3051.905799] ? lock_downgrade+0x6d0/0x6d0 [ 3051.906854] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3051.908150] ___sys_sendmsg+0xf3/0x170 [ 3051.909131] ? sendmsg_copy_msghdr+0x160/0x160 [ 3051.910195] ? __fget_files+0x2cf/0x520 [ 3051.911116] ? lock_downgrade+0x6d0/0x6d0 [ 3051.912077] ? find_held_lock+0x2c/0x110 [ 3051.913076] ? __fget_files+0x2f8/0x520 [ 3051.913973] ? __fget_light+0xea/0x290 [ 3051.914859] __sys_sendmsg+0xe5/0x1b0 [ 3051.915703] ? __sys_sendmsg_sock+0x40/0x40 [ 3051.916669] ? rcu_read_lock_any_held+0x75/0xa0 [ 3051.917734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3051.918900] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3051.920067] ? trace_hardirqs_on+0x5b/0x180 [ 3051.921021] do_syscall_64+0x33/0x40 [ 3051.921843] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3051.922975] RIP: 0033:0x7f3e899f4b19 [ 3051.923800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3051.927812] RSP: 002b:00007f3e86f49188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3051.929479] RAX: ffffffffffffffda RBX: 00007f3e89b08020 RCX: 00007f3e899f4b19 [ 3051.931027] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004 [ 3051.932599] RBP: 00007f3e86f491d0 R08: 0000000000000000 R09: 0000000000000000 [ 3051.934224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3051.935908] R13: 00007ffd2f4423ff R14: 00007f3e86f49300 R15: 0000000000022000 05:34:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:34:13 executing program 0: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:13 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:34:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000000, 0x0) [ 3052.021730] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61578 comm=syz-executor.0 [ 3052.024706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61578 comm=syz-executor.0 [ 3052.072676] 9pnet_virtio: no channels available for device 05:34:14 executing program 0: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3052.167140] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61757 comm=syz-executor.0 [ 3052.169706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61757 comm=syz-executor.0 05:34:14 executing program 0: stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x3000000, 0x0) [ 3052.319807] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=61788 comm=syz-executor.0 [ 3052.322960] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=61788 comm=syz-executor.0 [ 3052.351215] 9pnet_virtio: no channels available for device 05:34:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x4000000, 0x0) 05:34:29 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x900}]}]}, 0x24}}, 0x0) [ 3067.554743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:34:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:34:29 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:34:29 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x68}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:34:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 29) 05:34:29 executing program 0: stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 76) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3067.572103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3067.589101] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=62017 comm=syz-executor.0 [ 3067.589656] 9pnet_virtio: no channels available for device [ 3067.590871] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=62017 comm=syz-executor.0 [ 3067.619788] FAULT_INJECTION: forcing a failure. [ 3067.619788] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.622706] CPU: 1 PID: 62023 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3067.624366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3067.626475] Call Trace: [ 3067.627180] dump_stack+0x107/0x167 [ 3067.628051] should_fail.cold+0x5/0xa [ 3067.628936] should_failslab+0x5/0x20 [ 3067.629797] __kmalloc_track_caller+0x79/0x370 [ 3067.631019] ? p9_client_create+0x51e/0x1230 [ 3067.632216] kmemdup_nul+0x2d/0xa0 [ 3067.633175] p9_client_create+0x51e/0x1230 [ 3067.634145] ? p9_client_flush+0x430/0x430 [ 3067.635094] ? trace_hardirqs_on+0x5b/0x180 [ 3067.636180] ? lockdep_init_map_type+0x2c7/0x780 [ 3067.637473] ? __raw_spin_lock_init+0x36/0x110 [ 3067.638720] v9fs_session_init+0x1dd/0x1680 [ 3067.639897] ? lock_release+0x680/0x680 [ 3067.641001] ? kmem_cache_alloc_trace+0x151/0x320 [ 3067.642303] ? v9fs_show_options+0x690/0x690 [ 3067.643508] ? trace_hardirqs_on+0x5b/0x180 [ 3067.644690] ? kasan_unpoison_shadow+0x33/0x50 [ 3067.645924] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3067.647296] v9fs_mount+0x79/0x8f0 [ 3067.648260] ? v9fs_write_inode+0x60/0x60 [ 3067.649404] legacy_get_tree+0x105/0x220 [ 3067.650509] vfs_get_tree+0x8e/0x300 [ 3067.651517] path_mount+0x1429/0x2120 [ 3067.652570] ? strncpy_from_user+0x9e/0x470 [ 3067.653740] ? finish_automount+0xa90/0xa90 [ 3067.654906] ? getname_flags.part.0+0x1dd/0x4f0 [ 3067.656173] ? _copy_from_user+0xfb/0x1b0 [ 3067.657325] __x64_sys_mount+0x282/0x300 [ 3067.658427] ? copy_mnt_ns+0xa00/0xa00 [ 3067.659488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3067.660918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3067.662326] do_syscall_64+0x33/0x40 [ 3067.663338] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3067.664747] RIP: 0033:0x7fbfa6f6fb19 [ 3067.665763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3067.670741] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3067.672815] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3067.674757] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3067.676699] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3067.678628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3067.680572] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:34:29 executing program 0: stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:29 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x6c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3067.702329] FAULT_INJECTION: forcing a failure. [ 3067.702329] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.703933] CPU: 0 PID: 62028 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3067.704910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3067.706063] Call Trace: [ 3067.706438] dump_stack+0x107/0x167 [ 3067.706954] should_fail.cold+0x5/0xa [ 3067.707633] should_failslab+0x5/0x20 [ 3067.708183] __kmalloc_node_track_caller+0x74/0x3b0 [ 3067.708909] ? skb_segment+0x9d8/0x3aa0 [ 3067.709485] __alloc_skb+0xb1/0x5b0 [ 3067.710009] skb_segment+0x9d8/0x3aa0 [ 3067.710555] ? __lock_acquire+0xbb1/0x5b00 [ 3067.711183] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3067.711895] ? lock_acquire+0x197/0x470 [ 3067.712464] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3067.713286] __udp_gso_segment+0x11c6/0x1830 [ 3067.713947] ? __sk_receive_skb+0x830/0x830 [ 3067.714599] udp4_ufo_fragment+0x528/0x720 [ 3067.715238] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3067.715986] inet_gso_segment+0x4fb/0x11a0 [ 3067.716645] skb_mac_gso_segment+0x273/0x570 [ 3067.717307] ? inet_sock_destruct+0x840/0x840 [ 3067.717964] ? skb_network_protocol+0x650/0x650 [ 3067.718637] ? skb_crc32c_csum_help+0x80/0x80 [ 3067.719286] ? lock_acquire+0x197/0x470 [ 3067.719856] ? __dev_queue_xmit+0x1c6/0x2690 [ 3067.720494] __skb_gso_segment+0x32d/0x6d0 [ 3067.721111] ? mark_lock+0xf5/0x2df0 [ 3067.721652] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3067.722401] ? lock_chain_count+0x20/0x20 [ 3067.722997] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3067.723650] __dev_queue_xmit+0x825/0x2690 [ 3067.724259] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3067.725008] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3067.725672] ? mark_held_locks+0x9e/0xe0 [ 3067.726256] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3067.727011] neigh_connected_output+0x382/0x4d0 [ 3067.727691] ip_finish_output2+0x6f1/0x21f0 [ 3067.728321] ? nf_hook_slow+0xfc/0x1e0 [ 3067.728897] ? ip_frag_next+0x9e0/0x9e0 [ 3067.729465] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3067.730183] __ip_finish_output.part.0+0x5f3/0xb50 [ 3067.730887] ? ip_fragment.constprop.0+0x240/0x240 [ 3067.731592] ? netif_rx_ni+0xe7/0x300 [ 3067.732142] ip_mc_output+0x401/0xa30 [ 3067.732700] ip_send_skb+0xdd/0x260 [ 3067.733223] udp_send_skb+0x6da/0x11d0 [ 3067.733789] udp_sendmsg+0x139a/0x2160 [ 3067.734343] ? mark_lock+0xf5/0x2df0 [ 3067.734877] ? ip_frag_init+0x350/0x350 [ 3067.735447] ? lock_chain_count+0x20/0x20 [ 3067.736040] ? udp_setsockopt+0xc0/0xc0 [ 3067.736613] ? mark_lock+0xf5/0x2df0 [ 3067.737144] ? mark_held_locks+0x9e/0xe0 [ 3067.737725] ? lock_acquire+0x197/0x470 [ 3067.738305] ? lock_chain_count+0x20/0x20 [ 3067.738956] ? mark_lock+0xf5/0x2df0 [ 3067.739618] ? mark_lock+0xf5/0x2df0 [ 3067.740257] ? lock_chain_count+0x20/0x20 [ 3067.740989] ? __lock_acquire+0xbb1/0x5b00 [ 3067.741832] ? lock_chain_count+0x20/0x20 [ 3067.742562] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3067.743467] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3067.744189] ? udp_v6_push_pending_frames+0x360/0x360 [ 3067.745071] ? mark_lock+0xf5/0x2df0 [ 3067.745729] ? lock_acquire+0x197/0x470 [ 3067.746419] ? find_held_lock+0x2c/0x110 [ 3067.747132] ? __might_fault+0xd3/0x180 [ 3067.747784] ? lock_downgrade+0x6d0/0x6d0 [ 3067.748482] ? lock_downgrade+0x6d0/0x6d0 [ 3067.749211] ? sock_has_perm+0x1ea/0x280 [ 3067.749910] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3067.750801] ? _copy_from_user+0xfb/0x1b0 [ 3067.751507] ? __import_iovec+0x458/0x590 [ 3067.752193] ? udp_v6_push_pending_frames+0x360/0x360 [ 3067.753042] inet6_sendmsg+0x105/0x140 [ 3067.753670] ? inet6_compat_ioctl+0x320/0x320 [ 3067.754402] __sock_sendmsg+0xf2/0x190 [ 3067.755036] ____sys_sendmsg+0x70d/0x870 [ 3067.755712] ? sock_write_iter+0x3d0/0x3d0 [ 3067.756410] ? do_recvmmsg+0x6d0/0x6d0 [ 3067.757075] ? lock_downgrade+0x6d0/0x6d0 [ 3067.757733] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3067.758477] ___sys_sendmsg+0xf3/0x170 [ 3067.759092] ? sendmsg_copy_msghdr+0x160/0x160 [ 3067.759742] ? __fget_files+0x2cf/0x520 [ 3067.760312] ? lock_downgrade+0x6d0/0x6d0 [ 3067.760914] ? find_held_lock+0x2c/0x110 [ 3067.761491] ? __fget_files+0x2f8/0x520 [ 3067.762058] ? __fget_light+0xea/0x290 [ 3067.762624] __sys_sendmsg+0xe5/0x1b0 [ 3067.763162] ? __sys_sendmsg_sock+0x40/0x40 [ 3067.763771] ? rcu_read_lock_any_held+0x75/0xa0 [ 3067.764433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3067.765185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3067.765916] ? trace_hardirqs_on+0x5b/0x180 [ 3067.766665] do_syscall_64+0x33/0x40 [ 3067.767270] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3067.768153] RIP: 0033:0x7f3e899f4b19 [ 3067.768807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3067.771955] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3067.773279] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3067.774467] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3067.775625] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3067.776842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3067.778081] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3067.857721] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=62182 comm=syz-executor.0 [ 3067.860058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3067.860726] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=62182 comm=syz-executor.0 05:34:29 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x5000000, 0x0) 05:34:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xc9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3067.977871] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=62234 comm=syz-executor.0 [ 3067.980776] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=62234 comm=syz-executor.0 [ 3068.011346] 9pnet_virtio: no channels available for device [ 3068.030523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:34:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x6000000, 0x0) 05:34:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 77) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:34:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xd9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:34:48 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:34:48 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xd, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:34:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 30) 05:34:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x74}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:34:48 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xec0}]}]}, 0x24}}, 0x0) [ 3086.345564] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3086.346311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=62468 comm=syz-executor.0 [ 3086.350309] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=62468 comm=syz-executor.0 [ 3086.354266] 9pnet_virtio: no channels available for device [ 3086.360791] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3086.365997] FAULT_INJECTION: forcing a failure. [ 3086.365997] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.368315] CPU: 0 PID: 62475 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3086.369740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.371434] Call Trace: [ 3086.371981] dump_stack+0x107/0x167 [ 3086.372727] should_fail.cold+0x5/0xa [ 3086.373516] ? create_object.isra.0+0x3a/0xa20 [ 3086.374456] should_failslab+0x5/0x20 [ 3086.375235] kmem_cache_alloc+0x5b/0x310 [ 3086.376069] create_object.isra.0+0x3a/0xa20 [ 3086.376964] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3086.378014] __kmalloc_track_caller+0x177/0x370 [ 3086.378226] FAULT_INJECTION: forcing a failure. [ 3086.378226] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.378964] ? p9_client_create+0x51e/0x1230 [ 3086.378993] kmemdup_nul+0x2d/0xa0 [ 3086.379022] p9_client_create+0x51e/0x1230 [ 3086.383986] ? p9_client_flush+0x430/0x430 [ 3086.384857] ? trace_hardirqs_on+0x5b/0x180 [ 3086.385747] ? lockdep_init_map_type+0x2c7/0x780 [ 3086.386714] ? __raw_spin_lock_init+0x36/0x110 [ 3086.387655] v9fs_session_init+0x1dd/0x1680 [ 3086.388535] ? lock_release+0x680/0x680 [ 3086.389364] ? kmem_cache_alloc_trace+0x151/0x320 [ 3086.390347] ? v9fs_show_options+0x690/0x690 [ 3086.391254] ? trace_hardirqs_on+0x5b/0x180 [ 3086.392137] ? kasan_unpoison_shadow+0x33/0x50 [ 3086.393074] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3086.394116] v9fs_mount+0x79/0x8f0 [ 3086.394844] ? v9fs_write_inode+0x60/0x60 [ 3086.395696] legacy_get_tree+0x105/0x220 [ 3086.396530] vfs_get_tree+0x8e/0x300 [ 3086.397299] path_mount+0x1429/0x2120 [ 3086.398085] ? strncpy_from_user+0x9e/0x470 [ 3086.398975] ? finish_automount+0xa90/0xa90 [ 3086.399860] ? getname_flags.part.0+0x1dd/0x4f0 [ 3086.400811] ? _copy_from_user+0xfb/0x1b0 [ 3086.401674] __x64_sys_mount+0x282/0x300 [ 3086.402502] ? copy_mnt_ns+0xa00/0xa00 [ 3086.403301] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3086.404374] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3086.405447] do_syscall_64+0x33/0x40 [ 3086.406210] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3086.407258] RIP: 0033:0x7fbfa6f6fb19 [ 3086.408023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.411790] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3086.413347] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3086.414809] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3086.416263] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3086.417722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.419183] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3086.420680] CPU: 1 PID: 62465 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3086.422329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.424240] Call Trace: [ 3086.424858] dump_stack+0x107/0x167 [ 3086.425712] should_fail.cold+0x5/0xa [ 3086.426594] ? trace_hardirqs_on+0x5b/0x180 [ 3086.427591] ? __alloc_skb+0x6d/0x5b0 [ 3086.428476] should_failslab+0x5/0x20 [ 3086.429367] kmem_cache_alloc_node+0x55/0x330 [ 3086.430408] __alloc_skb+0x6d/0x5b0 [ 3086.431259] skb_segment+0x9d8/0x3aa0 [ 3086.432143] ? __lock_acquire+0xbb1/0x5b00 [ 3086.433176] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3086.434330] ? lock_acquire+0x197/0x470 [ 3086.435252] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3086.436478] __udp_gso_segment+0x11c6/0x1830 [ 3086.437499] ? __sk_receive_skb+0x830/0x830 [ 3086.438512] udp4_ufo_fragment+0x528/0x720 [ 3086.439497] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3086.440647] inet_gso_segment+0x4fb/0x11a0 [ 3086.441652] skb_mac_gso_segment+0x273/0x570 [ 3086.442673] ? inet_sock_destruct+0x840/0x840 [ 3086.443706] ? skb_network_protocol+0x650/0x650 [ 3086.444767] ? skb_crc32c_csum_help+0x80/0x80 [ 3086.445811] ? lock_acquire+0x197/0x470 [ 3086.446726] ? __dev_queue_xmit+0x1c6/0x2690 [ 3086.447749] __skb_gso_segment+0x32d/0x6d0 [ 3086.448720] ? mark_lock+0xf5/0x2df0 [ 3086.449595] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3086.450795] ? lock_chain_count+0x20/0x20 [ 3086.451759] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3086.452809] __dev_queue_xmit+0x825/0x2690 [ 3086.453811] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3086.454997] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3086.456070] ? mark_held_locks+0x9e/0xe0 [ 3086.457005] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3086.458240] neigh_connected_output+0x382/0x4d0 [ 3086.459332] ip_finish_output2+0x6f1/0x21f0 [ 3086.460334] ? nf_hook_slow+0xfc/0x1e0 [ 3086.461236] ? ip_frag_next+0x9e0/0x9e0 [ 3086.462170] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3086.463330] __ip_finish_output.part.0+0x5f3/0xb50 [ 3086.464473] ? ip_fragment.constprop.0+0x240/0x240 [ 3086.465607] ? netif_rx_ni+0xe7/0x300 [ 3086.466503] ip_mc_output+0x401/0xa30 [ 3086.467387] ip_send_skb+0xdd/0x260 [ 3086.468238] udp_send_skb+0x6da/0x11d0 [ 3086.469161] udp_sendmsg+0x139a/0x2160 [ 3086.470059] ? mark_lock+0xf5/0x2df0 [ 3086.470927] ? ip_frag_init+0x350/0x350 [ 3086.471848] ? lock_chain_count+0x20/0x20 [ 3086.472806] ? udp_setsockopt+0xc0/0xc0 [ 3086.473732] ? mark_lock+0xf5/0x2df0 [ 3086.474601] ? __lockdep_reset_lock+0x180/0x180 [ 3086.475678] ? lock_chain_count+0x20/0x20 [ 3086.476642] ? mark_lock+0xf5/0x2df0 [ 3086.477521] ? mark_lock+0xf5/0x2df0 [ 3086.478386] ? lock_chain_count+0x20/0x20 [ 3086.479344] ? __lock_acquire+0xbb1/0x5b00 [ 3086.480328] ? lock_chain_count+0x20/0x20 [ 3086.481316] ? perf_trace_lock+0xac/0x490 [ 3086.482276] ? __lockdep_reset_lock+0x180/0x180 [ 3086.483372] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3086.484339] ? udp_v6_push_pending_frames+0x360/0x360 [ 3086.485552] ? mark_lock+0xf5/0x2df0 [ 3086.486426] ? lock_acquire+0x197/0x470 [ 3086.487345] ? find_held_lock+0x2c/0x110 [ 3086.488296] ? __might_fault+0xd3/0x180 [ 3086.489212] ? lock_downgrade+0x6d0/0x6d0 [ 3086.490191] ? lock_downgrade+0x6d0/0x6d0 [ 3086.491148] ? sock_has_perm+0x1ea/0x280 [ 3086.492090] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3086.493300] ? _copy_from_user+0xfb/0x1b0 [ 3086.494268] ? __import_iovec+0x458/0x590 [ 3086.495229] ? udp_v6_push_pending_frames+0x360/0x360 [ 3086.496434] inet6_sendmsg+0x105/0x140 [ 3086.497346] ? inet6_compat_ioctl+0x320/0x320 [ 3086.498384] __sock_sendmsg+0xf2/0x190 [ 3086.499289] ____sys_sendmsg+0x70d/0x870 [ 3086.500224] ? sock_write_iter+0x3d0/0x3d0 [ 3086.501201] ? do_recvmmsg+0x6d0/0x6d0 [ 3086.502111] ? lock_downgrade+0x6d0/0x6d0 [ 3086.503079] ? __lockdep_reset_lock+0x180/0x180 [ 3086.504154] ___sys_sendmsg+0xf3/0x170 [ 3086.505064] ? sendmsg_copy_msghdr+0x160/0x160 [ 3086.506139] ? __fget_files+0x2cf/0x520 [ 3086.507061] ? lock_downgrade+0x6d0/0x6d0 [ 3086.508011] ? find_held_lock+0x2c/0x110 [ 3086.508971] ? __fget_files+0x2f8/0x520 [ 3086.509919] ? __fget_light+0xea/0x290 [ 3086.510835] __sys_sendmsg+0xe5/0x1b0 [ 3086.511722] ? __sys_sendmsg_sock+0x40/0x40 [ 3086.512725] ? rcu_read_lock_any_held+0x75/0xa0 [ 3086.513840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3086.515044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3086.516237] ? trace_hardirqs_on+0x5b/0x180 [ 3086.517239] do_syscall_64+0x33/0x40 [ 3086.518108] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3086.519298] RIP: 0033:0x7f3e899f4b19 [ 3086.520156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.524426] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3086.526196] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3086.527840] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3086.529510] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3086.531154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.532784] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:34:48 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf00}]}]}, 0x24}}, 0x0) 05:34:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x7a}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:34:48 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 3086.643543] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3086.654212] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3086.699258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=62680 comm=syz-executor.0 [ 3086.702150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=62680 comm=syz-executor.0 05:34:48 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1e01}]}]}, 0x24}}, 0x0) 05:34:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xe9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:34:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:34:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x7000000, 0x0) [ 3086.827087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3086.838890] 9pnet_virtio: no channels available for device 05:35:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20000000, 0x0) 05:35:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 78) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:35:03 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:35:03 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x4000}]}]}, 0x24}}, 0x0) 05:35:03 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:35:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 31) 05:35:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf9a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:03 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x2}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3101.496724] 9pnet_virtio: no channels available for device [ 3101.504270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=62944 comm=syz-executor.0 [ 3101.509038] FAULT_INJECTION: forcing a failure. [ 3101.509038] name failslab, interval 1, probability 0, space 0, times 0 [ 3101.510678] CPU: 1 PID: 62947 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3101.511642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3101.512848] Call Trace: [ 3101.513239] dump_stack+0x107/0x167 [ 3101.513777] should_fail.cold+0x5/0xa [ 3101.514340] should_failslab+0x5/0x20 [ 3101.514899] __kmalloc_track_caller+0x79/0x370 [ 3101.515564] ? p9_client_create+0x598/0x1230 [ 3101.516202] ? kfree+0xd7/0x340 [ 3101.516690] kmemdup_nul+0x2d/0xa0 [ 3101.517205] p9_client_create+0x598/0x1230 [ 3101.517834] ? p9_client_flush+0x430/0x430 [ 3101.518450] ? trace_hardirqs_on+0x5b/0x180 [ 3101.519086] ? lockdep_init_map_type+0x2c7/0x780 [ 3101.519776] ? __raw_spin_lock_init+0x36/0x110 [ 3101.520440] v9fs_session_init+0x1dd/0x1680 [ 3101.521064] ? lock_release+0x680/0x680 [ 3101.521646] ? kmem_cache_alloc_trace+0x151/0x320 [ 3101.522350] ? v9fs_show_options+0x690/0x690 [ 3101.522995] ? trace_hardirqs_on+0x5b/0x180 [ 3101.523621] ? kasan_unpoison_shadow+0x33/0x50 [ 3101.524282] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3101.525022] v9fs_mount+0x79/0x8f0 [ 3101.525538] ? v9fs_write_inode+0x60/0x60 [ 3101.526157] legacy_get_tree+0x105/0x220 [ 3101.526752] vfs_get_tree+0x8e/0x300 [ 3101.527287] path_mount+0x1429/0x2120 [ 3101.527850] ? strncpy_from_user+0x9e/0x470 [ 3101.528475] ? finish_automount+0xa90/0xa90 [ 3101.529108] ? getname_flags.part.0+0x1dd/0x4f0 [ 3101.529793] ? _copy_from_user+0xfb/0x1b0 [ 3101.530399] __x64_sys_mount+0x282/0x300 [ 3101.530987] ? copy_mnt_ns+0xa00/0xa00 [ 3101.531556] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3101.532323] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3101.533076] do_syscall_64+0x33/0x40 [ 3101.533620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3101.534373] RIP: 0033:0x7fbfa6f6fb19 [ 3101.534913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3101.537587] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3101.538707] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3101.539747] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3101.540782] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3101.541832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3101.542863] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3101.553077] FAULT_INJECTION: forcing a failure. [ 3101.553077] name failslab, interval 1, probability 0, space 0, times 0 [ 3101.555359] CPU: 0 PID: 62912 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3101.556716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3101.558360] Call Trace: [ 3101.558886] dump_stack+0x107/0x167 [ 3101.559608] should_fail.cold+0x5/0xa [ 3101.560366] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3101.561402] ? create_object.isra.0+0x3a/0xa20 [ 3101.562314] should_failslab+0x5/0x20 [ 3101.563065] kmem_cache_alloc+0x5b/0x310 [ 3101.563865] ? mark_held_locks+0x9e/0xe0 [ 3101.564674] create_object.isra.0+0x3a/0xa20 [ 3101.565539] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3101.566553] kmem_cache_alloc_node+0x169/0x330 [ 3101.567462] __alloc_skb+0x6d/0x5b0 [ 3101.568185] skb_segment+0x9d8/0x3aa0 [ 3101.568935] ? __lock_acquire+0xbb1/0x5b00 [ 3101.569817] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3101.570790] ? lock_acquire+0x197/0x470 [ 3101.571575] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3101.572612] __udp_gso_segment+0x11c6/0x1830 [ 3101.573468] ? __sk_receive_skb+0x830/0x830 [ 3101.574335] udp4_ufo_fragment+0x528/0x720 [ 3101.575167] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3101.576142] inet_gso_segment+0x4fb/0x11a0 [ 3101.576986] skb_mac_gso_segment+0x273/0x570 [ 3101.577858] ? inet_sock_destruct+0x840/0x840 [ 3101.578731] ? skb_network_protocol+0x650/0x650 [ 3101.579643] ? skb_crc32c_csum_help+0x80/0x80 [ 3101.580526] ? lock_acquire+0x197/0x470 [ 3101.581303] ? __dev_queue_xmit+0x1c6/0x2690 [ 3101.582180] __skb_gso_segment+0x32d/0x6d0 [ 3101.583008] ? mark_lock+0xf5/0x2df0 [ 3101.583743] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3101.584765] ? lock_chain_count+0x20/0x20 [ 3101.585572] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3101.586480] __dev_queue_xmit+0x825/0x2690 [ 3101.587315] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3101.588320] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3101.589226] ? mark_held_locks+0x9e/0xe0 [ 3101.590035] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3101.591068] neigh_connected_output+0x382/0x4d0 [ 3101.591986] ip_finish_output2+0x6f1/0x21f0 [ 3101.592827] ? nf_hook_slow+0xfc/0x1e0 [ 3101.593586] ? ip_frag_next+0x9e0/0x9e0 [ 3101.594372] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3101.595348] __ip_finish_output.part.0+0x5f3/0xb50 [ 3101.596310] ? ip_fragment.constprop.0+0x240/0x240 [ 3101.597256] ? netif_rx_ni+0xe7/0x300 [ 3101.598009] ip_mc_output+0x401/0xa30 [ 3101.598754] ip_send_skb+0xdd/0x260 [ 3101.599467] udp_send_skb+0x6da/0x11d0 [ 3101.600232] udp_sendmsg+0x139a/0x2160 [ 3101.600993] ? mark_lock+0xf5/0x2df0 [ 3101.601724] ? ip_frag_init+0x350/0x350 [ 3101.602505] ? lock_chain_count+0x20/0x20 [ 3101.603318] ? udp_setsockopt+0xc0/0xc0 [ 3101.604087] ? mark_lock+0xf5/0x2df0 [ 3101.604809] ? __lockdep_reset_lock+0x180/0x180 [ 3101.605720] ? lock_chain_count+0x20/0x20 [ 3101.606529] ? mark_lock+0xf5/0x2df0 [ 3101.607253] ? mark_lock+0xf5/0x2df0 [ 3101.607973] ? lock_chain_count+0x20/0x20 [ 3101.608773] ? __lock_acquire+0xbb1/0x5b00 [ 3101.609594] ? lock_chain_count+0x20/0x20 [ 3101.610389] ? perf_trace_lock+0xac/0x490 [ 3101.611152] ? __lockdep_reset_lock+0x180/0x180 [ 3101.612015] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3101.612782] ? udp_v6_push_pending_frames+0x360/0x360 [ 3101.613730] ? mark_lock+0xf5/0x2df0 [ 3101.614423] ? lock_acquire+0x197/0x470 [ 3101.615146] ? find_held_lock+0x2c/0x110 [ 3101.615890] ? __might_fault+0xd3/0x180 [ 3101.616615] ? lock_downgrade+0x6d0/0x6d0 [ 3101.617380] ? lock_downgrade+0x6d0/0x6d0 [ 3101.618136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3101.619656] ? sock_has_perm+0x1ea/0x280 [ 3101.620395] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3101.621331] ? _copy_from_user+0xfb/0x1b0 [ 3101.622106] ? __import_iovec+0x458/0x590 [ 3101.622861] ? udp_v6_push_pending_frames+0x360/0x360 [ 3101.623806] inet6_sendmsg+0x105/0x140 [ 3101.624511] ? inet6_compat_ioctl+0x320/0x320 [ 3101.625314] __sock_sendmsg+0xf2/0x190 [ 3101.626030] ____sys_sendmsg+0x70d/0x870 [ 3101.626788] ? sock_write_iter+0x3d0/0x3d0 [ 3101.627566] ? do_recvmmsg+0x6d0/0x6d0 [ 3101.628275] ? lock_downgrade+0x6d0/0x6d0 [ 3101.629043] ? __lockdep_reset_lock+0x180/0x180 [ 3101.629901] ___sys_sendmsg+0xf3/0x170 [ 3101.630629] ? sendmsg_copy_msghdr+0x160/0x160 [ 3101.631460] ? __fget_files+0x2cf/0x520 [ 3101.632178] ? lock_downgrade+0x6d0/0x6d0 [ 3101.632932] ? find_held_lock+0x2c/0x110 [ 3101.633678] ? __fget_files+0x2f8/0x520 [ 3101.634414] ? __fget_light+0xea/0x290 [ 3101.635126] __sys_sendmsg+0xe5/0x1b0 [ 3101.635812] ? __sys_sendmsg_sock+0x40/0x40 [ 3101.636591] ? rcu_read_lock_any_held+0x75/0xa0 [ 3101.637448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3101.638389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3101.639329] ? trace_hardirqs_on+0x5b/0x180 [ 3101.640098] do_syscall_64+0x33/0x40 [ 3101.640776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3101.641689] RIP: 0033:0x7f3e899f4b19 [ 3101.642362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3101.645634] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3101.647003] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3101.648273] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3101.649534] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3101.650824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3101.652091] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:35:03 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 3101.694331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=63028 comm=syz-executor.0 05:35:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 32) 05:35:03 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x8100}]}]}, 0x24}}, 0x0) 05:35:03 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 3101.760226] FAULT_INJECTION: forcing a failure. [ 3101.760226] name failslab, interval 1, probability 0, space 0, times 0 [ 3101.762226] CPU: 0 PID: 63130 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3101.763376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3101.764734] Call Trace: [ 3101.765171] dump_stack+0x107/0x167 [ 3101.765776] should_fail.cold+0x5/0xa [ 3101.766407] ? create_object.isra.0+0x3a/0xa20 [ 3101.767159] should_failslab+0x5/0x20 [ 3101.767784] kmem_cache_alloc+0x5b/0x310 [ 3101.768350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=63133 comm=syz-executor.0 [ 3101.768453] create_object.isra.0+0x3a/0xa20 [ 3101.768474] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3101.771700] __kmalloc_track_caller+0x177/0x370 [ 3101.772469] ? p9_client_create+0x598/0x1230 [ 3101.773230] kmemdup_nul+0x2d/0xa0 [ 3101.773820] p9_client_create+0x598/0x1230 [ 3101.774528] ? p9_client_flush+0x430/0x430 [ 3101.775231] ? trace_hardirqs_on+0x5b/0x180 [ 3101.775916] ? lockdep_init_map_type+0x2c7/0x780 [ 3101.776668] ? __raw_spin_lock_init+0x36/0x110 [ 3101.777398] v9fs_session_init+0x1dd/0x1680 [ 3101.778088] ? lock_release+0x680/0x680 [ 3101.778723] ? kmem_cache_alloc_trace+0x151/0x320 [ 3101.779486] ? v9fs_show_options+0x690/0x690 [ 3101.780186] ? trace_hardirqs_on+0x5b/0x180 [ 3101.780872] ? kasan_unpoison_shadow+0x33/0x50 [ 3101.781599] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3101.782411] v9fs_mount+0x79/0x8f0 [ 3101.782969] ? v9fs_write_inode+0x60/0x60 [ 3101.783627] legacy_get_tree+0x105/0x220 [ 3101.784303] vfs_get_tree+0x8e/0x300 [ 3101.784897] path_mount+0x1429/0x2120 [ 3101.785511] ? strncpy_from_user+0x9e/0x470 [ 3101.786207] ? finish_automount+0xa90/0xa90 [ 3101.786891] ? getname_flags.part.0+0x1dd/0x4f0 [ 3101.787625] ? _copy_from_user+0xfb/0x1b0 [ 3101.788277] __x64_sys_mount+0x282/0x300 [ 3101.788917] ? copy_mnt_ns+0xa00/0xa00 [ 3101.789528] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3101.790433] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3101.791236] do_syscall_64+0x33/0x40 [ 3101.791829] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3101.792633] RIP: 0033:0x7fbfa6f6fb19 [ 3101.793215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3101.796078] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3101.797255] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3101.798374] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3101.799481] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3101.800663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3101.801865] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:35:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x10000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3101.868658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3117.989177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:19 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:35:19 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20100000, 0x0) 05:35:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 79) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:35:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 33) 05:35:19 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xc00e}]}]}, 0x24}}, 0x0) 05:35:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x3}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x109a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:19 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) [ 3118.024697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3118.049866] FAULT_INJECTION: forcing a failure. [ 3118.049866] name failslab, interval 1, probability 0, space 0, times 0 [ 3118.050165] FAULT_INJECTION: forcing a failure. [ 3118.050165] name failslab, interval 1, probability 0, space 0, times 0 [ 3118.052166] CPU: 0 PID: 63290 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3118.052178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3118.052194] Call Trace: [ 3118.058126] dump_stack+0x107/0x167 [ 3118.058869] should_fail.cold+0x5/0xa [ 3118.059646] should_failslab+0x5/0x20 [ 3118.060416] __kmalloc_node_track_caller+0x74/0x3b0 [ 3118.061424] ? skb_segment+0x9d8/0x3aa0 [ 3118.062230] __alloc_skb+0xb1/0x5b0 [ 3118.062976] skb_segment+0x9d8/0x3aa0 [ 3118.063745] ? __lock_acquire+0xbb1/0x5b00 [ 3118.064632] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3118.065634] ? lock_acquire+0x197/0x470 [ 3118.066442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.067508] __udp_gso_segment+0x11c6/0x1830 [ 3118.068382] ? __sk_receive_skb+0x830/0x830 [ 3118.069252] udp4_ufo_fragment+0x528/0x720 [ 3118.070102] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3118.071105] inet_gso_segment+0x4fb/0x11a0 [ 3118.071964] skb_mac_gso_segment+0x273/0x570 [ 3118.072847] ? inet_sock_destruct+0x840/0x840 [ 3118.073738] ? skb_network_protocol+0x650/0x650 [ 3118.074669] ? skb_crc32c_csum_help+0x80/0x80 [ 3118.075566] ? lock_acquire+0x197/0x470 [ 3118.076358] ? __dev_queue_xmit+0x1c6/0x2690 [ 3118.077246] __skb_gso_segment+0x32d/0x6d0 [ 3118.078092] ? mark_lock+0xf5/0x2df0 [ 3118.078853] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3118.079907] ? lock_chain_count+0x20/0x20 [ 3118.080733] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3118.081651] __dev_queue_xmit+0x825/0x2690 [ 3118.082513] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3118.083543] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3118.084463] ? mark_held_locks+0x9e/0xe0 [ 3118.085280] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3118.086332] neigh_connected_output+0x382/0x4d0 [ 3118.087285] ip_finish_output2+0x6f1/0x21f0 [ 3118.088155] ? nf_hook_slow+0xfc/0x1e0 [ 3118.088931] ? ip_frag_next+0x9e0/0x9e0 [ 3118.089718] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3118.090721] __ip_finish_output.part.0+0x5f3/0xb50 [ 3118.091700] ? ip_fragment.constprop.0+0x240/0x240 [ 3118.092671] ? netif_rx_ni+0xe7/0x300 [ 3118.093434] ip_mc_output+0x401/0xa30 [ 3118.094194] ip_send_skb+0xdd/0x260 [ 3118.094929] udp_send_skb+0x6da/0x11d0 [ 3118.095713] udp_sendmsg+0x139a/0x2160 [ 3118.096479] ? mark_lock+0xf5/0x2df0 [ 3118.097215] ? ip_frag_init+0x350/0x350 [ 3118.098005] ? lock_chain_count+0x20/0x20 [ 3118.098826] ? udp_setsockopt+0xc0/0xc0 [ 3118.099591] ? mark_lock+0xf5/0x2df0 [ 3118.100303] ? merge_sched_in+0x142/0xfb0 [ 3118.101103] ? lock_chain_count+0x20/0x20 [ 3118.101904] ? mark_lock+0xf5/0x2df0 [ 3118.102636] ? mark_lock+0xf5/0x2df0 [ 3118.103354] ? lock_chain_count+0x20/0x20 [ 3118.104149] ? __lock_acquire+0xbb1/0x5b00 [ 3118.104964] ? lock_chain_count+0x20/0x20 [ 3118.105765] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.106792] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3118.107584] ? udp_v6_push_pending_frames+0x360/0x360 [ 3118.108578] ? mark_lock+0xf5/0x2df0 [ 3118.109288] ? lock_acquire+0x197/0x470 [ 3118.110042] ? find_held_lock+0x2c/0x110 [ 3118.110828] ? __might_fault+0xd3/0x180 [ 3118.111583] ? lock_downgrade+0x6d0/0x6d0 [ 3118.112373] ? lock_downgrade+0x6d0/0x6d0 [ 3118.113158] ? sock_has_perm+0x1ea/0x280 [ 3118.113934] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3118.114923] ? _copy_from_user+0xfb/0x1b0 [ 3118.115721] ? __import_iovec+0x458/0x590 [ 3118.116507] ? udp_v6_push_pending_frames+0x360/0x360 [ 3118.117497] inet6_sendmsg+0x105/0x140 [ 3118.118232] ? inet6_compat_ioctl+0x320/0x320 [ 3118.119093] __sock_sendmsg+0xf2/0x190 [ 3118.119835] ____sys_sendmsg+0x70d/0x870 [ 3118.120608] ? sock_write_iter+0x3d0/0x3d0 [ 3118.121406] ? do_recvmmsg+0x6d0/0x6d0 [ 3118.122146] ? lock_downgrade+0x6d0/0x6d0 [ 3118.122941] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.123938] ___sys_sendmsg+0xf3/0x170 [ 3118.124678] ? sendmsg_copy_msghdr+0x160/0x160 [ 3118.125547] ? __fget_files+0x2cf/0x520 [ 3118.126299] ? lock_downgrade+0x6d0/0x6d0 [ 3118.127089] ? find_held_lock+0x2c/0x110 [ 3118.127872] ? __fget_files+0x2f8/0x520 [ 3118.128628] ? __fget_light+0xea/0x290 [ 3118.129366] __sys_sendmsg+0xe5/0x1b0 [ 3118.130087] ? __sys_sendmsg_sock+0x40/0x40 [ 3118.130906] ? rcu_read_lock_any_held+0x75/0xa0 [ 3118.131796] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3118.132789] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3118.133752] ? trace_hardirqs_on+0x5b/0x180 [ 3118.134572] do_syscall_64+0x33/0x40 [ 3118.135273] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3118.136236] RIP: 0033:0x7f3e899f4b19 [ 3118.136933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3118.140386] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3118.141811] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3118.143159] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3118.144494] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3118.145824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3118.147176] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3118.148546] CPU: 1 PID: 63332 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3118.150171] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3118.152114] Call Trace: [ 3118.152731] dump_stack+0x107/0x167 [ 3118.153577] should_fail.cold+0x5/0xa [ 3118.154480] should_failslab+0x5/0x20 [ 3118.155407] __kmalloc_track_caller+0x79/0x370 [ 3118.156483] ? parse_opts.part.0+0x8e/0x340 [ 3118.157497] kstrdup+0x36/0x70 [ 3118.158254] parse_opts.part.0+0x8e/0x340 [ 3118.159224] ? p9_fd_show_options+0x1c0/0x1c0 [ 3118.160277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3118.161485] ? quarantine_put+0x8b/0x1a0 [ 3118.162428] ? trace_hardirqs_on+0x5b/0x180 [ 3118.163428] ? kfree+0xd7/0x340 [ 3118.164199] p9_fd_create+0x98/0x4a0 [ 3118.165053] ? p9_conn_create+0x510/0x510 [ 3118.166008] ? p9_client_create+0x798/0x1230 [ 3118.167029] ? kfree+0xd7/0x340 [ 3118.167804] p9_client_create+0x7ff/0x1230 [ 3118.168791] ? p9_client_flush+0x430/0x430 [ 3118.169763] ? trace_hardirqs_on+0x5b/0x180 [ 3118.170767] ? lockdep_init_map_type+0x2c7/0x780 [ 3118.171883] ? __raw_spin_lock_init+0x36/0x110 [ 3118.172963] v9fs_session_init+0x1dd/0x1680 [ 3118.173980] ? lock_release+0x680/0x680 [ 3118.174929] ? kmem_cache_alloc_trace+0x151/0x320 [ 3118.176061] ? v9fs_show_options+0x690/0x690 [ 3118.177101] ? trace_hardirqs_on+0x5b/0x180 [ 3118.178115] ? kasan_unpoison_shadow+0x33/0x50 [ 3118.179200] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3118.180392] v9fs_mount+0x79/0x8f0 [ 3118.181222] ? v9fs_write_inode+0x60/0x60 [ 3118.182174] legacy_get_tree+0x105/0x220 [ 3118.183139] vfs_get_tree+0x8e/0x300 [ 3118.184007] path_mount+0x1429/0x2120 [ 3118.184907] ? strncpy_from_user+0x9e/0x470 [ 3118.185918] ? finish_automount+0xa90/0xa90 [ 3118.186933] ? getname_flags.part.0+0x1dd/0x4f0 [ 3118.188021] ? _copy_from_user+0xfb/0x1b0 [ 3118.188996] __x64_sys_mount+0x282/0x300 [ 3118.189946] ? copy_mnt_ns+0xa00/0xa00 [ 3118.190867] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3118.192092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3118.193297] do_syscall_64+0x33/0x40 [ 3118.194166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3118.195378] RIP: 0033:0x7fbfa6f6fb19 [ 3118.196250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3118.200537] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3118.202304] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3118.203981] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3118.205634] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3118.207299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3118.208954] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3118.210682] 9pnet: Insufficient options for proto=fd 05:35:20 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf000}]}]}, 0x24}}, 0x0) 05:35:20 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:35:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x119a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x4}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 80) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:35:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8cffffff, 0x0) 05:35:20 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x34000}]}]}, 0x24}}, 0x0) 05:35:20 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) [ 3118.428968] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3118.438522] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3118.638690] FAULT_INJECTION: forcing a failure. [ 3118.638690] name failslab, interval 1, probability 0, space 0, times 0 [ 3118.640254] CPU: 0 PID: 63802 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3118.641180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3118.642283] Call Trace: [ 3118.642657] dump_stack+0x107/0x167 [ 3118.643133] should_fail.cold+0x5/0xa [ 3118.643644] ? create_object.isra.0+0x3a/0xa20 [ 3118.644246] should_failslab+0x5/0x20 [ 3118.644753] kmem_cache_alloc+0x5b/0x310 [ 3118.645289] create_object.isra.0+0x3a/0xa20 [ 3118.645882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3118.646563] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3118.647247] ? skb_segment+0x9d8/0x3aa0 [ 3118.647771] __alloc_skb+0xb1/0x5b0 [ 3118.648257] skb_segment+0x9d8/0x3aa0 [ 3118.648760] ? __lock_acquire+0xbb1/0x5b00 [ 3118.649335] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3118.649996] ? lock_acquire+0x197/0x470 [ 3118.650530] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.651229] __udp_gso_segment+0x11c6/0x1830 [ 3118.651819] ? __sk_receive_skb+0x830/0x830 [ 3118.652394] udp4_ufo_fragment+0x528/0x720 [ 3118.652965] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3118.653636] inet_gso_segment+0x4fb/0x11a0 [ 3118.654201] skb_mac_gso_segment+0x273/0x570 [ 3118.654799] ? inet_sock_destruct+0x840/0x840 [ 3118.655392] ? skb_network_protocol+0x650/0x650 [ 3118.656007] ? skb_crc32c_csum_help+0x80/0x80 [ 3118.656596] ? lock_acquire+0x197/0x470 [ 3118.657111] ? __dev_queue_xmit+0x1c6/0x2690 [ 3118.657698] __skb_gso_segment+0x32d/0x6d0 [ 3118.658256] ? mark_lock+0xf5/0x2df0 [ 3118.658759] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3118.659445] ? lock_chain_count+0x20/0x20 [ 3118.659984] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3118.660579] __dev_queue_xmit+0x825/0x2690 [ 3118.661138] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3118.661826] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3118.662449] ? mark_held_locks+0x9e/0xe0 [ 3118.662984] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3118.663681] neigh_connected_output+0x382/0x4d0 [ 3118.664309] ip_finish_output2+0x6f1/0x21f0 [ 3118.664890] ? nf_hook_slow+0xfc/0x1e0 [ 3118.665406] ? ip_frag_next+0x9e0/0x9e0 [ 3118.665924] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3118.666588] __ip_finish_output.part.0+0x5f3/0xb50 [ 3118.667234] ? ip_fragment.constprop.0+0x240/0x240 [ 3118.667874] ? netif_rx_ni+0xe7/0x300 [ 3118.668373] ip_mc_output+0x401/0xa30 [ 3118.668875] ip_send_skb+0xdd/0x260 [ 3118.669353] udp_send_skb+0x6da/0x11d0 [ 3118.669863] udp_sendmsg+0x139a/0x2160 [ 3118.670372] ? mark_lock+0xf5/0x2df0 [ 3118.670855] ? ip_frag_init+0x350/0x350 [ 3118.671372] ? lock_chain_count+0x20/0x20 [ 3118.671910] ? udp_setsockopt+0xc0/0xc0 [ 3118.672431] ? mark_lock+0xf5/0x2df0 [ 3118.672911] ? lock_acquire+0x197/0x470 [ 3118.673432] ? lock_chain_count+0x20/0x20 [ 3118.673970] ? mark_lock+0xf5/0x2df0 [ 3118.674476] ? mark_lock+0xf5/0x2df0 [ 3118.674970] ? lock_chain_count+0x20/0x20 [ 3118.675513] ? __lock_acquire+0xbb1/0x5b00 [ 3118.676062] ? lock_chain_count+0x20/0x20 [ 3118.676617] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.677318] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3118.677855] ? udp_v6_push_pending_frames+0x360/0x360 [ 3118.678539] ? mark_lock+0xf5/0x2df0 [ 3118.679027] ? lock_acquire+0x197/0x470 [ 3118.679542] ? find_held_lock+0x2c/0x110 [ 3118.680068] ? __might_fault+0xd3/0x180 [ 3118.680582] ? lock_downgrade+0x6d0/0x6d0 [ 3118.681113] ? lock_downgrade+0x6d0/0x6d0 [ 3118.681655] ? sock_has_perm+0x1ea/0x280 [ 3118.682186] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3118.682863] ? _copy_from_user+0xfb/0x1b0 [ 3118.683409] ? __import_iovec+0x458/0x590 [ 3118.683944] ? udp_v6_push_pending_frames+0x360/0x360 [ 3118.684625] inet6_sendmsg+0x105/0x140 [ 3118.685129] ? inet6_compat_ioctl+0x320/0x320 [ 3118.685715] __sock_sendmsg+0xf2/0x190 [ 3118.686226] ____sys_sendmsg+0x70d/0x870 [ 3118.686759] ? sock_write_iter+0x3d0/0x3d0 [ 3118.687315] ? do_recvmmsg+0x6d0/0x6d0 [ 3118.687818] ? lock_downgrade+0x6d0/0x6d0 [ 3118.688354] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3118.689037] ___sys_sendmsg+0xf3/0x170 [ 3118.689546] ? sendmsg_copy_msghdr+0x160/0x160 [ 3118.690139] ? __fget_files+0x2cf/0x520 [ 3118.690655] ? lock_downgrade+0x6d0/0x6d0 [ 3118.691194] ? find_held_lock+0x2c/0x110 [ 3118.691725] ? __fget_files+0x2f8/0x520 [ 3118.692254] ? __fget_light+0xea/0x290 [ 3118.692766] __sys_sendmsg+0xe5/0x1b0 [ 3118.693264] ? __sys_sendmsg_sock+0x40/0x40 [ 3118.693829] ? rcu_read_lock_any_held+0x75/0xa0 [ 3118.694448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3118.695115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3118.695773] ? trace_hardirqs_on+0x5b/0x180 [ 3118.696327] do_syscall_64+0x33/0x40 [ 3118.696813] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3118.697475] RIP: 0033:0x7f3e899f4b19 [ 3118.697958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3118.700307] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3118.701272] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3118.702174] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3118.703086] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3118.703988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3118.704895] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:35:36 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x80000}]}]}, 0x24}}, 0x0) 05:35:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 81) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:35:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 34) [ 3134.423381] FAULT_INJECTION: forcing a failure. [ 3134.423381] name failslab, interval 1, probability 0, space 0, times 0 [ 3134.426339] CPU: 1 PID: 63812 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3134.428101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3134.430227] Call Trace: [ 3134.430906] dump_stack+0x107/0x167 [ 3134.431855] should_fail.cold+0x5/0xa 05:35:36 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:35:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x5}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:36 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 05:35:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xc0ed0000, 0x0) 05:35:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20100000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3134.432829] ? create_object.isra.0+0x3a/0xa20 [ 3134.434222] should_failslab+0x5/0x20 [ 3134.435215] kmem_cache_alloc+0x5b/0x310 [ 3134.436255] create_object.isra.0+0x3a/0xa20 [ 3134.437369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3134.438674] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3134.439970] ? skb_segment+0x9d8/0x3aa0 [ 3134.440988] __alloc_skb+0xb1/0x5b0 [ 3134.441925] skb_segment+0x9d8/0x3aa0 [ 3134.442899] ? __lock_acquire+0xbb1/0x5b00 [ 3134.444033] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3134.445294] ? lock_acquire+0x197/0x470 [ 3134.446304] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3134.447646] __udp_gso_segment+0x11c6/0x1830 [ 3134.448775] ? __sk_receive_skb+0x830/0x830 [ 3134.449882] udp4_ufo_fragment+0x528/0x720 [ 3134.450988] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3134.452298] inet_gso_segment+0x4fb/0x11a0 [ 3134.453413] skb_mac_gso_segment+0x273/0x570 [ 3134.454546] ? inet_sock_destruct+0x840/0x840 [ 3134.455702] ? skb_network_protocol+0x650/0x650 [ 3134.456872] ? skb_crc32c_csum_help+0x80/0x80 [ 3134.458019] ? lock_acquire+0x197/0x470 [ 3134.459045] ? __dev_queue_xmit+0x1c6/0x2690 [ 3134.460169] __skb_gso_segment+0x32d/0x6d0 [ 3134.461248] ? mark_lock+0xf5/0x2df0 [ 3134.462208] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3134.463560] ? lock_chain_count+0x20/0x20 [ 3134.464612] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3134.465779] __dev_queue_xmit+0x825/0x2690 [ 3134.466856] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3134.468173] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3134.469350] ? mark_held_locks+0x9e/0xe0 [ 3134.470386] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3134.471746] neigh_connected_output+0x382/0x4d0 [ 3134.472802] ip_finish_output2+0x6f1/0x21f0 [ 3134.473774] ? nf_hook_slow+0xfc/0x1e0 [ 3134.474655] ? ip_frag_next+0x9e0/0x9e0 [ 3134.475563] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3134.476697] __ip_finish_output.part.0+0x5f3/0xb50 [ 3134.477810] ? ip_fragment.constprop.0+0x240/0x240 [ 3134.478914] ? netif_rx_ni+0xe7/0x300 [ 3134.479788] ip_mc_output+0x401/0xa30 [ 3134.480654] ip_send_skb+0xdd/0x260 [ 3134.481479] udp_send_skb+0x6da/0x11d0 [ 3134.482369] udp_sendmsg+0x139a/0x2160 [ 3134.483253] ? mark_lock+0xf5/0x2df0 [ 3134.484095] ? ip_frag_init+0x350/0x350 [ 3134.484995] ? lock_chain_count+0x20/0x20 [ 3134.485943] ? udp_setsockopt+0xc0/0xc0 [ 3134.486845] ? mark_lock+0xf5/0x2df0 [ 3134.487691] ? lock_acquire+0x197/0x470 [ 3134.488598] ? lock_chain_count+0x20/0x20 [ 3134.489534] ? mark_lock+0xf5/0x2df0 [ 3134.489561] ? mark_lock+0xf5/0x2df0 [ 3134.489588] ? lock_chain_count+0x20/0x20 [ 3134.491879] ? __lock_acquire+0xbb1/0x5b00 [ 3134.492838] ? lock_chain_count+0x20/0x20 [ 3134.493795] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3134.495000] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3134.495933] ? udp_v6_push_pending_frames+0x360/0x360 [ 3134.497108] ? mark_lock+0xf5/0x2df0 [ 3134.497971] ? lock_acquire+0x197/0x470 [ 3134.498868] ? find_held_lock+0x2c/0x110 [ 3134.499797] ? __might_fault+0xd3/0x180 [ 3134.500691] ? lock_downgrade+0x6d0/0x6d0 [ 3134.501629] ? lock_downgrade+0x6d0/0x6d0 [ 3134.502568] ? sock_has_perm+0x1ea/0x280 [ 3134.503491] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3134.504657] ? _copy_from_user+0xfb/0x1b0 [ 3134.505605] ? __import_iovec+0x458/0x590 [ 3134.506551] ? udp_v6_push_pending_frames+0x360/0x360 [ 3134.507729] inet6_sendmsg+0x105/0x140 [ 3134.508614] ? inet6_compat_ioctl+0x320/0x320 [ 3134.509629] __sock_sendmsg+0xf2/0x190 [ 3134.510506] ____sys_sendmsg+0x70d/0x870 [ 3134.511452] ? sock_write_iter+0x3d0/0x3d0 [ 3134.512404] ? do_recvmmsg+0x6d0/0x6d0 [ 3134.513287] ? lock_downgrade+0x6d0/0x6d0 [ 3134.514228] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3134.515428] ___sys_sendmsg+0xf3/0x170 [ 3134.516326] ? sendmsg_copy_msghdr+0x160/0x160 [ 3134.517368] ? __fget_files+0x2cf/0x520 [ 3134.518267] ? lock_downgrade+0x6d0/0x6d0 [ 3134.519214] ? find_held_lock+0x2c/0x110 [ 3134.520142] ? __fget_files+0x2f8/0x520 [ 3134.521048] ? __fget_light+0xea/0x290 [ 3134.521936] __sys_sendmsg+0xe5/0x1b0 [ 3134.522800] ? __sys_sendmsg_sock+0x40/0x40 [ 3134.523786] ? rcu_read_lock_any_held+0x75/0xa0 [ 3134.524857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3134.526041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3134.527212] ? trace_hardirqs_on+0x5b/0x180 [ 3134.528195] do_syscall_64+0x33/0x40 [ 3134.529037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3134.530192] RIP: 0033:0x7f3e899f4b19 [ 3134.531042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3134.535192] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3134.536904] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3134.538510] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3134.540127] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3134.541733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3134.543340] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3134.580136] FAULT_INJECTION: forcing a failure. [ 3134.580136] name failslab, interval 1, probability 0, space 0, times 0 [ 3134.581793] CPU: 0 PID: 63815 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3134.582718] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3134.583831] Call Trace: [ 3134.584187] dump_stack+0x107/0x167 [ 3134.584673] should_fail.cold+0x5/0xa [ 3134.585181] ? create_object.isra.0+0x3a/0xa20 [ 3134.585797] should_failslab+0x5/0x20 [ 3134.586301] kmem_cache_alloc+0x5b/0x310 [ 3134.586847] ? legacy_get_tree+0x105/0x220 [ 3134.587571] ? vfs_get_tree+0x8e/0x300 [ 3134.588093] create_object.isra.0+0x3a/0xa20 [ 3134.588680] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3134.589361] __kmalloc_track_caller+0x177/0x370 [ 3134.589976] ? parse_opts.part.0+0x8e/0x340 [ 3134.590549] kstrdup+0x36/0x70 [ 3134.590987] parse_opts.part.0+0x8e/0x340 [ 3134.591534] ? p9_fd_show_options+0x1c0/0x1c0 [ 3134.592128] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3134.592820] ? quarantine_put+0x8b/0x1a0 [ 3134.593353] ? trace_hardirqs_on+0x5b/0x180 [ 3134.593918] ? kfree+0xd7/0x340 [ 3134.594360] p9_fd_create+0x98/0x4a0 [ 3134.594778] 9pnet_virtio: no channels available for device [ 3134.594848] ? p9_conn_create+0x510/0x510 [ 3134.594870] ? p9_client_create+0x798/0x1230 [ 3134.597299] ? kfree+0xd7/0x340 [ 3134.597738] p9_client_create+0x7ff/0x1230 [ 3134.598299] ? p9_client_flush+0x430/0x430 [ 3134.598873] ? trace_hardirqs_on+0x5b/0x180 [ 3134.599459] ? lockdep_init_map_type+0x2c7/0x780 [ 3134.600090] ? __raw_spin_lock_init+0x36/0x110 [ 3134.600692] v9fs_session_init+0x1dd/0x1680 [ 3134.601253] ? lock_release+0x680/0x680 [ 3134.601792] ? kmem_cache_alloc_trace+0x151/0x320 [ 3134.602430] ? v9fs_show_options+0x690/0x690 [ 3134.603020] ? trace_hardirqs_on+0x5b/0x180 [ 3134.603595] ? kasan_unpoison_shadow+0x33/0x50 [ 3134.604189] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3134.604861] v9fs_mount+0x79/0x8f0 [ 3134.605323] ? v9fs_write_inode+0x60/0x60 [ 3134.605868] legacy_get_tree+0x105/0x220 [ 3134.606399] vfs_get_tree+0x8e/0x300 [ 3134.606885] path_mount+0x1429/0x2120 [ 3134.607422] ? strncpy_from_user+0x9e/0x470 [ 3134.607984] ? finish_automount+0xa90/0xa90 [ 3134.608570] ? getname_flags.part.0+0x1dd/0x4f0 [ 3134.609189] ? _copy_from_user+0xfb/0x1b0 [ 3134.609730] __x64_sys_mount+0x282/0x300 [ 3134.610286] ? copy_mnt_ns+0xa00/0xa00 [ 3134.610791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3134.611491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3134.612174] do_syscall_64+0x33/0x40 [ 3134.612674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3134.613348] RIP: 0033:0x7fbfa6f6fb19 [ 3134.613837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3134.616277] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3134.617269] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3134.618203] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3134.619144] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3134.620073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3134.621016] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:35:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x40000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:36 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 05:35:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x6}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 82) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:35:36 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x400300}]}]}, 0x24}}, 0x0) 05:35:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6ffffff, 0x0) 05:35:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x48000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:36 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 3134.824320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:36 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x28, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3134.836746] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:36 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf0ffff}]}]}, 0x24}}, 0x0) 05:35:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 35) 05:35:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x7}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:36 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 3134.973476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3134.985499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x4c000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3135.005196] FAULT_INJECTION: forcing a failure. [ 3135.005196] name failslab, interval 1, probability 0, space 0, times 0 [ 3135.006493] CPU: 0 PID: 64373 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3135.007271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3135.008207] Call Trace: [ 3135.008510] dump_stack+0x107/0x167 [ 3135.008920] should_fail.cold+0x5/0xa [ 3135.009355] should_failslab+0x5/0x20 [ 3135.009785] __kmalloc_track_caller+0x79/0x370 [ 3135.010298] ? match_number+0xaf/0x1d0 [ 3135.010742] kmemdup_nul+0x2d/0xa0 [ 3135.011143] match_number+0xaf/0x1d0 [ 3135.011573] ? match_u64+0x190/0x190 [ 3135.011990] ? __kmalloc_track_caller+0x2c6/0x370 [ 3135.012531] ? memcpy+0x39/0x60 [ 3135.012910] parse_opts.part.0+0x1f3/0x340 [ 3135.013388] ? p9_fd_show_options+0x1c0/0x1c0 [ 3135.013896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3135.014485] ? trace_hardirqs_on+0x5b/0x180 [ 3135.014979] ? kfree+0xd7/0x340 [ 3135.015352] p9_fd_create+0x98/0x4a0 [ 3135.015768] ? p9_conn_create+0x510/0x510 [ 3135.016233] ? p9_client_create+0x798/0x1230 [ 3135.016725] ? kfree+0xd7/0x340 [ 3135.017100] p9_client_create+0x7ff/0x1230 [ 3135.017580] ? p9_client_flush+0x430/0x430 [ 3135.018057] ? trace_hardirqs_on+0x5b/0x180 [ 3135.018545] ? lockdep_init_map_type+0x2c7/0x780 [ 3135.019078] ? __raw_spin_lock_init+0x36/0x110 [ 3135.019595] v9fs_session_init+0x1dd/0x1680 [ 3135.020077] ? lock_release+0x680/0x680 [ 3135.020527] ? kmem_cache_alloc_trace+0x151/0x320 [ 3135.021067] ? v9fs_show_options+0x690/0x690 [ 3135.021565] ? trace_hardirqs_on+0x5b/0x180 [ 3135.022053] ? kasan_unpoison_shadow+0x33/0x50 [ 3135.022570] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3135.023147] v9fs_mount+0x79/0x8f0 [ 3135.023542] ? v9fs_write_inode+0x60/0x60 [ 3135.024010] legacy_get_tree+0x105/0x220 [ 3135.024468] vfs_get_tree+0x8e/0x300 [ 3135.024885] path_mount+0x1429/0x2120 [ 3135.025319] ? strncpy_from_user+0x9e/0x470 [ 3135.025806] ? finish_automount+0xa90/0xa90 [ 3135.026299] ? getname_flags.part.0+0x1dd/0x4f0 [ 3135.026826] ? _copy_from_user+0xfb/0x1b0 [ 3135.027307] __x64_sys_mount+0x282/0x300 [ 3135.027761] ? copy_mnt_ns+0xa00/0xa00 [ 3135.028203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3135.028782] do_syscall_64+0x33/0x40 [ 3135.029202] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3135.029777] RIP: 0033:0x7fbfa6f6fb19 [ 3135.030194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3135.032267] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3135.033122] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3135.033915] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3135.034713] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3135.035523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3135.036325] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3135.037185] FAULT_INJECTION: forcing a failure. [ 3135.037185] name failslab, interval 1, probability 0, space 0, times 0 [ 3135.039647] CPU: 1 PID: 64377 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3135.041097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3135.042841] Call Trace: [ 3135.043427] dump_stack+0x107/0x167 [ 3135.044202] should_fail.cold+0x5/0xa [ 3135.045007] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3135.046112] ? create_object.isra.0+0x3a/0xa20 [ 3135.047075] should_failslab+0x5/0x20 [ 3135.047865] kmem_cache_alloc+0x5b/0x310 [ 3135.048718] ? mark_held_locks+0x9e/0xe0 [ 3135.049575] create_object.isra.0+0x3a/0xa20 [ 3135.050500] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3135.051579] kmem_cache_alloc_node+0x169/0x330 [ 3135.051888] 9pnet: Insufficient options for proto=fd [ 3135.052541] __alloc_skb+0x6d/0x5b0 [ 3135.052570] skb_segment+0x9d8/0x3aa0 [ 3135.054664] ? __lock_acquire+0xbb1/0x5b00 [ 3135.055594] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3135.056649] ? lock_acquire+0x197/0x470 [ 3135.057498] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3135.058611] __udp_gso_segment+0x11c6/0x1830 [ 3135.059535] ? __sk_receive_skb+0x830/0x830 [ 3135.060462] udp4_ufo_fragment+0x528/0x720 [ 3135.061346] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3135.062389] inet_gso_segment+0x4fb/0x11a0 [ 3135.063294] skb_mac_gso_segment+0x273/0x570 [ 3135.064212] ? inet_sock_destruct+0x840/0x840 [ 3135.065152] ? skb_network_protocol+0x650/0x650 [ 3135.066116] ? skb_crc32c_csum_help+0x80/0x80 [ 3135.067054] ? lock_acquire+0x197/0x470 [ 3135.067883] ? __dev_queue_xmit+0x1c6/0x2690 [ 3135.068804] __skb_gso_segment+0x32d/0x6d0 [ 3135.069685] ? mark_lock+0xf5/0x2df0 [ 3135.070467] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3135.071576] ? lock_chain_count+0x20/0x20 [ 3135.072443] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3135.073398] __dev_queue_xmit+0x825/0x2690 [ 3135.074285] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3135.075368] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3135.076337] ? mark_held_locks+0x9e/0xe0 [ 3135.077195] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3135.078297] neigh_connected_output+0x382/0x4d0 [ 3135.079314] ip_finish_output2+0x6f1/0x21f0 [ 3135.080223] ? nf_hook_slow+0xfc/0x1e0 [ 3135.081039] ? ip_frag_next+0x9e0/0x9e0 [ 3135.081877] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3135.082932] __ip_finish_output.part.0+0x5f3/0xb50 [ 3135.083978] ? ip_fragment.constprop.0+0x240/0x240 [ 3135.085009] ? netif_rx_ni+0xe7/0x300 [ 3135.085816] ip_mc_output+0x401/0xa30 [ 3135.086625] ip_send_skb+0xdd/0x260 [ 3135.087411] udp_send_skb+0x6da/0x11d0 [ 3135.088238] udp_sendmsg+0x139a/0x2160 [ 3135.089054] ? mark_lock+0xf5/0x2df0 [ 3135.089836] ? ip_frag_init+0x350/0x350 [ 3135.090676] ? lock_chain_count+0x20/0x20 [ 3135.091564] ? udp_setsockopt+0xc0/0xc0 [ 3135.092398] ? mark_lock+0xf5/0x2df0 [ 3135.093180] ? lock_acquire+0x197/0x470 [ 3135.094025] ? lock_chain_count+0x20/0x20 [ 3135.094895] ? mark_lock+0xf5/0x2df0 [ 3135.095686] ? mark_lock+0xf5/0x2df0 [ 3135.096474] ? lock_chain_count+0x20/0x20 [ 3135.097347] ? __lock_acquire+0xbb1/0x5b00 [ 3135.098244] ? lock_chain_count+0x20/0x20 [ 3135.099137] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3135.100249] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3135.101139] ? udp_v6_push_pending_frames+0x360/0x360 [ 3135.102291] ? mark_lock+0xf5/0x2df0 [ 3135.103240] ? lock_acquire+0x197/0x470 [ 3135.104237] ? find_held_lock+0x2c/0x110 [ 3135.105267] ? __might_fault+0xd3/0x180 [ 3135.106259] ? lock_downgrade+0x6d0/0x6d0 [ 3135.107322] ? lock_downgrade+0x6d0/0x6d0 [ 3135.108381] ? sock_has_perm+0x1ea/0x280 [ 3135.109413] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3135.110715] ? _copy_from_user+0xfb/0x1b0 [ 3135.111780] ? __import_iovec+0x458/0x590 [ 3135.112827] ? udp_v6_push_pending_frames+0x360/0x360 [ 3135.114127] inet6_sendmsg+0x105/0x140 [ 3135.115104] ? inet6_compat_ioctl+0x320/0x320 [ 3135.116248] __sock_sendmsg+0xf2/0x190 [ 3135.117222] ____sys_sendmsg+0x70d/0x870 [ 3135.118251] ? sock_write_iter+0x3d0/0x3d0 [ 3135.119316] ? do_recvmmsg+0x6d0/0x6d0 [ 3135.120285] ? lock_downgrade+0x6d0/0x6d0 [ 3135.121330] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3135.122672] ___sys_sendmsg+0xf3/0x170 [ 3135.123651] ? sendmsg_copy_msghdr+0x160/0x160 [ 3135.124813] ? __fget_files+0x2cf/0x520 [ 3135.125817] ? lock_downgrade+0x6d0/0x6d0 [ 3135.126851] ? find_held_lock+0x2c/0x110 [ 3135.127896] ? __fget_files+0x2f8/0x520 [ 3135.128903] ? __fget_light+0xea/0x290 [ 3135.129886] __sys_sendmsg+0xe5/0x1b0 [ 3135.130839] ? __sys_sendmsg_sock+0x40/0x40 [ 3135.131957] ? rcu_read_lock_any_held+0x75/0xa0 [ 3135.133144] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3135.134463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3135.135761] ? trace_hardirqs_on+0x5b/0x180 [ 3135.136857] do_syscall_64+0x33/0x40 [ 3135.137799] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3135.139081] RIP: 0033:0x7f3e899f4b19 [ 3135.140029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3135.144647] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3135.146559] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3135.148343] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3135.150125] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3135.151897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3135.153675] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:35:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf9fdffff, 0x0) 05:35:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1000000}]}]}, 0x24}}, 0x0) 05:35:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x68000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:51 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:35:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 36) 05:35:51 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:35:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x9}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:35:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 83) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3149.639067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3149.640387] FAULT_INJECTION: forcing a failure. [ 3149.640387] name failslab, interval 1, probability 0, space 0, times 0 [ 3149.643130] CPU: 1 PID: 64500 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3149.644461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3149.646046] Call Trace: [ 3149.646560] dump_stack+0x107/0x167 [ 3149.647261] should_fail.cold+0x5/0xa [ 3149.648008] ? create_object.isra.0+0x3a/0xa20 [ 3149.648882] should_failslab+0x5/0x20 [ 3149.649606] kmem_cache_alloc+0x5b/0x310 [ 3149.650382] create_object.isra.0+0x3a/0xa20 [ 3149.651214] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3149.652191] __kmalloc_track_caller+0x177/0x370 [ 3149.653073] ? match_number+0xaf/0x1d0 [ 3149.653832] kmemdup_nul+0x2d/0xa0 [ 3149.654512] match_number+0xaf/0x1d0 [ 3149.655219] ? match_u64+0x190/0x190 [ 3149.655936] ? __kmalloc_track_caller+0x2c6/0x370 [ 3149.656854] ? memcpy+0x39/0x60 [ 3149.657483] parse_opts.part.0+0x1f3/0x340 [ 3149.658292] ? p9_fd_show_options+0x1c0/0x1c0 [ 3149.659152] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3149.660146] ? trace_hardirqs_on+0x5b/0x180 [ 3149.660972] ? kfree+0xd7/0x340 [ 3149.661607] p9_fd_create+0x98/0x4a0 [ 3149.662321] ? p9_conn_create+0x510/0x510 [ 3149.663105] ? p9_client_create+0x798/0x1230 [ 3149.663943] ? kfree+0xd7/0x340 [ 3149.664586] p9_client_create+0x7ff/0x1230 [ 3149.665397] ? p9_client_flush+0x430/0x430 [ 3149.666202] ? trace_hardirqs_on+0x5b/0x180 [ 3149.667027] ? lockdep_init_map_type+0x2c7/0x780 [ 3149.667941] ? __raw_spin_lock_init+0x36/0x110 [ 3149.668818] v9fs_session_init+0x1dd/0x1680 [ 3149.669637] ? lock_release+0x680/0x680 [ 3149.670406] ? kmem_cache_alloc_trace+0x151/0x320 [ 3149.671317] ? v9fs_show_options+0x690/0x690 [ 3149.672155] ? trace_hardirqs_on+0x5b/0x180 [ 3149.672964] ? kasan_unpoison_shadow+0x33/0x50 [ 3149.673819] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3149.674773] v9fs_mount+0x79/0x8f0 [ 3149.675441] ? v9fs_write_inode+0x60/0x60 [ 3149.676233] legacy_get_tree+0x105/0x220 [ 3149.677001] vfs_get_tree+0x8e/0x300 [ 3149.677698] path_mount+0x1429/0x2120 [ 3149.678426] ? strncpy_from_user+0x9e/0x470 [ 3149.679232] ? finish_automount+0xa90/0xa90 [ 3149.680045] ? getname_flags.part.0+0x1dd/0x4f0 [ 3149.680913] ? _copy_from_user+0xfb/0x1b0 [ 3149.681706] __x64_sys_mount+0x282/0x300 [ 3149.682466] ? copy_mnt_ns+0xa00/0xa00 [ 3149.683198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3149.684184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3149.685154] do_syscall_64+0x33/0x40 [ 3149.685852] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3149.686815] RIP: 0033:0x7fbfa6f6fb19 [ 3149.687518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3149.690970] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3149.692395] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3149.693713] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3149.695039] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3149.696369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3149.697684] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:35:51 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 3149.724817] FAULT_INJECTION: forcing a failure. [ 3149.724817] name failslab, interval 1, probability 0, space 0, times 0 [ 3149.727278] CPU: 0 PID: 64516 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3149.728738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3149.730473] Call Trace: [ 3149.731025] dump_stack+0x107/0x167 [ 3149.731791] should_fail.cold+0x5/0xa [ 3149.732601] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3149.733710] ? create_object.isra.0+0x3a/0xa20 [ 3149.734666] should_failslab+0x5/0x20 [ 3149.735461] kmem_cache_alloc+0x5b/0x310 [ 3149.736322] ? mark_held_locks+0x9e/0xe0 [ 3149.737179] create_object.isra.0+0x3a/0xa20 [ 3149.738087] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3149.738115] kmem_cache_alloc_node+0x169/0x330 [ 3149.739979] __alloc_skb+0x6d/0x5b0 [ 3149.740744] skb_segment+0x9d8/0x3aa0 [ 3149.741540] ? __lock_acquire+0xbb1/0x5b00 [ 3149.742463] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3149.743520] ? lock_acquire+0x197/0x470 [ 3149.744350] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3149.745462] __udp_gso_segment+0x11c6/0x1830 [ 3149.746384] ? __sk_receive_skb+0x830/0x830 [ 3149.747306] udp4_ufo_fragment+0x528/0x720 [ 3149.748208] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3149.749264] inet_gso_segment+0x4fb/0x11a0 [ 3149.750159] skb_mac_gso_segment+0x273/0x570 [ 3149.751083] ? inet_sock_destruct+0x840/0x840 [ 3149.752027] ? skb_network_protocol+0x650/0x650 [ 3149.752993] ? skb_crc32c_csum_help+0x80/0x80 [ 3149.753927] ? lock_acquire+0x197/0x470 [ 3149.754756] ? __dev_queue_xmit+0x1c6/0x2690 [ 3149.755699] __skb_gso_segment+0x32d/0x6d0 [ 3149.756595] ? mark_lock+0xf5/0x2df0 [ 3149.757374] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3149.758475] ? lock_chain_count+0x20/0x20 [ 3149.759344] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3149.760314] __dev_queue_xmit+0x825/0x2690 [ 3149.761213] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3149.762288] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3149.763247] ? mark_held_locks+0x9e/0xe0 [ 3149.764105] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3149.765202] neigh_connected_output+0x382/0x4d0 [ 3149.766191] ip_finish_output2+0x6f1/0x21f0 [ 3149.767106] ? nf_hook_slow+0xfc/0x1e0 [ 3149.767932] ? ip_frag_next+0x9e0/0x9e0 [ 3149.768760] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3149.769814] __ip_finish_output.part.0+0x5f3/0xb50 [ 3149.770849] ? ip_fragment.constprop.0+0x240/0x240 [ 3149.771885] ? netif_rx_ni+0xe7/0x300 [ 3149.772686] ip_mc_output+0x401/0xa30 [ 3149.773491] ip_send_skb+0xdd/0x260 [ 3149.774259] udp_send_skb+0x6da/0x11d0 [ 3149.775083] udp_sendmsg+0x139a/0x2160 [ 3149.775907] ? mark_lock+0xf5/0x2df0 [ 3149.776687] ? ip_frag_init+0x350/0x350 [ 3149.777520] ? lock_chain_count+0x20/0x20 [ 3149.778395] ? udp_setsockopt+0xc0/0xc0 [ 3149.779224] ? mark_lock+0xf5/0x2df0 [ 3149.780012] ? lock_acquire+0x197/0x470 [ 3149.780856] ? lock_chain_count+0x20/0x20 [ 3149.781725] ? mark_lock+0xf5/0x2df0 [ 3149.782503] ? mark_lock+0xf5/0x2df0 [ 3149.783280] ? lock_chain_count+0x20/0x20 [ 3149.784153] ? __lock_acquire+0xbb1/0x5b00 [ 3149.785040] ? lock_chain_count+0x20/0x20 [ 3149.785933] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3149.787049] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3149.787980] ? udp_v6_push_pending_frames+0x360/0x360 [ 3149.789148] ? mark_lock+0xf5/0x2df0 [ 3149.789984] ? lock_acquire+0x197/0x470 [ 3149.790841] ? find_held_lock+0x2c/0x110 [ 3149.791802] ? __might_fault+0xd3/0x180 [ 3149.792795] ? lock_downgrade+0x6d0/0x6d0 [ 3149.793676] ? lock_downgrade+0x6d0/0x6d0 [ 3149.794577] ? sock_has_perm+0x1ea/0x280 [ 3149.795432] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3149.796541] ? _copy_from_user+0xfb/0x1b0 [ 3149.797437] ? __import_iovec+0x458/0x590 [ 3149.798343] ? udp_v6_push_pending_frames+0x360/0x360 [ 3149.799474] inet6_sendmsg+0x105/0x140 [ 3149.800309] ? inet6_compat_ioctl+0x320/0x320 [ 3149.801254] __sock_sendmsg+0xf2/0x190 05:35:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffff000, 0x0) [ 3149.802082] ____sys_sendmsg+0x70d/0x870 [ 3149.803073] ? sock_write_iter+0x3d0/0x3d0 [ 3149.803986] ? do_recvmmsg+0x6d0/0x6d0 [ 3149.804819] ? lock_downgrade+0x6d0/0x6d0 [ 3149.805702] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3149.806819] ___sys_sendmsg+0xf3/0x170 [ 3149.807676] ? sendmsg_copy_msghdr+0x160/0x160 [ 3149.808652] ? __fget_files+0x2cf/0x520 [ 3149.809500] ? lock_downgrade+0x6d0/0x6d0 [ 3149.810371] ? find_held_lock+0x2c/0x110 [ 3149.811252] ? __fget_files+0x2f8/0x520 [ 3149.812135] ? __fget_light+0xea/0x290 [ 3149.812972] __sys_sendmsg+0xe5/0x1b0 [ 3149.813784] ? __sys_sendmsg_sock+0x40/0x40 [ 3149.814702] ? rcu_read_lock_any_held+0x75/0xa0 [ 3149.815739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3149.816853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3149.817941] ? trace_hardirqs_on+0x5b/0x180 [ 3149.818856] do_syscall_64+0x33/0x40 [ 3149.819666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3149.820770] RIP: 0033:0x7f3e899f4b19 [ 3149.821577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3149.825491] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3149.827417] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3149.829208] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3149.830998] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3149.832805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3149.834581] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:35:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x2000000}]}]}, 0x24}}, 0x0) 05:35:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffffdf9, 0x0) 05:35:51 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 05:35:52 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:35:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 37) [ 3150.040246] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:35:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x6c000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:35:52 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x3000000}]}]}, 0x24}}, 0x0) 05:35:52 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 3150.106097] FAULT_INJECTION: forcing a failure. [ 3150.106097] name failslab, interval 1, probability 0, space 0, times 0 [ 3150.107733] CPU: 1 PID: 64936 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3150.108680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3150.109806] Call Trace: [ 3150.110175] dump_stack+0x107/0x167 [ 3150.110675] should_fail.cold+0x5/0xa [ 3150.111205] should_failslab+0x5/0x20 [ 3150.111742] __kmalloc_track_caller+0x79/0x370 [ 3150.112373] ? match_number+0xaf/0x1d0 [ 3150.112904] ? kfree+0xd7/0x340 [ 3150.113369] kmemdup_nul+0x2d/0xa0 [ 3150.113858] match_number+0xaf/0x1d0 [ 3150.114366] ? match_u64+0x190/0x190 [ 3150.114885] ? __kmalloc_track_caller+0x2c6/0x370 [ 3150.115561] ? memcpy+0x39/0x60 [ 3150.116017] parse_opts.part.0+0x1f3/0x340 [ 3150.116591] ? p9_fd_show_options+0x1c0/0x1c0 [ 3150.117216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3150.117930] ? trace_hardirqs_on+0x5b/0x180 [ 3150.118520] ? kfree+0xd7/0x340 [ 3150.118975] p9_fd_create+0x98/0x4a0 [ 3150.119504] ? p9_conn_create+0x510/0x510 [ 3150.120066] ? p9_client_create+0x798/0x1230 [ 3150.120667] ? kfree+0xd7/0x340 [ 3150.121127] p9_client_create+0x7ff/0x1230 [ 3150.121710] ? p9_client_flush+0x430/0x430 [ 3150.122285] ? trace_hardirqs_on+0x5b/0x180 [ 3150.122877] ? lockdep_init_map_type+0x2c7/0x780 [ 3150.123537] ? __raw_spin_lock_init+0x36/0x110 [ 3150.124160] v9fs_session_init+0x1dd/0x1680 [ 3150.124756] ? lock_release+0x680/0x680 [ 3150.125302] ? kmem_cache_alloc_trace+0x151/0x320 [ 3150.125953] ? v9fs_show_options+0x690/0x690 [ 3150.126558] ? trace_hardirqs_on+0x5b/0x180 [ 3150.127147] ? kasan_unpoison_shadow+0x33/0x50 [ 3150.127783] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3150.128479] v9fs_mount+0x79/0x8f0 [ 3150.128961] ? v9fs_write_inode+0x60/0x60 [ 3150.129524] legacy_get_tree+0x105/0x220 [ 3150.130080] vfs_get_tree+0x8e/0x300 [ 3150.130582] path_mount+0x1429/0x2120 [ 3150.131109] ? strncpy_from_user+0x9e/0x470 [ 3150.131708] ? finish_automount+0xa90/0xa90 [ 3150.132293] ? getname_flags.part.0+0x1dd/0x4f0 [ 3150.132925] ? _copy_from_user+0xfb/0x1b0 [ 3150.133488] __x64_sys_mount+0x282/0x300 [ 3150.134031] ? copy_mnt_ns+0xa00/0xa00 [ 3150.134560] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3150.135272] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3150.135982] do_syscall_64+0x33/0x40 [ 3150.136486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3150.137180] RIP: 0033:0x7fbfa6f6fb19 [ 3150.137683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3150.140162] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3150.141192] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3150.142156] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3150.143112] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3150.144085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3150.145041] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3150.147172] 9pnet: Insufficient options for proto=fd 05:36:08 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 05:36:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x74000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:36:08 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:36:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 84) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3166.369728] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3166.375698] FAULT_INJECTION: forcing a failure. [ 3166.375698] name failslab, interval 1, probability 0, space 0, times 0 [ 3166.377001] CPU: 0 PID: 65062 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3166.377798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3166.378746] Call Trace: [ 3166.379052] dump_stack+0x107/0x167 [ 3166.379477] should_fail.cold+0x5/0xa [ 3166.379921] ? ___slab_alloc+0x360/0x700 [ 3166.380398] ? create_object.isra.0+0x3a/0xa20 [ 3166.380926] should_failslab+0x5/0x20 [ 3166.381357] kmem_cache_alloc+0x5b/0x310 [ 3166.381827] create_object.isra.0+0x3a/0xa20 [ 3166.382334] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3166.382916] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3166.383500] ? skb_segment+0x9d8/0x3aa0 [ 3166.383963] __alloc_skb+0xb1/0x5b0 [ 3166.384402] skb_segment+0x9d8/0x3aa0 [ 3166.384853] ? __lock_acquire+0xbb1/0x5b00 [ 3166.385365] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3166.385930] ? lock_acquire+0x197/0x470 [ 3166.386389] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3166.386992] __udp_gso_segment+0x11c6/0x1830 [ 3166.387490] ? __sk_receive_skb+0x830/0x830 [ 3166.387984] udp4_ufo_fragment+0x528/0x720 [ 3166.388481] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3166.389061] inet_gso_segment+0x4fb/0x11a0 [ 3166.389558] skb_mac_gso_segment+0x273/0x570 [ 3166.390060] ? inet_sock_destruct+0x840/0x840 [ 3166.390582] ? skb_network_protocol+0x650/0x650 [ 3166.391122] ? skb_crc32c_csum_help+0x80/0x80 [ 3166.391632] ? lock_acquire+0x197/0x470 [ 3166.392097] ? __dev_queue_xmit+0x1c6/0x2690 [ 3166.392602] __skb_gso_segment+0x32d/0x6d0 [ 3166.393085] ? mark_lock+0xf5/0x2df0 [ 3166.393515] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3166.394126] ? lock_chain_count+0x20/0x20 [ 3166.394600] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3166.395122] __dev_queue_xmit+0x825/0x2690 [ 3166.395614] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3166.396213] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3166.396753] ? mark_held_locks+0x9e/0xe0 [ 3166.397228] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 05:36:08 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) [ 3166.397836] neigh_connected_output+0x382/0x4d0 [ 3166.398532] ip_finish_output2+0x6f1/0x21f0 [ 3166.399029] ? nf_hook_slow+0xfc/0x1e0 [ 3166.399469] ? ip_frag_next+0x9e0/0x9e0 [ 3166.399920] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3166.400500] __ip_finish_output.part.0+0x5f3/0xb50 [ 3166.401063] ? ip_fragment.constprop.0+0x240/0x240 [ 3166.401621] ? netif_rx_ni+0xe7/0x300 [ 3166.402059] ip_mc_output+0x401/0xa30 [ 3166.402498] ip_send_skb+0xdd/0x260 [ 3166.402918] udp_send_skb+0x6da/0x11d0 [ 3166.403363] udp_sendmsg+0x139a/0x2160 [ 3166.403806] ? mark_lock+0xf5/0x2df0 [ 3166.404237] ? ip_frag_init+0x350/0x350 [ 3166.404690] ? lock_chain_count+0x20/0x20 [ 3166.405163] ? udp_setsockopt+0xc0/0xc0 [ 3166.405620] ? mark_lock+0xf5/0x2df0 [ 3166.406045] ? __lockdep_reset_lock+0x180/0x180 [ 3166.406579] ? lock_chain_count+0x20/0x20 [ 3166.407054] ? mark_lock+0xf5/0x2df0 [ 3166.407486] ? mark_lock+0xf5/0x2df0 [ 3166.407911] ? lock_chain_count+0x20/0x20 [ 3166.408382] ? __lock_acquire+0xbb1/0x5b00 [ 3166.408869] ? lock_chain_count+0x20/0x20 [ 3166.409351] ? perf_trace_lock+0xac/0x490 [ 3166.409826] ? __lockdep_reset_lock+0x180/0x180 [ 3166.410368] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3166.410843] ? udp_v6_push_pending_frames+0x360/0x360 [ 3166.411435] ? mark_lock+0xf5/0x2df0 [ 3166.411867] ? lock_acquire+0x197/0x470 [ 3166.412329] ? find_held_lock+0x2c/0x110 [ 3166.412802] ? __might_fault+0xd3/0x180 [ 3166.413253] ? lock_downgrade+0x6d0/0x6d0 [ 3166.413731] ? lock_downgrade+0x6d0/0x6d0 [ 3166.414204] ? sock_has_perm+0x1ea/0x280 [ 3166.414670] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3166.415262] ? _copy_from_user+0xfb/0x1b0 [ 3166.415750] ? __import_iovec+0x458/0x590 [ 3166.416232] ? udp_v6_push_pending_frames+0x360/0x360 [ 3166.416827] inet6_sendmsg+0x105/0x140 [ 3166.417269] ? inet6_compat_ioctl+0x320/0x320 [ 3166.417782] __sock_sendmsg+0xf2/0x190 [ 3166.418230] ____sys_sendmsg+0x70d/0x870 [ 3166.418698] ? sock_write_iter+0x3d0/0x3d0 [ 3166.419177] ? do_recvmmsg+0x6d0/0x6d0 [ 3166.419626] ? lock_downgrade+0x6d0/0x6d0 [ 3166.420118] ? __lockdep_reset_lock+0x180/0x180 [ 3166.420653] ___sys_sendmsg+0xf3/0x170 [ 3166.421102] ? sendmsg_copy_msghdr+0x160/0x160 [ 3166.421629] ? __fget_files+0x2cf/0x520 [ 3166.422086] ? lock_downgrade+0x6d0/0x6d0 [ 3166.422559] ? find_held_lock+0x2c/0x110 [ 3166.423032] ? __fget_files+0x2f8/0x520 [ 3166.423494] ? __fget_light+0xea/0x290 [ 3166.423949] __sys_sendmsg+0xe5/0x1b0 [ 3166.424390] ? __sys_sendmsg_sock+0x40/0x40 [ 3166.424873] ? rcu_read_lock_any_held+0x75/0xa0 [ 3166.425420] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3166.426017] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3166.426602] ? trace_hardirqs_on+0x5b/0x180 [ 3166.427096] do_syscall_64+0x33/0x40 [ 3166.427523] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3166.428114] RIP: 0033:0x7f3e899f4b19 [ 3166.428538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3166.430625] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3166.431491] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3166.432314] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3166.433127] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3166.433940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3166.434758] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:36:08 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x4000000}]}]}, 0x24}}, 0x0) 05:36:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 38) 05:36:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffff8c, 0x0) [ 3166.453692] FAULT_INJECTION: forcing a failure. [ 3166.453692] name failslab, interval 1, probability 0, space 0, times 0 [ 3166.454974] CPU: 0 PID: 65068 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3166.455761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3166.456722] Call Trace: [ 3166.457023] dump_stack+0x107/0x167 [ 3166.457427] should_fail.cold+0x5/0xa [ 3166.457853] ? create_object.isra.0+0x3a/0xa20 [ 3166.458369] should_failslab+0x5/0x20 [ 3166.458799] kmem_cache_alloc+0x5b/0x310 [ 3166.459257] create_object.isra.0+0x3a/0xa20 [ 3166.459751] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3166.460344] __kmalloc_track_caller+0x177/0x370 [ 3166.460868] ? match_number+0xaf/0x1d0 [ 3166.461313] kmemdup_nul+0x2d/0xa0 [ 3166.461716] match_number+0xaf/0x1d0 [ 3166.462131] ? match_u64+0x190/0x190 [ 3166.462551] ? __kmalloc_track_caller+0x2c6/0x370 [ 3166.463088] ? memcpy+0x39/0x60 [ 3166.463460] parse_opts.part.0+0x1f3/0x340 [ 3166.463931] ? p9_fd_show_options+0x1c0/0x1c0 [ 3166.464453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3166.465050] ? trace_hardirqs_on+0x5b/0x180 [ 3166.465539] ? kfree+0xd7/0x340 [ 3166.465913] p9_fd_create+0x98/0x4a0 [ 3166.466336] ? p9_conn_create+0x510/0x510 [ 3166.466803] ? p9_client_create+0x798/0x1230 [ 3166.467304] ? kfree+0xd7/0x340 [ 3166.467687] p9_client_create+0x7ff/0x1230 [ 3166.468175] ? p9_client_flush+0x430/0x430 [ 3166.468653] ? trace_hardirqs_on+0x5b/0x180 [ 3166.469141] ? lockdep_init_map_type+0x2c7/0x780 [ 3166.469667] ? __raw_spin_lock_init+0x36/0x110 [ 3166.470193] v9fs_session_init+0x1dd/0x1680 [ 3166.470680] ? lock_release+0x680/0x680 [ 3166.471134] ? kmem_cache_alloc_trace+0x151/0x320 [ 3166.471679] ? v9fs_show_options+0x690/0x690 [ 3166.472191] ? trace_hardirqs_on+0x5b/0x180 [ 3166.472683] ? kasan_unpoison_shadow+0x33/0x50 [ 3166.473203] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3166.473775] v9fs_mount+0x79/0x8f0 [ 3166.474178] ? v9fs_write_inode+0x60/0x60 [ 3166.474660] legacy_get_tree+0x105/0x220 [ 3166.475122] vfs_get_tree+0x8e/0x300 [ 3166.475544] path_mount+0x1429/0x2120 [ 3166.475983] ? strncpy_from_user+0x9e/0x470 [ 3166.476477] ? finish_automount+0xa90/0xa90 [ 3166.476971] ? getname_flags.part.0+0x1dd/0x4f0 [ 3166.477493] ? _copy_from_user+0xfb/0x1b0 [ 3166.477954] __x64_sys_mount+0x282/0x300 [ 3166.478416] ? copy_mnt_ns+0xa00/0xa00 [ 3166.478851] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3166.479448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3166.480028] do_syscall_64+0x33/0x40 [ 3166.480468] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3166.481049] RIP: 0033:0x7fbfa6f6fb19 [ 3166.481471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3166.483542] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3166.484444] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3166.485250] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3166.486046] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3166.486834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3166.487638] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3166.495827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:36:08 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0xf}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3166.650486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3166.673643] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3183.026508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3183.054525] FAULT_INJECTION: forcing a failure. [ 3183.054525] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.056424] CPU: 1 PID: 65293 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3183.057474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3183.058324] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=65306 comm=syz-executor.0 [ 3183.058719] Call Trace: [ 3183.058740] dump_stack+0x107/0x167 [ 3183.058756] should_fail.cold+0x5/0xa [ 3183.058784] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 3183.062006] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=65306 comm=syz-executor.0 [ 3183.062337] ? __alloc_skb+0x6d/0x5b0 [ 3183.066935] should_failslab+0x5/0x20 [ 3183.067515] kmem_cache_alloc_node+0x55/0x330 [ 3183.068198] __alloc_skb+0x6d/0x5b0 [ 3183.068769] skb_segment+0x9d8/0x3aa0 [ 3183.069348] ? __lock_acquire+0xbb1/0x5b00 [ 3183.070031] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3183.070783] ? lock_acquire+0x197/0x470 [ 3183.071388] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3183.072191] __udp_gso_segment+0x11c6/0x1830 [ 3183.072865] ? __sk_receive_skb+0x830/0x830 [ 3183.073527] udp4_ufo_fragment+0x528/0x720 [ 3183.074172] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3183.074927] inet_gso_segment+0x4fb/0x11a0 [ 3183.075579] skb_mac_gso_segment+0x273/0x570 [ 3183.076239] ? inet_sock_destruct+0x840/0x840 [ 3183.076917] ? skb_network_protocol+0x650/0x650 [ 3183.077610] ? skb_crc32c_csum_help+0x80/0x80 [ 3183.078280] ? lock_acquire+0x197/0x470 [ 3183.078873] ? __dev_queue_xmit+0x1c6/0x2690 [ 3183.079539] __skb_gso_segment+0x32d/0x6d0 [ 3183.080173] ? mark_lock+0xf5/0x2df0 [ 3183.080741] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3183.081528] ? lock_chain_count+0x20/0x20 [ 3183.082147] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3183.082837] __dev_queue_xmit+0x825/0x2690 [ 3183.083483] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3183.084254] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3183.084957] ? mark_held_locks+0x9e/0xe0 [ 3183.085571] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3183.086365] neigh_connected_output+0x382/0x4d0 [ 3183.087079] ip_finish_output2+0x6f1/0x21f0 [ 3183.087735] ? nf_hook_slow+0xfc/0x1e0 [ 3183.088321] ? ip_frag_next+0x9e0/0x9e0 [ 3183.088932] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3183.089692] __ip_finish_output.part.0+0x5f3/0xb50 [ 3183.090432] ? ip_fragment.constprop.0+0x240/0x240 [ 3183.091169] ? netif_rx_ni+0xe7/0x300 [ 3183.091754] ip_mc_output+0x401/0xa30 [ 3183.092333] ip_send_skb+0xdd/0x260 [ 3183.092893] udp_send_skb+0x6da/0x11d0 [ 3183.093493] udp_sendmsg+0x139a/0x2160 [ 3183.094077] ? mark_lock+0xf5/0x2df0 [ 3183.094641] ? ip_frag_init+0x350/0x350 [ 3183.095239] ? lock_chain_count+0x20/0x20 [ 3183.095865] ? mark_lock+0xf5/0x2df0 [ 3183.096425] ? udp_setsockopt+0xc0/0xc0 [ 3183.097027] ? mark_lock+0xf5/0x2df0 [ 3183.097582] ? lock_chain_count+0x20/0x20 [ 3183.098198] ? lock_chain_count+0x20/0x20 [ 3183.098815] ? lock_chain_count+0x20/0x20 [ 3183.099434] ? mark_lock+0xf5/0x2df0 [ 3183.099992] ? mark_lock+0xf5/0x2df0 [ 3183.100549] ? lock_chain_count+0x20/0x20 [ 3183.101183] ? lock_chain_count+0x20/0x20 [ 3183.101811] ? __lock_acquire+0xbb1/0x5b00 [ 3183.102466] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3183.103088] ? udp_v6_push_pending_frames+0x360/0x360 [ 3183.103863] ? mark_lock+0xf5/0x2df0 [ 3183.104423] ? lock_acquire+0x197/0x470 [ 3183.105022] ? find_held_lock+0x2c/0x110 [ 3183.105633] ? __might_fault+0xd3/0x180 [ 3183.106225] ? lock_downgrade+0x6d0/0x6d0 [ 3183.106843] ? lock_downgrade+0x6d0/0x6d0 [ 3183.107465] ? sock_has_perm+0x1ea/0x280 [ 3183.108069] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3183.108846] ? _copy_from_user+0xfb/0x1b0 [ 3183.109479] ? __import_iovec+0x458/0x590 [ 3183.110097] ? udp_v6_push_pending_frames+0x360/0x360 [ 3183.110878] inet6_sendmsg+0x105/0x140 [ 3183.111460] ? inet6_compat_ioctl+0x320/0x320 [ 3183.112127] __sock_sendmsg+0xf2/0x190 [ 3183.112723] ____sys_sendmsg+0x70d/0x870 [ 3183.113333] ? sock_write_iter+0x3d0/0x3d0 [ 3183.113959] ? do_recvmmsg+0x6d0/0x6d0 [ 3183.114545] ? mark_lock+0xf5/0x2df0 [ 3183.115108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3183.115892] ___sys_sendmsg+0xf3/0x170 [ 3183.116474] ? sendmsg_copy_msghdr+0x160/0x160 [ 3183.117167] ? __fget_files+0x2cf/0x520 [ 3183.117761] ? lock_downgrade+0x6d0/0x6d0 [ 3183.118374] ? find_held_lock+0x2c/0x110 [ 3183.118986] ? __fget_files+0x2f8/0x520 [ 3183.119584] ? __fget_light+0xea/0x290 [ 3183.120168] __sys_sendmsg+0xe5/0x1b0 [ 3183.120738] ? __sys_sendmsg_sock+0x40/0x40 [ 3183.121375] ? rcu_read_lock_any_held+0x75/0xa0 [ 3183.122081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3183.122855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3183.123612] ? trace_hardirqs_on+0x5b/0x180 [ 3183.124251] do_syscall_64+0x33/0x40 [ 3183.124807] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3183.125562] RIP: 0033:0x7f3e899f4b19 [ 3183.126109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.128817] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3183.129985] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3183.131077] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3183.132167] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3183.133262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3183.134351] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:36:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x48}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:36:25 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x5000000}]}]}, 0x24}}, 0x0) 05:36:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 85) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:36:25 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:36:25 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 05:36:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffffff6, 0x0) 05:36:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 39) 05:36:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x7a000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3183.167150] FAULT_INJECTION: forcing a failure. [ 3183.167150] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.169858] CPU: 0 PID: 65336 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3183.171489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3183.173445] Call Trace: [ 3183.174078] dump_stack+0x107/0x167 [ 3183.174942] should_fail.cold+0x5/0xa [ 3183.175851] ? p9_fd_create+0x161/0x4a0 [ 3183.176814] should_failslab+0x5/0x20 [ 3183.177716] kmem_cache_alloc_trace+0x55/0x320 [ 3183.178804] p9_fd_create+0x161/0x4a0 [ 3183.179708] ? p9_conn_create+0x510/0x510 [ 3183.180700] ? p9_client_create+0x798/0x1230 [ 3183.181742] ? kfree+0xd7/0x340 [ 3183.182536] p9_client_create+0x7ff/0x1230 [ 3183.183545] ? p9_client_flush+0x430/0x430 [ 3183.184548] ? trace_hardirqs_on+0x5b/0x180 [ 3183.185589] ? lockdep_init_map_type+0x2c7/0x780 [ 3183.186707] ? __raw_spin_lock_init+0x36/0x110 [ 3183.187792] v9fs_session_init+0x1dd/0x1680 [ 3183.188831] ? lock_release+0x680/0x680 [ 3183.189785] ? kmem_cache_alloc_trace+0x151/0x320 [ 3183.190925] ? v9fs_show_options+0x690/0x690 [ 3183.191981] ? trace_hardirqs_on+0x5b/0x180 [ 3183.193013] ? kasan_unpoison_shadow+0x33/0x50 [ 3183.194089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3183.195293] v9fs_mount+0x79/0x8f0 [ 3183.196141] ? v9fs_write_inode+0x60/0x60 [ 3183.197135] legacy_get_tree+0x105/0x220 [ 3183.198100] vfs_get_tree+0x8e/0x300 [ 3183.198983] path_mount+0x1429/0x2120 [ 3183.199893] ? strncpy_from_user+0x9e/0x470 [ 3183.200933] ? finish_automount+0xa90/0xa90 [ 3183.201956] ? getname_flags.part.0+0x1dd/0x4f0 [ 3183.203056] ? _copy_from_user+0xfb/0x1b0 [ 3183.204047] __x64_sys_mount+0x282/0x300 [ 3183.205021] ? copy_mnt_ns+0xa00/0xa00 [ 3183.205949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3183.207189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3183.208410] do_syscall_64+0x33/0x40 [ 3183.209300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3183.210506] RIP: 0033:0x7fbfa6f6fb19 [ 3183.211388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.215705] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3183.217514] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3183.219188] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3183.220883] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3183.222558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3183.224235] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:36:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xedc000000000, 0x0) 05:36:25 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x6000000}]}]}, 0x24}}, 0x0) 05:36:25 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) [ 3183.331152] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=65539 comm=syz-executor.0 [ 3183.334221] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=65539 comm=syz-executor.0 05:36:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000000000000, 0x0) 05:36:25 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:36:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x4c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:36:25 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x7000000}]}]}, 0x24}}, 0x0) 05:36:25 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) [ 3183.462276] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:36:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x84400000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3183.490503] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=65738 comm=syz-executor.0 [ 3183.493571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=65738 comm=syz-executor.0 05:36:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 40) [ 3183.528264] FAULT_INJECTION: forcing a failure. [ 3183.528264] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.529866] CPU: 1 PID: 65800 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3183.530761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3183.531813] Call Trace: [ 3183.532157] dump_stack+0x107/0x167 [ 3183.532626] should_fail.cold+0x5/0xa [ 3183.533134] ? create_object.isra.0+0x3a/0xa20 [ 3183.533728] should_failslab+0x5/0x20 [ 3183.534195] kmem_cache_alloc+0x5b/0x310 [ 3183.534761] ? p9_fd_show_options+0x1c0/0x1c0 [ 3183.535411] create_object.isra.0+0x3a/0xa20 [ 3183.535958] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3183.536650] kmem_cache_alloc_trace+0x151/0x320 [ 3183.537262] p9_fd_create+0x161/0x4a0 [ 3183.537715] ? p9_conn_create+0x510/0x510 [ 3183.538200] ? p9_client_create+0x798/0x1230 [ 3183.538710] ? kfree+0xd7/0x340 [ 3183.539107] p9_client_create+0x7ff/0x1230 [ 3183.539601] ? p9_client_flush+0x430/0x430 [ 3183.540098] ? trace_hardirqs_on+0x5b/0x180 [ 3183.540590] ? lockdep_init_map_type+0x2c7/0x780 [ 3183.541162] ? __raw_spin_lock_init+0x36/0x110 [ 3183.541697] v9fs_session_init+0x1dd/0x1680 [ 3183.542193] ? lock_release+0x680/0x680 [ 3183.542657] ? kmem_cache_alloc_trace+0x151/0x320 [ 3183.543207] ? v9fs_show_options+0x690/0x690 [ 3183.543683] ? trace_hardirqs_on+0x5b/0x180 [ 3183.544165] ? kasan_unpoison_shadow+0x33/0x50 [ 3183.544699] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3183.545279] v9fs_mount+0x79/0x8f0 [ 3183.545663] ? v9fs_write_inode+0x60/0x60 [ 3183.546144] legacy_get_tree+0x105/0x220 [ 3183.546579] vfs_get_tree+0x8e/0x300 [ 3183.547003] path_mount+0x1429/0x2120 [ 3183.547415] ? strncpy_from_user+0x9e/0x470 [ 3183.547915] ? finish_automount+0xa90/0xa90 [ 3183.548375] ? getname_flags.part.0+0x1dd/0x4f0 [ 3183.548937] ? _copy_from_user+0xfb/0x1b0 [ 3183.549393] __x64_sys_mount+0x282/0x300 [ 3183.549858] ? copy_mnt_ns+0xa00/0xa00 [ 3183.550272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3183.550874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3183.551464] do_syscall_64+0x33/0x40 [ 3183.551885] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3183.552494] RIP: 0033:0x7fbfa6f6fb19 [ 3183.552927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.554898] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3183.555781] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3183.556551] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3183.557323] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3183.558098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3183.558858] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:36:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 86) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:36:25 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:36:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf0ffffffffffff, 0x0) 05:36:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8cffffff, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3183.648196] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=65851 comm=syz-executor.0 [ 3183.650033] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=65851 comm=syz-executor.0 05:36:25 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x8000000}]}]}, 0x24}}, 0x0) [ 3183.729299] FAULT_INJECTION: forcing a failure. [ 3183.729299] name failslab, interval 1, probability 0, space 0, times 0 [ 3183.730881] CPU: 1 PID: 65916 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3183.731820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3183.732974] Call Trace: [ 3183.733344] dump_stack+0x107/0x167 [ 3183.733848] should_fail.cold+0x5/0xa [ 3183.734383] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3183.735107] ? create_object.isra.0+0x3a/0xa20 [ 3183.735740] should_failslab+0x5/0x20 [ 3183.736258] kmem_cache_alloc+0x5b/0x310 [ 3183.736827] ? mark_held_locks+0x9e/0xe0 [ 3183.737392] create_object.isra.0+0x3a/0xa20 [ 3183.737999] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3183.738698] kmem_cache_alloc_node+0x169/0x330 [ 3183.739329] __alloc_skb+0x6d/0x5b0 [ 3183.739842] skb_segment+0x9d8/0x3aa0 [ 3183.740367] ? __lock_acquire+0xbb1/0x5b00 [ 3183.741011] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3183.741690] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3183.742423] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3183.743175] ? trace_hardirqs_on+0x5b/0x180 [ 3183.743789] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3183.744555] __udp_gso_segment+0x11c6/0x1830 [ 3183.745158] ? __sk_receive_skb+0x830/0x830 [ 3183.745749] udp4_ufo_fragment+0x528/0x720 [ 3183.746328] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3183.747021] inet_gso_segment+0x4fb/0x11a0 [ 3183.747611] skb_mac_gso_segment+0x273/0x570 [ 3183.748219] ? inet_sock_destruct+0x840/0x840 [ 3183.748852] ? skb_network_protocol+0x650/0x650 [ 3183.749499] ? skb_crc32c_csum_help+0x80/0x80 [ 3183.750269] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3183.751032] __skb_gso_segment+0x32d/0x6d0 [ 3183.751651] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3183.752400] ? __dev_queue_xmit+0x446/0x2690 [ 3183.753040] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3183.753690] __dev_queue_xmit+0x825/0x2690 [ 3183.754296] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3183.755017] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3183.755672] ? mark_held_locks+0x9e/0xe0 [ 3183.756253] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3183.757012] neigh_connected_output+0x382/0x4d0 [ 3183.757688] ip_finish_output2+0x6f1/0x21f0 [ 3183.758312] ? nf_hook_slow+0xfc/0x1e0 [ 3183.758868] ? ip_frag_next+0x9e0/0x9e0 [ 3183.759433] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3183.760138] __ip_finish_output.part.0+0x5f3/0xb50 [ 3183.760831] ? ip_fragment.constprop.0+0x240/0x240 [ 3183.761507] ? ip_mc_output+0x1f9/0xa30 [ 3183.762064] ip_mc_output+0x401/0xa30 [ 3183.762606] ip_send_skb+0xdd/0x260 [ 3183.763135] udp_send_skb+0x6da/0x11d0 [ 3183.763712] udp_sendmsg+0x139a/0x2160 [ 3183.764275] ? ip_frag_init+0x350/0x350 [ 3183.764850] ? lock_chain_count+0x20/0x20 [ 3183.765434] ? udp_setsockopt+0xc0/0xc0 [ 3183.766006] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3183.766763] ? lock_chain_count+0x20/0x20 [ 3183.767354] ? mark_lock+0xf5/0x2df0 [ 3183.767884] ? mark_lock+0xf5/0x2df0 [ 3183.768418] ? lock_chain_count+0x20/0x20 [ 3183.769032] ? lock_chain_count+0x20/0x20 [ 3183.769646] ? mark_lock+0xf5/0x2df0 [ 3183.770182] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3183.770773] ? udp_v6_push_pending_frames+0x360/0x360 [ 3183.771504] ? lock_downgrade+0x6d0/0x6d0 [ 3183.772102] ? lock_acquire+0x197/0x470 [ 3183.772675] ? find_held_lock+0x2c/0x110 [ 3183.773286] ? __might_fault+0xd3/0x180 [ 3183.773843] ? lock_downgrade+0x6d0/0x6d0 [ 3183.774671] ? lock_downgrade+0x6d0/0x6d0 [ 3183.776031] ? sock_has_perm+0x1ea/0x280 [ 3183.776564] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3183.777245] ? _copy_from_user+0xfb/0x1b0 [ 3183.777789] ? __import_iovec+0x458/0x590 [ 3183.778345] ? udp_v6_push_pending_frames+0x360/0x360 [ 3183.779005] inet6_sendmsg+0x105/0x140 [ 3183.779512] ? inet6_compat_ioctl+0x320/0x320 [ 3183.780092] __sock_sendmsg+0xf2/0x190 [ 3183.780597] ____sys_sendmsg+0x70d/0x870 [ 3183.781178] ? sock_write_iter+0x3d0/0x3d0 [ 3183.781751] ? do_recvmmsg+0x6d0/0x6d0 [ 3183.782315] ___sys_sendmsg+0xf3/0x170 [ 3183.782852] ? sendmsg_copy_msghdr+0x160/0x160 [ 3183.783496] ? __fget_files+0x2cf/0x520 [ 3183.784046] ? lock_downgrade+0x6d0/0x6d0 [ 3183.784622] ? clockevents_program_event+0x14b/0x360 [ 3183.785287] ? __fget_files+0x2f8/0x520 [ 3183.785763] ? __fget_light+0xea/0x290 [ 3183.786339] __sys_sendmsg+0xe5/0x1b0 [ 3183.786796] ? __sys_sendmsg_sock+0x40/0x40 [ 3183.787328] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3183.787960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3183.788568] ? trace_hardirqs_on+0x5b/0x180 [ 3183.789119] do_syscall_64+0x33/0x40 [ 3183.789593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3183.790231] RIP: 0033:0x7f3e899f4b19 [ 3183.790695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3183.792874] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3183.793761] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3183.794616] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3183.795436] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3183.796227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3183.797054] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3207.441271] FAULT_INJECTION: forcing a failure. [ 3207.441271] name failslab, interval 1, probability 0, space 0, times 0 [ 3207.442646] CPU: 1 PID: 66077 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3207.443450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3207.444420] Call Trace: [ 3207.444730] dump_stack+0x107/0x167 [ 3207.445154] should_fail.cold+0x5/0xa [ 3207.445608] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3207.446216] ? create_object.isra.0+0x3a/0xa20 [ 3207.446747] should_failslab+0x5/0x20 [ 3207.447192] kmem_cache_alloc+0x5b/0x310 [ 3207.447667] ? mark_held_locks+0x9e/0xe0 [ 3207.448139] create_object.isra.0+0x3a/0xa20 [ 3207.448646] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3207.449238] kmem_cache_alloc_node+0x169/0x330 [ 3207.449782] __alloc_skb+0x6d/0x5b0 [ 3207.450211] skb_segment+0x9d8/0x3aa0 [ 3207.450653] ? __lock_acquire+0xbb1/0x5b00 [ 3207.451165] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3207.451741] ? lock_acquire+0x197/0x470 [ 3207.452201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.452819] __udp_gso_segment+0x11c6/0x1830 [ 3207.453328] ? __sk_receive_skb+0x830/0x830 [ 3207.453839] udp4_ufo_fragment+0x528/0x720 [ 3207.454330] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3207.454888] inet_gso_segment+0x4fb/0x11a0 [ 3207.455367] skb_mac_gso_segment+0x273/0x570 [ 3207.455853] ? inet_sock_destruct+0x840/0x840 [ 3207.456352] ? skb_network_protocol+0x650/0x650 [ 3207.456865] ? skb_crc32c_csum_help+0x80/0x80 [ 3207.457362] ? lock_acquire+0x197/0x470 [ 3207.457807] ? __dev_queue_xmit+0x1c6/0x2690 [ 3207.458302] __skb_gso_segment+0x32d/0x6d0 [ 3207.458772] ? mark_lock+0xf5/0x2df0 [ 3207.459193] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3207.459773] ? lock_chain_count+0x20/0x20 [ 3207.460238] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3207.460748] __dev_queue_xmit+0x825/0x2690 [ 3207.461225] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3207.461803] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3207.462319] ? mark_held_locks+0x9e/0xe0 [ 3207.462775] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3207.463361] neigh_connected_output+0x382/0x4d0 [ 3207.463886] ip_finish_output2+0x6f1/0x21f0 [ 3207.464368] ? nf_hook_slow+0xfc/0x1e0 [ 3207.464800] ? ip_frag_next+0x9e0/0x9e0 [ 3207.465244] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3207.465806] __ip_finish_output.part.0+0x5f3/0xb50 [ 3207.466351] ? ip_fragment.constprop.0+0x240/0x240 [ 3207.466899] ? netif_rx_ni+0xe7/0x300 [ 3207.467197] FAULT_INJECTION: forcing a failure. [ 3207.467197] name failslab, interval 1, probability 0, space 0, times 0 [ 3207.467331] ip_mc_output+0x401/0xa30 [ 3207.470522] ip_send_skb+0xdd/0x260 [ 3207.470939] udp_send_skb+0x6da/0x11d0 [ 3207.471384] udp_sendmsg+0x139a/0x2160 [ 3207.471823] ? mark_lock+0xf5/0x2df0 [ 3207.472246] ? ip_frag_init+0x350/0x350 [ 3207.472695] ? lock_chain_count+0x20/0x20 [ 3207.473159] ? udp_setsockopt+0xc0/0xc0 [ 3207.473616] ? mark_lock+0xf5/0x2df0 [ 3207.474032] ? lock_acquire+0x197/0x470 [ 3207.474483] ? lock_chain_count+0x20/0x20 [ 3207.474944] ? mark_lock+0xf5/0x2df0 [ 3207.475369] ? mark_lock+0xf5/0x2df0 [ 3207.475788] ? lock_chain_count+0x20/0x20 [ 3207.476253] ? __lock_acquire+0xbb1/0x5b00 [ 3207.476732] ? lock_chain_count+0x20/0x20 [ 3207.477209] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.477817] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3207.478286] ? udp_v6_push_pending_frames+0x360/0x360 [ 3207.478869] ? mark_lock+0xf5/0x2df0 [ 3207.479289] ? lock_acquire+0x197/0x470 [ 3207.479740] ? find_held_lock+0x2c/0x110 [ 3207.480193] ? __might_fault+0xd3/0x180 [ 3207.480644] ? lock_downgrade+0x6d0/0x6d0 [ 3207.481112] ? lock_downgrade+0x6d0/0x6d0 [ 3207.481587] ? sock_has_perm+0x1ea/0x280 [ 3207.482045] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3207.482631] ? _copy_from_user+0xfb/0x1b0 [ 3207.483105] ? __import_iovec+0x458/0x590 [ 3207.483573] ? udp_v6_push_pending_frames+0x360/0x360 [ 3207.484159] inet6_sendmsg+0x105/0x140 [ 3207.484595] ? inet6_compat_ioctl+0x320/0x320 [ 3207.485104] __sock_sendmsg+0xf2/0x190 [ 3207.485551] ____sys_sendmsg+0x70d/0x870 [ 3207.486003] ? sock_write_iter+0x3d0/0x3d0 [ 3207.486481] ? do_recvmmsg+0x6d0/0x6d0 [ 3207.486917] ? lock_downgrade+0x6d0/0x6d0 [ 3207.487386] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.487971] ___sys_sendmsg+0xf3/0x170 [ 3207.488416] ? sendmsg_copy_msghdr+0x160/0x160 [ 3207.488927] ? __fget_files+0x2cf/0x520 [ 3207.489377] ? lock_downgrade+0x6d0/0x6d0 [ 3207.489844] ? find_held_lock+0x2c/0x110 [ 3207.490300] ? __fget_files+0x2f8/0x520 [ 3207.490747] ? __fget_light+0xea/0x290 [ 3207.491184] __sys_sendmsg+0xe5/0x1b0 [ 3207.491608] ? __sys_sendmsg_sock+0x40/0x40 [ 3207.492087] ? rcu_read_lock_any_held+0x75/0xa0 [ 3207.492622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.493209] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3207.493796] ? trace_hardirqs_on+0x5b/0x180 [ 3207.494287] do_syscall_64+0x33/0x40 [ 3207.494710] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3207.495283] RIP: 0033:0x7f3e899f4b19 [ 3207.495708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3207.497783] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3207.498643] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3207.499448] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3207.500249] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3207.501049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3207.501862] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3207.502698] CPU: 0 PID: 66079 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3207.504477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3207.506589] Call Trace: [ 3207.507275] dump_stack+0x107/0x167 [ 3207.508205] should_fail.cold+0x5/0xa [ 3207.509194] should_failslab+0x5/0x20 [ 3207.510188] __kmalloc_track_caller+0x79/0x370 [ 3207.511351] ? match_number+0xaf/0x1d0 [ 3207.512343] ? kfree+0xd7/0x340 [ 3207.513192] kmemdup_nul+0x2d/0xa0 [ 3207.514119] match_number+0xaf/0x1d0 [ 3207.514955] ? match_u64+0x190/0x190 [ 3207.515858] ? __kmalloc_track_caller+0x2c6/0x370 [ 3207.516968] ? memcpy+0x39/0x60 [ 3207.517731] parse_opts.part.0+0x1f3/0x340 [ 3207.518669] ? p9_fd_show_options+0x1c0/0x1c0 [ 3207.519653] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.520812] ? trace_hardirqs_on+0x5b/0x180 [ 3207.521775] ? kfree+0xd7/0x340 [ 3207.522529] p9_fd_create+0x98/0x4a0 [ 3207.523370] ? p9_conn_create+0x510/0x510 [ 3207.524516] ? p9_client_create+0x798/0x1230 [ 3207.525500] ? kfree+0xd7/0x340 [ 3207.526240] p9_client_create+0x7ff/0x1230 [ 3207.527182] ? p9_client_flush+0x430/0x430 [ 3207.528126] ? trace_hardirqs_on+0x5b/0x180 [ 3207.529077] ? lockdep_init_map_type+0x2c7/0x780 [ 3207.530132] ? __raw_spin_lock_init+0x36/0x110 [ 3207.531152] v9fs_session_init+0x1dd/0x1680 [ 3207.532125] ? lock_release+0x680/0x680 [ 3207.533029] ? kmem_cache_alloc_trace+0x151/0x320 [ 3207.534121] ? v9fs_show_options+0x690/0x690 [ 3207.535116] ? trace_hardirqs_on+0x5b/0x180 [ 3207.536086] ? kasan_unpoison_shadow+0x33/0x50 [ 3207.537091] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3207.538258] v9fs_mount+0x79/0x8f0 [ 3207.539059] ? v9fs_write_inode+0x60/0x60 [ 3207.539992] legacy_get_tree+0x105/0x220 [ 3207.540894] vfs_get_tree+0x8e/0x300 [ 3207.541739] path_mount+0x1429/0x2120 [ 3207.542591] ? strncpy_from_user+0x9e/0x470 [ 3207.543549] ? finish_automount+0xa90/0xa90 [ 3207.544525] ? getname_flags.part.0+0x1dd/0x4f0 [ 3207.545567] ? _copy_from_user+0xfb/0x1b0 [ 3207.546502] __x64_sys_mount+0x282/0x300 [ 3207.547401] ? copy_mnt_ns+0xa00/0xa00 [ 3207.548263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.549408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3207.550516] do_syscall_64+0x33/0x40 [ 3207.551301] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3207.552417] RIP: 0033:0x7fbfa6f6fb19 [ 3207.553247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3207.557298] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3207.559136] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3207.560835] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3207.562521] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3207.564165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3207.565797] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3207.568854] 9pnet: Insufficient options for proto=fd 05:36:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x100000000000000, 0x0) 05:36:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x68}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:36:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 87) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:36:49 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:36:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xc0ed0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:36:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 41) 05:36:49 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x9000000}]}]}, 0x24}}, 0x0) 05:36:49 executing program 0: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3207.606936] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3207.651492] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:36:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:36:49 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf000000}]}]}, 0x24}}, 0x0) 05:36:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x200000000000000, 0x0) [ 3207.798299] FAULT_INJECTION: forcing a failure. [ 3207.798299] name failslab, interval 1, probability 0, space 0, times 0 [ 3207.801350] CPU: 0 PID: 66304 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3207.802998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3207.805006] Call Trace: [ 3207.805618] dump_stack+0x107/0x167 [ 3207.806454] should_fail.cold+0x5/0xa [ 3207.807346] ? ___slab_alloc+0x470/0x700 [ 3207.808282] ? create_object.isra.0+0x3a/0xa20 [ 3207.809333] should_failslab+0x5/0x20 [ 3207.810221] kmem_cache_alloc+0x5b/0x310 [ 3207.811178] create_object.isra.0+0x3a/0xa20 [ 3207.812184] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3207.813354] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3207.814522] ? skb_segment+0x9d8/0x3aa0 [ 3207.815448] __alloc_skb+0xb1/0x5b0 [ 3207.816289] skb_segment+0x9d8/0x3aa0 [ 3207.817161] ? __lock_acquire+0xbb1/0x5b00 [ 3207.818178] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3207.819326] ? lock_acquire+0x197/0x470 [ 3207.820235] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.821435] __udp_gso_segment+0x11c6/0x1830 [ 3207.822452] ? __sk_receive_skb+0x830/0x830 [ 3207.823439] udp4_ufo_fragment+0x528/0x720 [ 3207.824408] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3207.825561] inet_gso_segment+0x4fb/0x11a0 [ 3207.826520] skb_mac_gso_segment+0x273/0x570 [ 3207.827505] ? inet_sock_destruct+0x840/0x840 [ 3207.828508] ? skb_network_protocol+0x650/0x650 [ 3207.829576] ? skb_crc32c_csum_help+0x80/0x80 [ 3207.830554] ? lock_acquire+0x197/0x470 [ 3207.831443] ? __dev_queue_xmit+0x1c6/0x2690 [ 3207.832430] __skb_gso_segment+0x32d/0x6d0 [ 3207.833376] ? mark_lock+0xf5/0x2df0 [ 3207.834225] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3207.835401] ? lock_chain_count+0x20/0x20 [ 3207.836325] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3207.837347] __dev_queue_xmit+0x825/0x2690 [ 3207.838315] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3207.839465] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3207.840493] ? mark_held_locks+0x9e/0xe0 [ 3207.841405] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3207.842589] neigh_connected_output+0x382/0x4d0 [ 3207.843632] ip_finish_output2+0x6f1/0x21f0 [ 3207.844592] ? nf_hook_slow+0xfc/0x1e0 [ 3207.845457] ? ip_frag_next+0x9e0/0x9e0 [ 3207.846354] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3207.847473] __ip_finish_output.part.0+0x5f3/0xb50 [ 3207.848570] ? ip_fragment.constprop.0+0x240/0x240 [ 3207.849670] ? netif_rx_ni+0xe7/0x300 [ 3207.850523] ip_mc_output+0x401/0xa30 [ 3207.851380] ip_send_skb+0xdd/0x260 [ 3207.852198] udp_send_skb+0x6da/0x11d0 [ 3207.853077] udp_sendmsg+0x139a/0x2160 [ 3207.853953] ? mark_lock+0xf5/0x2df0 [ 3207.854784] ? ip_frag_init+0x350/0x350 [ 3207.855664] ? lock_chain_count+0x20/0x20 [ 3207.856630] ? udp_setsockopt+0xc0/0xc0 [ 3207.857543] ? mark_lock+0xf5/0x2df0 [ 3207.858409] ? lock_acquire+0x197/0x470 [ 3207.859307] ? lock_chain_count+0x20/0x20 [ 3207.860254] ? mark_lock+0xf5/0x2df0 [ 3207.861102] ? mark_lock+0xf5/0x2df0 [ 3207.861976] ? lock_chain_count+0x20/0x20 [ 3207.862919] ? __lock_acquire+0xbb1/0x5b00 [ 3207.863880] ? lock_chain_count+0x20/0x20 [ 3207.864834] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.866058] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3207.866998] ? udp_v6_push_pending_frames+0x360/0x360 [ 3207.868175] ? mark_lock+0xf5/0x2df0 [ 3207.869026] ? lock_acquire+0x197/0x470 [ 3207.869952] ? find_held_lock+0x2c/0x110 [ 3207.870883] ? __might_fault+0xd3/0x180 [ 3207.871787] ? lock_downgrade+0x6d0/0x6d0 [ 3207.872724] ? lock_downgrade+0x6d0/0x6d0 [ 3207.873693] ? sock_has_perm+0x1ea/0x280 [ 3207.874616] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3207.875790] ? _copy_from_user+0xfb/0x1b0 [ 3207.876740] ? __import_iovec+0x458/0x590 [ 3207.877713] ? udp_v6_push_pending_frames+0x360/0x360 [ 3207.878887] inet6_sendmsg+0x105/0x140 [ 3207.879776] ? inet6_compat_ioctl+0x320/0x320 [ 3207.880788] __sock_sendmsg+0xf2/0x190 [ 3207.881700] ____sys_sendmsg+0x70d/0x870 [ 3207.882628] ? sock_write_iter+0x3d0/0x3d0 [ 3207.883580] ? do_recvmmsg+0x6d0/0x6d0 [ 3207.884468] ? lock_downgrade+0x6d0/0x6d0 [ 3207.885421] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3207.886709] ___sys_sendmsg+0xf3/0x170 [ 3207.887823] ? sendmsg_copy_msghdr+0x160/0x160 [ 3207.889116] ? __fget_files+0x2cf/0x520 [ 3207.890249] ? lock_downgrade+0x6d0/0x6d0 [ 3207.891338] ? find_held_lock+0x2c/0x110 [ 3207.892296] ? __fget_files+0x2f8/0x520 [ 3207.893238] ? __fget_light+0xea/0x290 [ 3207.894187] __sys_sendmsg+0xe5/0x1b0 [ 3207.895086] ? __sys_sendmsg_sock+0x40/0x40 [ 3207.896090] ? rcu_read_lock_any_held+0x75/0xa0 [ 3207.897198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.898470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3207.899672] ? trace_hardirqs_on+0x5b/0x180 [ 3207.900679] do_syscall_64+0x33/0x40 [ 3207.901584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3207.902810] RIP: 0033:0x7f3e899f4b19 [ 3207.903683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3207.908105] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3207.909920] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3207.911589] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3207.913242] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3207.914937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3207.916626] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3223.580721] FAULT_INJECTION: forcing a failure. [ 3223.580721] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.582387] CPU: 0 PID: 66420 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3223.583326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3223.584462] Call Trace: [ 3223.584834] dump_stack+0x107/0x167 [ 3223.585337] should_fail.cold+0x5/0xa [ 3223.585864] ? create_object.isra.0+0x3a/0xa20 [ 3223.586502] should_failslab+0x5/0x20 [ 3223.587028] kmem_cache_alloc+0x5b/0x310 [ 3223.587589] create_object.isra.0+0x3a/0xa20 [ 3223.588187] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3223.588887] kmem_cache_alloc+0x159/0x310 [ 3223.589464] p9_client_prepare_req.part.0+0x3a/0xac0 [ 3223.590171] p9_client_rpc+0x220/0x1370 [ 3223.590722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.591435] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3223.592152] ? pipe_poll+0x21b/0x7f0 [ 3223.592647] ? p9_fd_close+0x4a0/0x4a0 [ 3223.593172] ? anon_pipe_buf_release+0x280/0x280 [ 3223.593761] ? p9_fd_poll+0x1e0/0x2c0 [ 3223.594305] ? p9_fd_create+0x357/0x4a0 [ 3223.594836] ? p9_conn_create+0x510/0x510 [ 3223.595395] ? p9_client_create+0x798/0x1230 [ 3223.595981] ? kfree+0xd7/0x340 [ 3223.596519] p9_client_create+0xa76/0x1230 [ 3223.597074] ? p9_client_flush+0x430/0x430 [ 3223.597628] ? trace_hardirqs_on+0x5b/0x180 [ 3223.598204] ? lockdep_init_map_type+0x2c7/0x780 [ 3223.598823] ? __raw_spin_lock_init+0x36/0x110 [ 3223.599425] v9fs_session_init+0x1dd/0x1680 [ 3223.599986] ? lock_release+0x680/0x680 [ 3223.600508] ? kmem_cache_alloc_trace+0x151/0x320 [ 3223.601142] ? v9fs_show_options+0x690/0x690 [ 3223.601720] ? trace_hardirqs_on+0x5b/0x180 [ 3223.602295] ? kasan_unpoison_shadow+0x33/0x50 [ 3223.602891] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3223.603557] v9fs_mount+0x79/0x8f0 [ 3223.604023] ? v9fs_write_inode+0x60/0x60 [ 3223.604574] legacy_get_tree+0x105/0x220 [ 3223.605107] vfs_get_tree+0x8e/0x300 [ 3223.605598] path_mount+0x1429/0x2120 [ 3223.606104] ? strncpy_from_user+0x9e/0x470 [ 3223.606674] ? finish_automount+0xa90/0xa90 [ 3223.607240] ? getname_flags.part.0+0x1dd/0x4f0 [ 3223.607842] ? _copy_from_user+0xfb/0x1b0 [ 3223.608393] __x64_sys_mount+0x282/0x300 [ 3223.608928] ? copy_mnt_ns+0xa00/0xa00 [ 3223.609441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.610126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3223.610801] do_syscall_64+0x33/0x40 [ 3223.611290] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3223.611959] RIP: 0033:0x7fbfa6f6fb19 [ 3223.612445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3223.614827] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.615817] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3223.616752] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3223.617683] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3223.618626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3223.619555] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:37:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 42) 05:37:05 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:37:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 89) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:37:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x300000000000000, 0x0) 05:37:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x6c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xd0030000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x6c000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:05 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1e010000}]}]}, 0x24}}, 0x0) [ 3223.632751] FAULT_INJECTION: forcing a failure. [ 3223.632751] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.634199] CPU: 0 PID: 66497 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3223.635069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3223.636118] Call Trace: [ 3223.636461] dump_stack+0x107/0x167 [ 3223.636931] should_fail.cold+0x5/0xa [ 3223.637414] ? trace_hardirqs_on+0x5b/0x180 [ 3223.637960] ? __alloc_skb+0x6d/0x5b0 [ 3223.638453] should_failslab+0x5/0x20 [ 3223.638938] kmem_cache_alloc_node+0x55/0x330 [ 3223.639518] __alloc_skb+0x6d/0x5b0 [ 3223.639991] skb_segment+0x9d8/0x3aa0 [ 3223.640478] ? __lock_acquire+0xbb1/0x5b00 [ 3223.641045] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3223.641675] ? lock_acquire+0x197/0x470 [ 3223.642193] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.642870] __udp_gso_segment+0x11c6/0x1830 [ 3223.643429] ? __sk_receive_skb+0x830/0x830 [ 3223.643984] udp4_ufo_fragment+0x528/0x720 [ 3223.644527] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3223.645160] inet_gso_segment+0x4fb/0x11a0 [ 3223.645708] skb_mac_gso_segment+0x273/0x570 [ 3223.646279] ? inet_sock_destruct+0x840/0x840 [ 3223.646846] ? skb_network_protocol+0x650/0x650 [ 3223.647433] ? skb_crc32c_csum_help+0x80/0x80 [ 3223.647999] ? lock_acquire+0x197/0x470 [ 3223.648506] ? __dev_queue_xmit+0x1c6/0x2690 [ 3223.649070] __skb_gso_segment+0x32d/0x6d0 [ 3223.649606] ? mark_lock+0xf5/0x2df0 [ 3223.650084] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3223.650753] ? lock_chain_count+0x20/0x20 [ 3223.651280] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3223.651861] __dev_queue_xmit+0x825/0x2690 [ 3223.652406] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3223.653059] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3223.653643] ? mark_held_locks+0x9e/0xe0 [ 3223.654170] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3223.654837] neigh_connected_output+0x382/0x4d0 [ 3223.655445] ip_finish_output2+0x6f1/0x21f0 [ 3223.655991] ? nf_hook_slow+0xfc/0x1e0 [ 3223.656487] ? ip_frag_next+0x9e0/0x9e0 [ 3223.656989] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3223.657631] __ip_finish_output.part.0+0x5f3/0xb50 [ 3223.658269] ? ip_fragment.constprop.0+0x240/0x240 [ 3223.658891] ? netif_rx_ni+0xe7/0x300 [ 3223.659381] ip_mc_output+0x401/0xa30 [ 3223.659869] ip_send_skb+0xdd/0x260 [ 3223.660336] udp_send_skb+0x6da/0x11d0 [ 3223.660839] udp_sendmsg+0x139a/0x2160 [ 3223.661338] ? mark_lock+0xf5/0x2df0 [ 3223.661810] ? ip_frag_init+0x350/0x350 [ 3223.662326] ? lock_chain_count+0x20/0x20 [ 3223.662857] ? udp_setsockopt+0xc0/0xc0 [ 3223.663364] ? mark_lock+0xf5/0x2df0 [ 3223.663836] ? lock_acquire+0x197/0x470 [ 3223.664345] ? lock_chain_count+0x20/0x20 [ 3223.664872] ? mark_lock+0xf5/0x2df0 [ 3223.665351] ? mark_lock+0xf5/0x2df0 [ 3223.665824] ? lock_chain_count+0x20/0x20 [ 3223.666356] ? __lock_acquire+0xbb1/0x5b00 [ 3223.666897] ? lock_chain_count+0x20/0x20 [ 3223.667435] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.668118] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3223.668645] ? udp_v6_push_pending_frames+0x360/0x360 [ 3223.669306] ? mark_lock+0xf5/0x2df0 [ 3223.669784] ? lock_acquire+0x197/0x470 [ 3223.670301] ? find_held_lock+0x2c/0x110 [ 3223.670826] ? __might_fault+0xd3/0x180 [ 3223.671335] ? lock_downgrade+0x6d0/0x6d0 [ 3223.671863] ? lock_downgrade+0x6d0/0x6d0 [ 3223.672393] ? sock_has_perm+0x1ea/0x280 [ 3223.672907] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3223.673564] ? _copy_from_user+0xfb/0x1b0 [ 3223.674101] ? __import_iovec+0x458/0x590 [ 3223.674632] ? udp_v6_push_pending_frames+0x360/0x360 [ 3223.675295] inet6_sendmsg+0x105/0x140 [ 3223.675790] ? inet6_compat_ioctl+0x320/0x320 [ 3223.676358] __sock_sendmsg+0xf2/0x190 [ 3223.676852] ____sys_sendmsg+0x70d/0x870 [ 3223.677371] ? sock_write_iter+0x3d0/0x3d0 [ 3223.677906] ? do_recvmmsg+0x6d0/0x6d0 [ 3223.678415] ? lock_downgrade+0x6d0/0x6d0 [ 3223.678942] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.679610] ___sys_sendmsg+0xf3/0x170 [ 3223.680116] ? sendmsg_copy_msghdr+0x160/0x160 [ 3223.680698] ? __fget_files+0x2cf/0x520 [ 3223.681203] ? lock_downgrade+0x6d0/0x6d0 [ 3223.681730] ? find_held_lock+0x2c/0x110 [ 3223.682264] ? __fget_files+0x2f8/0x520 [ 3223.682778] ? __fget_light+0xea/0x290 [ 3223.683279] __sys_sendmsg+0xe5/0x1b0 [ 3223.683764] ? __sys_sendmsg_sock+0x40/0x40 [ 3223.684310] ? rcu_read_lock_any_held+0x75/0xa0 [ 3223.684912] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.685575] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3223.686232] ? trace_hardirqs_on+0x5b/0x180 [ 3223.686777] do_syscall_64+0x33/0x40 [ 3223.687252] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3223.687900] RIP: 0033:0x7f3e899f4b19 [ 3223.688382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3223.690688] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3223.691645] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3223.692542] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3223.693448] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3223.694362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3223.695262] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:37:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xe4ffffff, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3223.701525] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3223.761802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:37:05 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x40000000}]}]}, 0x24}}, 0x0) 05:37:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x400000000000000, 0x0) 05:37:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x109a0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x74}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 43) 05:37:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 90) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:37:05 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x81000000}]}]}, 0x24}}, 0x0) [ 3223.883239] FAULT_INJECTION: forcing a failure. [ 3223.883239] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.884673] CPU: 1 PID: 66785 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3223.885479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3223.885817] FAULT_INJECTION: forcing a failure. [ 3223.885817] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.886445] Call Trace: [ 3223.886460] dump_stack+0x107/0x167 [ 3223.886480] should_fail.cold+0x5/0xa [ 3223.888991] ? p9_fcall_init+0x97/0x290 [ 3223.889436] should_failslab+0x5/0x20 [ 3223.889859] __kmalloc+0x72/0x390 [ 3223.890265] p9_fcall_init+0x97/0x290 [ 3223.890691] p9_client_prepare_req.part.0+0x8c/0xac0 [ 3223.891261] p9_client_rpc+0x220/0x1370 [ 3223.891712] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.892302] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3223.892893] ? pipe_poll+0x21b/0x7f0 [ 3223.893305] ? p9_fd_close+0x4a0/0x4a0 [ 3223.893736] ? anon_pipe_buf_release+0x280/0x280 [ 3223.894278] ? p9_fd_poll+0x1e0/0x2c0 [ 3223.894716] ? p9_fd_create+0x357/0x4a0 [ 3223.895158] ? p9_conn_create+0x510/0x510 [ 3223.895616] ? p9_client_create+0x798/0x1230 [ 3223.896104] ? kfree+0xd7/0x340 [ 3223.896475] p9_client_create+0xa76/0x1230 [ 3223.896953] ? p9_client_flush+0x430/0x430 [ 3223.897448] ? trace_hardirqs_on+0x5b/0x180 [ 3223.897954] ? lockdep_init_map_type+0x2c7/0x780 [ 3223.898498] ? __raw_spin_lock_init+0x36/0x110 [ 3223.899009] v9fs_session_init+0x1dd/0x1680 [ 3223.899514] ? lock_release+0x680/0x680 [ 3223.899959] ? kmem_cache_alloc_trace+0x151/0x320 [ 3223.900521] ? v9fs_show_options+0x690/0x690 [ 3223.901017] ? trace_hardirqs_on+0x5b/0x180 [ 3223.901521] ? kasan_unpoison_shadow+0x33/0x50 [ 3223.902059] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3223.902629] v9fs_mount+0x79/0x8f0 [ 3223.903007] ? v9fs_write_inode+0x60/0x60 [ 3223.903449] legacy_get_tree+0x105/0x220 [ 3223.903880] vfs_get_tree+0x8e/0x300 [ 3223.904275] path_mount+0x1429/0x2120 [ 3223.904683] ? strncpy_from_user+0x9e/0x470 [ 3223.905139] ? finish_automount+0xa90/0xa90 [ 3223.905603] ? getname_flags.part.0+0x1dd/0x4f0 [ 3223.906095] ? _copy_from_user+0xfb/0x1b0 [ 3223.906688] __x64_sys_mount+0x282/0x300 [ 3223.907145] ? copy_mnt_ns+0xa00/0xa00 [ 3223.907729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.908463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3223.909190] do_syscall_64+0x33/0x40 [ 3223.909717] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3223.910442] RIP: 0033:0x7fbfa6f6fb19 [ 3223.910966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3223.913537] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.914609] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3223.915609] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3223.916607] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3223.917489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3223.918489] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3223.919500] CPU: 0 PID: 66740 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3223.920282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3223.921200] Call Trace: [ 3223.921496] dump_stack+0x107/0x167 [ 3223.921909] should_fail.cold+0x5/0xa [ 3223.922340] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3223.922927] ? create_object.isra.0+0x3a/0xa20 [ 3223.923440] should_failslab+0x5/0x20 [ 3223.923865] kmem_cache_alloc+0x5b/0x310 [ 3223.924305] ? mark_held_locks+0x9e/0xe0 [ 3223.924767] create_object.isra.0+0x3a/0xa20 [ 3223.925255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3223.925820] kmem_cache_alloc_node+0x169/0x330 [ 3223.926336] __alloc_skb+0x6d/0x5b0 [ 3223.926746] skb_segment+0x9d8/0x3aa0 [ 3223.927182] ? __lock_acquire+0xbb1/0x5b00 [ 3223.927674] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3223.928229] ? lock_acquire+0x197/0x470 [ 3223.928679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.929262] __udp_gso_segment+0x11c6/0x1830 [ 3223.929752] ? __sk_receive_skb+0x830/0x830 [ 3223.930238] udp4_ufo_fragment+0x528/0x720 [ 3223.930715] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3223.931266] inet_gso_segment+0x4fb/0x11a0 [ 3223.931744] skb_mac_gso_segment+0x273/0x570 [ 3223.932233] ? inet_sock_destruct+0x840/0x840 [ 3223.932733] ? skb_network_protocol+0x650/0x650 [ 3223.933242] ? skb_crc32c_csum_help+0x80/0x80 [ 3223.933747] ? lock_acquire+0x197/0x470 [ 3223.934194] ? __dev_queue_xmit+0x1c6/0x2690 [ 3223.934688] __skb_gso_segment+0x32d/0x6d0 [ 3223.935154] ? mark_lock+0xf5/0x2df0 [ 3223.935569] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3223.936154] ? lock_chain_count+0x20/0x20 [ 3223.936624] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3223.937129] __dev_queue_xmit+0x825/0x2690 [ 3223.937606] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3223.938188] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3223.938703] ? mark_held_locks+0x9e/0xe0 [ 3223.939151] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3223.939740] neigh_connected_output+0x382/0x4d0 [ 3223.940267] ip_finish_output2+0x6f1/0x21f0 [ 3223.940759] ? nf_hook_slow+0xfc/0x1e0 [ 3223.941189] ? ip_frag_next+0x9e0/0x9e0 [ 3223.941633] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3223.942201] __ip_finish_output.part.0+0x5f3/0xb50 [ 3223.942749] ? ip_fragment.constprop.0+0x240/0x240 [ 3223.943287] ? netif_rx_ni+0xe7/0x300 [ 3223.943844] ip_mc_output+0x401/0xa30 [ 3223.944281] ip_send_skb+0xdd/0x260 [ 3223.944689] udp_send_skb+0x6da/0x11d0 [ 3223.945138] udp_sendmsg+0x139a/0x2160 [ 3223.945586] ? mark_lock+0xf5/0x2df0 [ 3223.946017] ? ip_frag_init+0x350/0x350 [ 3223.946481] ? lock_chain_count+0x20/0x20 [ 3223.946959] ? udp_setsockopt+0xc0/0xc0 [ 3223.947410] ? mark_lock+0xf5/0x2df0 [ 3223.947836] ? lock_acquire+0x197/0x470 [ 3223.948297] ? lock_chain_count+0x20/0x20 [ 3223.948777] ? mark_lock+0xf5/0x2df0 [ 3223.949204] ? mark_lock+0xf5/0x2df0 [ 3223.949634] ? lock_chain_count+0x20/0x20 [ 3223.950106] ? __lock_acquire+0xbb1/0x5b00 [ 3223.950596] ? lock_chain_count+0x20/0x20 [ 3223.951083] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.951691] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3223.952168] ? udp_v6_push_pending_frames+0x360/0x360 [ 3223.952760] ? mark_lock+0xf5/0x2df0 [ 3223.953189] ? lock_acquire+0x197/0x470 [ 3223.953644] ? find_held_lock+0x2c/0x110 [ 3223.954118] ? __might_fault+0xd3/0x180 [ 3223.954581] ? lock_downgrade+0x6d0/0x6d0 [ 3223.955057] ? lock_downgrade+0x6d0/0x6d0 [ 3223.955535] ? sock_has_perm+0x1ea/0x280 [ 3223.956001] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3223.956596] ? _copy_from_user+0xfb/0x1b0 [ 3223.957078] ? __import_iovec+0x458/0x590 [ 3223.957554] ? udp_v6_push_pending_frames+0x360/0x360 [ 3223.958165] inet6_sendmsg+0x105/0x140 [ 3223.958612] ? inet6_compat_ioctl+0x320/0x320 [ 3223.959126] __sock_sendmsg+0xf2/0x190 [ 3223.959575] ____sys_sendmsg+0x70d/0x870 [ 3223.960044] ? sock_write_iter+0x3d0/0x3d0 [ 3223.960526] ? do_recvmmsg+0x6d0/0x6d0 [ 3223.960973] ? lock_downgrade+0x6d0/0x6d0 [ 3223.961452] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3223.962054] ___sys_sendmsg+0xf3/0x170 [ 3223.962509] ? sendmsg_copy_msghdr+0x160/0x160 [ 3223.963040] ? __fget_files+0x2cf/0x520 [ 3223.963495] ? lock_downgrade+0x6d0/0x6d0 [ 3223.963971] ? find_held_lock+0x2c/0x110 [ 3223.964440] ? __fget_files+0x2f8/0x520 [ 3223.964901] ? __fget_light+0xea/0x290 [ 3223.965350] __sys_sendmsg+0xe5/0x1b0 [ 3223.965787] ? __sys_sendmsg_sock+0x40/0x40 [ 3223.966290] ? rcu_read_lock_any_held+0x75/0xa0 [ 3223.966830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3223.967433] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3223.968022] ? trace_hardirqs_on+0x5b/0x180 [ 3223.968521] do_syscall_64+0x33/0x40 [ 3223.968948] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3223.969535] RIP: 0033:0x7f3e899f4b19 [ 3223.969965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3223.972085] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3223.972956] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3223.973773] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3223.974604] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3223.975417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3223.976231] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3223.997258] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3224.008130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3241.963057] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=66878 comm=syz-executor.0 [ 3241.967071] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=66878 comm=syz-executor.0 05:37:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x500000000000000, 0x0) 05:37:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 91) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:37:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 44) 05:37:23 executing program 0: stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 05:37:23 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x9effffff}]}]}, 0x24}}, 0x0) 05:37:23 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:37:23 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x7a}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf2030000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3242.005504] FAULT_INJECTION: forcing a failure. [ 3242.005504] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.008123] CPU: 0 PID: 66904 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3242.009719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.011720] Call Trace: [ 3242.012352] dump_stack+0x107/0x167 [ 3242.013204] should_fail.cold+0x5/0xa [ 3242.014090] ? create_object.isra.0+0x3a/0xa20 [ 3242.015169] should_failslab+0x5/0x20 [ 3242.016053] kmem_cache_alloc+0x5b/0x310 [ 3242.017002] create_object.isra.0+0x3a/0xa20 [ 3242.018021] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3242.019218] __kmalloc+0x16e/0x390 [ 3242.020043] p9_fcall_init+0x97/0x290 [ 3242.020935] p9_client_prepare_req.part.0+0x8c/0xac0 [ 3242.022143] p9_client_rpc+0x220/0x1370 [ 3242.023071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.024284] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3242.025516] ? pipe_poll+0x21b/0x7f0 [ 3242.026372] ? p9_fd_close+0x4a0/0x4a0 [ 3242.027277] ? anon_pipe_buf_release+0x280/0x280 [ 3242.028373] ? p9_fd_poll+0x1e0/0x2c0 [ 3242.029255] ? p9_fd_create+0x357/0x4a0 [ 3242.030172] ? p9_conn_create+0x510/0x510 [ 3242.031150] ? p9_client_create+0x798/0x1230 [ 3242.032159] ? kfree+0xd7/0x340 [ 3242.033010] p9_client_create+0xa76/0x1230 [ 3242.034027] ? p9_client_flush+0x430/0x430 [ 3242.035003] ? trace_hardirqs_on+0x5b/0x180 [ 3242.035992] ? lockdep_init_map_type+0x2c7/0x780 [ 3242.037078] ? __raw_spin_lock_init+0x36/0x110 [ 3242.038126] v9fs_session_init+0x1dd/0x1680 [ 3242.039114] ? lock_release+0x680/0x680 [ 3242.040034] ? kmem_cache_alloc_trace+0x151/0x320 [ 3242.041136] ? v9fs_show_options+0x690/0x690 [ 3242.042148] ? trace_hardirqs_on+0x5b/0x180 [ 3242.043142] ? kasan_unpoison_shadow+0x33/0x50 [ 3242.044180] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3242.045327] v9fs_mount+0x79/0x8f0 [ 3242.046135] ? v9fs_write_inode+0x60/0x60 [ 3242.047101] legacy_get_tree+0x105/0x220 [ 3242.048025] vfs_get_tree+0x8e/0x300 [ 3242.048870] path_mount+0x1429/0x2120 [ 3242.049748] ? strncpy_from_user+0x9e/0x470 [ 3242.050730] ? finish_automount+0xa90/0xa90 [ 3242.051713] ? getname_flags.part.0+0x1dd/0x4f0 [ 3242.052778] ? _copy_from_user+0xfb/0x1b0 [ 3242.053741] __x64_sys_mount+0x282/0x300 [ 3242.054661] ? copy_mnt_ns+0xa00/0xa00 [ 3242.055556] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.056754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3242.057927] do_syscall_64+0x33/0x40 [ 3242.058789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3242.059948] RIP: 0033:0x7fbfa6f6fb19 [ 3242.060795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.064943] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3242.066671] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3242.068339] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3242.069948] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3242.071557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3242.073162] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:37:24 executing program 0: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3242.101104] FAULT_INJECTION: forcing a failure. [ 3242.101104] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.103653] CPU: 0 PID: 66893 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3242.105180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.107030] Call Trace: [ 3242.107619] dump_stack+0x107/0x167 [ 3242.108428] should_fail.cold+0x5/0xa [ 3242.109290] should_failslab+0x5/0x20 [ 3242.110142] __kmalloc_node_track_caller+0x74/0x3b0 [ 3242.111263] ? skb_segment+0x9d8/0x3aa0 [ 3242.112152] __alloc_skb+0xb1/0x5b0 [ 3242.112969] skb_segment+0x9d8/0x3aa0 [ 3242.113819] ? __lock_acquire+0xbb1/0x5b00 [ 3242.114816] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3242.115942] ? lock_acquire+0x197/0x470 [ 3242.116845] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3242.118098] __udp_gso_segment+0x11c6/0x1830 [ 3242.119109] ? __sk_receive_skb+0x830/0x830 [ 3242.120092] udp4_ufo_fragment+0x528/0x720 [ 3242.121049] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3242.122176] inet_gso_segment+0x4fb/0x11a0 [ 3242.123169] skb_mac_gso_segment+0x273/0x570 [ 3242.124158] ? inet_sock_destruct+0x840/0x840 [ 3242.125172] ? skb_network_protocol+0x650/0x650 [ 3242.126213] ? skb_crc32c_csum_help+0x80/0x80 [ 3242.127228] ? lock_acquire+0x197/0x470 05:37:24 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x600000000000000, 0x0) [ 3242.128144] ? __dev_queue_xmit+0x1c6/0x2690 [ 3242.129303] __skb_gso_segment+0x32d/0x6d0 [ 3242.130256] ? mark_lock+0xf5/0x2df0 [ 3242.131135] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3242.132317] ? lock_chain_count+0x20/0x20 [ 3242.133277] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3242.134343] __dev_queue_xmit+0x825/0x2690 [ 3242.135346] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3242.136547] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3242.137629] ? mark_held_locks+0x9e/0xe0 [ 3242.138581] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3242.139828] neigh_connected_output+0x382/0x4d0 [ 3242.140932] ip_finish_output2+0x6f1/0x21f0 [ 3242.141948] ? nf_hook_slow+0xfc/0x1e0 [ 3242.142869] ? ip_frag_next+0x9e0/0x9e0 [ 3242.143800] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3242.144977] __ip_finish_output.part.0+0x5f3/0xb50 [ 3242.146140] ? ip_fragment.constprop.0+0x240/0x240 [ 3242.147301] ? netif_rx_ni+0xe7/0x300 [ 3242.148203] ip_mc_output+0x401/0xa30 [ 3242.149108] ip_send_skb+0xdd/0x260 [ 3242.149969] udp_send_skb+0x6da/0x11d0 [ 3242.150906] udp_sendmsg+0x139a/0x2160 [ 3242.151822] ? mark_lock+0xf5/0x2df0 [ 3242.152700] ? ip_frag_init+0x350/0x350 [ 3242.153636] ? lock_chain_count+0x20/0x20 [ 3242.154617] ? udp_setsockopt+0xc0/0xc0 [ 3242.155557] ? mark_lock+0xf5/0x2df0 [ 3242.156439] ? lock_acquire+0x197/0x470 [ 3242.157386] ? lock_chain_count+0x20/0x20 [ 3242.158370] ? mark_lock+0xf5/0x2df0 [ 3242.159264] ? mark_lock+0xf5/0x2df0 [ 3242.160145] ? lock_chain_count+0x20/0x20 [ 3242.161128] ? __lock_acquire+0xbb1/0x5b00 [ 3242.162136] ? lock_chain_count+0x20/0x20 [ 3242.163145] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3242.164407] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3242.165391] ? udp_v6_push_pending_frames+0x360/0x360 [ 3242.166640] ? mark_lock+0xf5/0x2df0 [ 3242.167549] ? lock_acquire+0x197/0x470 [ 3242.168496] ? find_held_lock+0x2c/0x110 [ 3242.169472] ? __might_fault+0xd3/0x180 [ 3242.170426] ? lock_downgrade+0x6d0/0x6d0 [ 3242.171435] ? lock_downgrade+0x6d0/0x6d0 [ 3242.172426] ? sock_has_perm+0x1ea/0x280 [ 3242.173400] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3242.174637] ? _copy_from_user+0xfb/0x1b0 [ 3242.175653] ? __import_iovec+0x458/0x590 [ 3242.176644] ? udp_v6_push_pending_frames+0x360/0x360 [ 3242.177886] inet6_sendmsg+0x105/0x140 [ 3242.178841] ? inet6_compat_ioctl+0x320/0x320 [ 3242.179921] __sock_sendmsg+0xf2/0x190 [ 3242.180859] ____sys_sendmsg+0x70d/0x870 [ 3242.181842] ? sock_write_iter+0x3d0/0x3d0 [ 3242.182867] ? do_recvmmsg+0x6d0/0x6d0 [ 3242.183811] ? lock_downgrade+0x6d0/0x6d0 [ 3242.184815] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3242.186087] ___sys_sendmsg+0xf3/0x170 [ 3242.187046] ? sendmsg_copy_msghdr+0x160/0x160 [ 3242.188164] ? __fget_files+0x2cf/0x520 [ 3242.189135] ? lock_downgrade+0x6d0/0x6d0 [ 3242.190147] ? find_held_lock+0x2c/0x110 [ 3242.191158] ? __fget_files+0x2f8/0x520 [ 3242.192134] ? __fget_light+0xea/0x290 [ 3242.193092] __sys_sendmsg+0xe5/0x1b0 [ 3242.194017] ? __sys_sendmsg_sock+0x40/0x40 [ 3242.195079] ? rcu_read_lock_any_held+0x75/0xa0 [ 3242.196244] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.197532] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3242.198805] ? trace_hardirqs_on+0x5b/0x180 [ 3242.199880] do_syscall_64+0x33/0x40 [ 3242.200794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3242.202050] RIP: 0033:0x7f3e899f4b19 [ 3242.202973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.207114] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3242.208753] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3242.210303] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3242.211843] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3242.213391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3242.214948] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:37:24 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xc00e0000}]}]}, 0x24}}, 0x0) 05:37:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:24 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x318, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:37:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 45) 05:37:24 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x700000000000000, 0x0) 05:37:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 92) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3242.501947] FAULT_INJECTION: forcing a failure. [ 3242.501947] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.504418] CPU: 1 PID: 67229 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3242.505937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.507742] Call Trace: [ 3242.508313] dump_stack+0x107/0x167 [ 3242.509093] should_fail.cold+0x5/0xa [ 3242.509905] ? p9_fcall_init+0x97/0x290 [ 3242.510756] should_failslab+0x5/0x20 [ 3242.511612] __kmalloc+0x72/0x390 [ 3242.512353] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3242.513466] p9_fcall_init+0x97/0x290 [ 3242.514283] p9_client_prepare_req.part.0+0xf4/0xac0 [ 3242.515410] p9_client_rpc+0x220/0x1370 [ 3242.516270] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.517393] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3242.518559] ? pipe_poll+0x21b/0x7f0 [ 3242.519374] ? p9_fd_close+0x4a0/0x4a0 [ 3242.520200] ? anon_pipe_buf_release+0x280/0x280 [ 3242.521212] ? p9_fd_poll+0x1e0/0x2c0 [ 3242.522032] ? p9_fd_create+0x357/0x4a0 [ 3242.522887] ? p9_conn_create+0x510/0x510 [ 3242.523787] ? p9_client_create+0x798/0x1230 [ 3242.524726] ? kfree+0xd7/0x340 [ 3242.525442] p9_client_create+0xa76/0x1230 [ 3242.526354] ? p9_client_flush+0x430/0x430 [ 3242.527268] ? trace_hardirqs_on+0x5b/0x180 [ 3242.528200] ? lockdep_init_map_type+0x2c7/0x780 [ 3242.529211] ? __raw_spin_lock_init+0x36/0x110 [ 3242.530192] v9fs_session_init+0x1dd/0x1680 [ 3242.531124] ? lock_release+0x680/0x680 [ 3242.531980] ? kmem_cache_alloc_trace+0x151/0x320 [ 3242.533006] ? v9fs_show_options+0x690/0x690 [ 3242.533956] ? trace_hardirqs_on+0x5b/0x180 [ 3242.534883] ? kasan_unpoison_shadow+0x33/0x50 [ 3242.535856] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3242.536940] v9fs_mount+0x79/0x8f0 [ 3242.537696] ? v9fs_write_inode+0x60/0x60 [ 3242.538586] legacy_get_tree+0x105/0x220 [ 3242.539464] vfs_get_tree+0x8e/0x300 [ 3242.540260] path_mount+0x1429/0x2120 [ 3242.541081] ? strncpy_from_user+0x9e/0x470 [ 3242.542001] ? finish_automount+0xa90/0xa90 [ 3242.542927] ? getname_flags.part.0+0x1dd/0x4f0 [ 3242.543918] ? _copy_from_user+0xfb/0x1b0 [ 3242.544814] __x64_sys_mount+0x282/0x300 [ 3242.545678] ? copy_mnt_ns+0xa00/0xa00 [ 3242.546512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.547638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3242.548744] do_syscall_64+0x33/0x40 [ 3242.549540] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3242.550631] RIP: 0033:0x7fbfa6f6fb19 [ 3242.551435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.555346] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3242.556964] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3242.558483] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3242.560010] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3242.561533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3242.563069] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3242.566553] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3242.579940] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3242.594269] FAULT_INJECTION: forcing a failure. [ 3242.594269] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.596800] CPU: 1 PID: 67403 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3242.598275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.600062] Call Trace: [ 3242.600625] dump_stack+0x107/0x167 [ 3242.601409] should_fail.cold+0x5/0xa [ 3242.602227] ? create_object.isra.0+0x3a/0xa20 [ 3242.603240] should_failslab+0x5/0x20 [ 3242.604049] kmem_cache_alloc+0x5b/0x310 [ 3242.604944] create_object.isra.0+0x3a/0xa20 [ 3242.605881] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3242.607002] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3242.608089] ? skb_segment+0x9d8/0x3aa0 [ 3242.608945] __alloc_skb+0xb1/0x5b0 [ 3242.609788] skb_segment+0x9d8/0x3aa0 [ 3242.610633] ? __lock_acquire+0xbb1/0x5b00 [ 3242.611645] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3242.612755] ? lock_acquire+0x197/0x470 [ 3242.613648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3242.614893] __udp_gso_segment+0x11c6/0x1830 [ 3242.615853] ? __sk_receive_skb+0x830/0x830 [ 3242.616833] udp4_ufo_fragment+0x528/0x720 [ 3242.617791] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3242.618879] inet_gso_segment+0x4fb/0x11a0 [ 3242.619807] skb_mac_gso_segment+0x273/0x570 [ 3242.620744] ? inet_sock_destruct+0x840/0x840 [ 3242.621715] ? skb_network_protocol+0x650/0x650 [ 3242.622709] ? skb_crc32c_csum_help+0x80/0x80 [ 3242.623686] ? lock_acquire+0x197/0x470 [ 3242.624540] ? __dev_queue_xmit+0x1c6/0x2690 [ 3242.625493] __skb_gso_segment+0x32d/0x6d0 [ 3242.626403] ? mark_lock+0xf5/0x2df0 [ 3242.627220] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3242.628345] ? lock_chain_count+0x20/0x20 [ 3242.629235] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3242.630221] __dev_queue_xmit+0x825/0x2690 [ 3242.631150] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3242.632254] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3242.633247] ? mark_held_locks+0x9e/0xe0 [ 3242.634128] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3242.635283] neigh_connected_output+0x382/0x4d0 [ 3242.636298] ip_finish_output2+0x6f1/0x21f0 [ 3242.637220] ? nf_hook_slow+0xfc/0x1e0 [ 3242.638062] ? ip_frag_next+0x9e0/0x9e0 [ 3242.638931] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3242.640011] __ip_finish_output.part.0+0x5f3/0xb50 [ 3242.641066] ? ip_fragment.constprop.0+0x240/0x240 [ 3242.642115] ? netif_rx_ni+0xe7/0x300 [ 3242.642954] ip_mc_output+0x401/0xa30 [ 3242.643779] ip_send_skb+0xdd/0x260 [ 3242.644558] udp_send_skb+0x6da/0x11d0 [ 3242.645409] udp_sendmsg+0x139a/0x2160 [ 3242.646248] ? mark_lock+0xf5/0x2df0 [ 3242.647068] ? ip_frag_init+0x350/0x350 [ 3242.647917] ? lock_chain_count+0x20/0x20 [ 3242.648821] ? udp_setsockopt+0xc0/0xc0 [ 3242.649677] ? mark_lock+0xf5/0x2df0 [ 3242.650487] ? __lockdep_reset_lock+0x180/0x180 [ 3242.651502] ? lock_chain_count+0x20/0x20 [ 3242.652387] ? mark_lock+0xf5/0x2df0 [ 3242.653195] ? mark_lock+0xf5/0x2df0 [ 3242.653998] ? lock_chain_count+0x20/0x20 [ 3242.654902] ? __lock_acquire+0xbb1/0x5b00 [ 3242.655811] ? lock_chain_count+0x20/0x20 [ 3242.656713] ? perf_trace_lock+0xac/0x490 [ 3242.657605] ? __lockdep_reset_lock+0x180/0x180 [ 3242.658619] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3242.659514] ? udp_v6_push_pending_frames+0x360/0x360 [ 3242.660624] ? mark_lock+0xf5/0x2df0 [ 3242.661440] ? lock_acquire+0x197/0x470 [ 3242.662288] ? find_held_lock+0x2c/0x110 [ 3242.663180] ? __might_fault+0xd3/0x180 [ 3242.664022] ? lock_downgrade+0x6d0/0x6d0 [ 3242.664896] ? lock_downgrade+0x6d0/0x6d0 [ 3242.665775] ? sock_has_perm+0x1ea/0x280 [ 3242.666625] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3242.667728] ? _copy_from_user+0xfb/0x1b0 [ 3242.668613] ? __import_iovec+0x458/0x590 [ 3242.669487] ? udp_v6_push_pending_frames+0x360/0x360 [ 3242.670571] inet6_sendmsg+0x105/0x140 [ 3242.671415] ? inet6_compat_ioctl+0x320/0x320 [ 3242.672354] __sock_sendmsg+0xf2/0x190 [ 3242.673182] ____sys_sendmsg+0x70d/0x870 [ 3242.674039] ? sock_write_iter+0x3d0/0x3d0 [ 3242.674934] ? do_recvmmsg+0x6d0/0x6d0 [ 3242.675752] ? lock_downgrade+0x6d0/0x6d0 [ 3242.676619] ? __lockdep_reset_lock+0x180/0x180 [ 3242.677602] ___sys_sendmsg+0xf3/0x170 [ 3242.678412] ? sendmsg_copy_msghdr+0x160/0x160 [ 3242.679397] ? __fget_files+0x2cf/0x520 [ 3242.680233] ? lock_downgrade+0x6d0/0x6d0 [ 3242.681101] ? find_held_lock+0x2c/0x110 [ 3242.681967] ? __fget_files+0x2f8/0x520 [ 3242.682830] ? __fget_light+0xea/0x290 [ 3242.683650] __sys_sendmsg+0xe5/0x1b0 [ 3242.684459] ? __sys_sendmsg_sock+0x40/0x40 [ 3242.685369] ? rcu_read_lock_any_held+0x75/0xa0 [ 3242.686363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.687490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3242.688565] ? trace_hardirqs_on+0x5b/0x180 [ 3242.689463] do_syscall_64+0x33/0x40 [ 3242.690242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3242.691323] RIP: 0033:0x7f3e899f4b19 [ 3242.692111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.695962] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3242.697559] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3242.699064] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3242.700572] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3242.702061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3242.703564] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:37:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6ffffff, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:41 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x2}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:41 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf0ffffff}]}]}, 0x24}}, 0x0) 05:37:41 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x3e7, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:37:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 93) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:37:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x9000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 46) 05:37:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf7990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000000000000000, 0x0) [ 3259.953668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3259.976702] FAULT_INJECTION: forcing a failure. [ 3259.976702] name failslab, interval 1, probability 0, space 0, times 0 [ 3259.978656] CPU: 0 PID: 67553 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3259.979807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3259.981170] Call Trace: [ 3259.981617] dump_stack+0x107/0x167 [ 3259.982220] should_fail.cold+0x5/0xa [ 3259.982877] ? create_object.isra.0+0x3a/0xa20 [ 3259.983639] should_failslab+0x5/0x20 [ 3259.984268] kmem_cache_alloc+0x5b/0x310 [ 3259.984955] create_object.isra.0+0x3a/0xa20 [ 3259.985673] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3259.986503] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3259.987349] ? skb_segment+0x9d8/0x3aa0 [ 3259.988016] __alloc_skb+0xb1/0x5b0 [ 3259.988632] skb_segment+0x9d8/0x3aa0 [ 3259.989244] ? __lock_acquire+0xbb1/0x5b00 [ 3259.989980] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3259.990795] ? lock_acquire+0x197/0x470 [ 3259.991462] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3259.992325] __udp_gso_segment+0x11c6/0x1830 [ 3259.993066] ? __sk_receive_skb+0x830/0x830 [ 3259.993790] udp4_ufo_fragment+0x528/0x720 [ 3259.994519] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3259.995343] inet_gso_segment+0x4fb/0x11a0 [ 3259.996069] skb_mac_gso_segment+0x273/0x570 [ 3259.996795] ? inet_sock_destruct+0x840/0x840 [ 3259.997520] ? skb_network_protocol+0x650/0x650 [ 3259.998269] ? skb_crc32c_csum_help+0x80/0x80 [ 3259.998994] ? lock_acquire+0x197/0x470 [ 3259.999656] ? __dev_queue_xmit+0x1c6/0x2690 [ 3260.000372] __skb_gso_segment+0x32d/0x6d0 [ 3260.001079] ? mark_lock+0xf5/0x2df0 [ 3260.001711] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3260.002639] ? lock_chain_count+0x20/0x20 [ 3260.003295] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3260.004049] __dev_queue_xmit+0x825/0x2690 [ 3260.004741] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3260.005584] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3260.006330] ? mark_held_locks+0x9e/0xe0 [ 3260.006999] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3260.007877] neigh_connected_output+0x382/0x4d0 [ 3260.008813] ip_finish_output2+0x6f1/0x21f0 [ 3260.009680] ? nf_hook_slow+0xfc/0x1e0 [ 3260.010470] ? ip_frag_next+0x9e0/0x9e0 [ 3260.011269] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3260.012280] __ip_finish_output.part.0+0x5f3/0xb50 [ 3260.013264] ? ip_fragment.constprop.0+0x240/0x240 [ 3260.014103] ? netif_rx_ni+0xe7/0x300 [ 3260.014728] ip_mc_output+0x401/0xa30 [ 3260.015342] ip_send_skb+0xdd/0x260 [ 3260.015965] udp_send_skb+0x6da/0x11d0 [ 3260.016620] udp_sendmsg+0x139a/0x2160 [ 3260.017245] ? mark_lock+0xf5/0x2df0 [ 3260.017851] ? ip_frag_init+0x350/0x350 [ 3260.018503] ? lock_chain_count+0x20/0x20 [ 3260.019180] ? udp_setsockopt+0xc0/0xc0 [ 3260.019832] ? mark_lock+0xf5/0x2df0 [ 3260.020462] ? lock_acquire+0x197/0x470 [ 3260.021089] ? lock_chain_count+0x20/0x20 [ 3260.021759] ? mark_lock+0xf5/0x2df0 [ 3260.022358] ? mark_lock+0xf5/0x2df0 [ 3260.022966] ? lock_chain_count+0x20/0x20 [ 3260.023650] ? __lock_acquire+0xbb1/0x5b00 [ 3260.024323] ? lock_chain_count+0x20/0x20 [ 3260.025004] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3260.025859] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3260.026529] ? udp_v6_push_pending_frames+0x360/0x360 [ 3260.027354] ? mark_lock+0xf5/0x2df0 [ 3260.027988] ? lock_acquire+0x197/0x470 [ 3260.028635] ? find_held_lock+0x2c/0x110 [ 3260.029283] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3260.030119] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3260.030984] ? trace_hardirqs_on+0x5b/0x180 [ 3260.031690] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3260.032559] ? sock_has_perm+0x1ea/0x280 [ 3260.033195] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3260.034028] ? iovec_from_user+0x18b/0x400 [ 3260.034710] ? write_comp_data+0x2f/0x80 [ 3260.035368] ? __import_iovec+0x458/0x590 [ 3260.036042] ? udp_v6_push_pending_frames+0x360/0x360 [ 3260.036889] inet6_sendmsg+0x105/0x140 [ 3260.037517] ? inet6_compat_ioctl+0x320/0x320 [ 3260.038228] __sock_sendmsg+0xf2/0x190 [ 3260.038862] ____sys_sendmsg+0x70d/0x870 [ 3260.039541] ? sock_write_iter+0x3d0/0x3d0 [ 3260.040212] ? do_recvmmsg+0x6d0/0x6d0 [ 3260.040859] ? lock_downgrade+0x6d0/0x6d0 [ 3260.041545] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3260.042377] ___sys_sendmsg+0xf3/0x170 [ 3260.042990] ? sendmsg_copy_msghdr+0x160/0x160 [ 3260.043739] ? __fget_files+0x2cf/0x520 [ 3260.044386] ? lock_downgrade+0x6d0/0x6d0 [ 3260.045069] ? lock_is_held_type+0xd2/0x110 [ 3260.045766] ? __fget_files+0x2f8/0x520 [ 3260.046412] ? __fget_light+0xea/0x290 [ 3260.047027] __sys_sendmsg+0xe5/0x1b0 [ 3260.047648] ? __sys_sendmsg_sock+0x40/0x40 [ 3260.048318] ? trace_hardirqs_on+0x5b/0x180 [ 3260.049026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3260.049843] ? syscall_enter_from_user_mode+0x27/0x50 [ 3260.050727] do_syscall_64+0x33/0x40 [ 3260.051466] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3260.052530] RIP: 0033:0x7f3e899f4b19 [ 3260.053211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3260.056470] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3260.057733] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3260.058902] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3260.060208] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3260.061516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3260.062812] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3260.099273] FAULT_INJECTION: forcing a failure. [ 3260.099273] name failslab, interval 1, probability 0, space 0, times 0 [ 3260.101403] CPU: 0 PID: 67568 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3260.102673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3260.104185] Call Trace: [ 3260.104671] dump_stack+0x107/0x167 [ 3260.105367] should_fail.cold+0x5/0xa 05:37:42 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x3}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3260.106055] ? create_object.isra.0+0x3a/0xa20 [ 3260.107055] should_failslab+0x5/0x20 [ 3260.107794] kmem_cache_alloc+0x5b/0x310 [ 3260.108577] create_object.isra.0+0x3a/0xa20 [ 3260.109411] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3260.110382] __kmalloc+0x16e/0x390 [ 3260.111070] p9_fcall_init+0x97/0x290 [ 3260.111807] p9_client_prepare_req.part.0+0xf4/0xac0 [ 3260.112775] p9_client_rpc+0x220/0x1370 [ 3260.113539] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3260.114551] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3260.115583] ? pipe_poll+0x21b/0x7f0 [ 3260.116290] ? p9_fd_close+0x4a0/0x4a0 [ 3260.117031] ? anon_pipe_buf_release+0x280/0x280 [ 3260.117932] ? p9_fd_poll+0x1e0/0x2c0 [ 3260.118671] ? p9_fd_create+0x357/0x4a0 [ 3260.119434] ? p9_conn_create+0x510/0x510 [ 3260.120217] ? p9_client_create+0x798/0x1230 [ 3260.121048] ? kfree+0xd7/0x340 [ 3260.121690] p9_client_create+0xa76/0x1230 [ 3260.122490] ? p9_client_flush+0x430/0x430 [ 3260.123288] ? trace_hardirqs_on+0x5b/0x180 [ 3260.124111] ? lockdep_init_map_type+0x2c7/0x780 [ 3260.125012] ? __raw_spin_lock_init+0x36/0x110 [ 3260.125877] v9fs_session_init+0x1dd/0x1680 [ 3260.126695] ? lock_release+0x680/0x680 [ 3260.127463] ? kmem_cache_alloc_trace+0x151/0x320 [ 3260.128373] ? v9fs_show_options+0x690/0x690 [ 3260.129205] ? trace_hardirqs_on+0x5b/0x180 [ 3260.130017] ? kasan_unpoison_shadow+0x33/0x50 [ 3260.130884] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3260.131861] v9fs_mount+0x79/0x8f0 [ 3260.132540] ? v9fs_write_inode+0x60/0x60 [ 3260.133329] legacy_get_tree+0x105/0x220 [ 3260.134115] vfs_get_tree+0x8e/0x300 [ 3260.134822] path_mount+0x1429/0x2120 [ 3260.135580] ? strncpy_from_user+0x9e/0x470 [ 3260.136413] ? finish_automount+0xa90/0xa90 [ 3260.137223] ? getname_flags.part.0+0x1dd/0x4f0 [ 3260.138087] ? _copy_from_user+0xfb/0x1b0 [ 3260.138914] __x64_sys_mount+0x282/0x300 [ 3260.139756] ? copy_mnt_ns+0xa00/0xa00 [ 3260.140554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3260.141619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3260.142667] do_syscall_64+0x33/0x40 [ 3260.143439] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3260.144481] RIP: 0033:0x7fbfa6f6fb19 [ 3260.145241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3260.148659] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3260.150066] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3260.151269] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3260.152503] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3260.153609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3260.154715] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:37:42 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2010000000000000, 0x0) 05:37:42 executing program 0: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3260.247190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3260.251009] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:37:42 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8cffffff00000000, 0x0) 05:37:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf8990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6ffffff00000000, 0x0) 05:37:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf9990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:56 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) (fail_nth: 1) 05:37:56 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffff000}]}]}, 0x24}}, 0x0) 05:37:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 94) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:37:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 47) 05:37:56 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3274.627310] FAULT_INJECTION: forcing a failure. [ 3274.627310] name failslab, interval 1, probability 0, space 0, times 0 [ 3274.629798] CPU: 0 PID: 68102 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3274.631241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3274.632989] Call Trace: [ 3274.633550] dump_stack+0x107/0x167 [ 3274.634324] should_fail.cold+0x5/0xa [ 3274.635128] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3274.636237] ? create_object.isra.0+0x3a/0xa20 [ 3274.637196] should_failslab+0x5/0x20 [ 3274.637994] kmem_cache_alloc+0x5b/0x310 [ 3274.638844] ? mark_held_locks+0x9e/0xe0 [ 3274.639702] create_object.isra.0+0x3a/0xa20 [ 3274.640634] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3274.641705] kmem_cache_alloc_node+0x169/0x330 [ 3274.642675] __alloc_skb+0x6d/0x5b0 [ 3274.643452] skb_segment+0x9d8/0x3aa0 [ 3274.644267] ? __lock_acquire+0xbb1/0x5b00 [ 3274.645192] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3274.646240] ? lock_acquire+0x197/0x470 [ 3274.647088] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3274.648211] __udp_gso_segment+0x11c6/0x1830 [ 3274.649134] ? __sk_receive_skb+0x830/0x830 [ 3274.650053] udp4_ufo_fragment+0x528/0x720 [ 3274.650950] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3274.652009] inet_gso_segment+0x4fb/0x11a0 [ 3274.652907] skb_mac_gso_segment+0x273/0x570 [ 3274.653830] ? inet_sock_destruct+0x840/0x840 [ 3274.654783] ? skb_network_protocol+0x650/0x650 [ 3274.655759] ? skb_crc32c_csum_help+0x80/0x80 [ 3274.656718] ? lock_acquire+0x197/0x470 [ 3274.657553] ? __dev_queue_xmit+0x1c6/0x2690 [ 3274.658485] __skb_gso_segment+0x32d/0x6d0 [ 3274.659375] ? mark_lock+0xf5/0x2df0 [ 3274.660178] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3274.661285] ? lock_chain_count+0x20/0x20 [ 3274.662161] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3274.663120] __dev_queue_xmit+0x825/0x2690 [ 3274.664022] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3274.665116] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3274.666090] ? mark_held_locks+0x9e/0xe0 [ 3274.666948] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3274.668073] neigh_connected_output+0x382/0x4d0 [ 3274.669071] ip_finish_output2+0x6f1/0x21f0 [ 3274.669982] ? nf_hook_slow+0xfc/0x1e0 [ 3274.670800] ? ip_frag_next+0x9e0/0x9e0 [ 3274.671637] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3274.672708] __ip_finish_output.part.0+0x5f3/0xb50 [ 3274.673749] ? ip_fragment.constprop.0+0x240/0x240 [ 3274.674781] ? netif_rx_ni+0xe7/0x300 [ 3274.675593] ip_mc_output+0x401/0xa30 [ 3274.676414] ip_send_skb+0xdd/0x260 [ 3274.677184] udp_send_skb+0x6da/0x11d0 [ 3274.678020] udp_sendmsg+0x139a/0x2160 [ 3274.678838] ? mark_lock+0xf5/0x2df0 [ 3274.679628] ? ip_frag_init+0x350/0x350 [ 3274.680479] ? lock_chain_count+0x20/0x20 [ 3274.681357] ? udp_setsockopt+0xc0/0xc0 [ 3274.682196] ? mark_lock+0xf5/0x2df0 [ 3274.682982] ? lock_acquire+0x197/0x470 [ 3274.683835] ? lock_chain_count+0x20/0x20 [ 3274.684699] ? mark_lock+0xf5/0x2df0 [ 3274.685492] ? mark_lock+0xf5/0x2df0 [ 3274.686273] ? lock_chain_count+0x20/0x20 [ 3274.687143] ? __lock_acquire+0xbb1/0x5b00 [ 3274.688038] ? lock_chain_count+0x20/0x20 [ 3274.688926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3274.690047] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3274.690920] ? udp_v6_push_pending_frames+0x360/0x360 [ 3274.692024] ? mark_lock+0xf5/0x2df0 [ 3274.692818] ? lock_acquire+0x197/0x470 [ 3274.693657] ? find_held_lock+0x2c/0x110 [ 3274.694524] ? __might_fault+0xd3/0x180 [ 3274.695356] ? lock_downgrade+0x6d0/0x6d0 [ 3274.696245] ? lock_downgrade+0x6d0/0x6d0 [ 3274.697124] ? sock_has_perm+0x1ea/0x280 [ 3274.697972] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3274.699052] ? _copy_from_user+0xfb/0x1b0 [ 3274.699924] ? __import_iovec+0x458/0x590 [ 3274.700796] ? udp_v6_push_pending_frames+0x360/0x360 [ 3274.701874] inet6_sendmsg+0x105/0x140 [ 3274.702690] ? inet6_compat_ioctl+0x320/0x320 [ 3274.703626] __sock_sendmsg+0xf2/0x190 [ 3274.704448] ____sys_sendmsg+0x70d/0x870 [ 3274.705304] ? sock_write_iter+0x3d0/0x3d0 [ 3274.706188] ? do_recvmmsg+0x6d0/0x6d0 [ 3274.707004] ? lock_downgrade+0x6d0/0x6d0 [ 3274.707873] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3274.708979] ___sys_sendmsg+0xf3/0x170 [ 3274.709796] ? sendmsg_copy_msghdr+0x160/0x160 [ 3274.710755] ? __fget_files+0x2cf/0x520 [ 3274.711591] ? lock_downgrade+0x6d0/0x6d0 [ 3274.712465] ? find_held_lock+0x2c/0x110 [ 3274.713328] ? __fget_files+0x2f8/0x520 [ 3274.714165] ? __fget_light+0xea/0x290 [ 3274.714988] __sys_sendmsg+0xe5/0x1b0 [ 3274.715784] ? __sys_sendmsg_sock+0x40/0x40 [ 3274.716690] ? rcu_read_lock_any_held+0x75/0xa0 [ 3274.717681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3274.718780] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3274.719866] ? trace_hardirqs_on+0x5b/0x180 [ 3274.720778] do_syscall_64+0x33/0x40 [ 3274.721551] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3274.722630] RIP: 0033:0x7f3e899f4b19 [ 3274.723405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3274.727262] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3274.728857] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3274.730346] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3274.731837] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3274.733347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3274.734838] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3274.758907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3274.767609] FAULT_INJECTION: forcing a failure. [ 3274.767609] name failslab, interval 1, probability 0, space 0, times 0 [ 3274.770152] CPU: 0 PID: 68117 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3274.771569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3274.773285] Call Trace: [ 3274.773836] dump_stack+0x107/0x167 [ 3274.774596] should_fail.cold+0x5/0xa [ 3274.775385] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3274.776587] should_failslab+0x5/0x20 [ 3274.776641] kmem_cache_alloc+0x5b/0x310 [ 3274.776668] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3274.776696] idr_get_free+0x4b5/0x8f0 [ 3274.780237] idr_alloc_u32+0x170/0x2d0 [ 3274.781031] ? __fprop_inc_percpu_max+0x130/0x130 [ 3274.782014] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3274.783107] ? lock_release+0x680/0x680 [ 3274.783921] idr_alloc+0xc2/0x130 [ 3274.784645] ? idr_alloc_u32+0x2d0/0x2d0 [ 3274.785471] ? rwlock_bug.part.0+0x90/0x90 [ 3274.786346] p9_client_prepare_req.part.0+0x612/0xac0 [ 3274.787403] p9_client_rpc+0x220/0x1370 [ 3274.788233] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3274.789311] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3274.790396] ? pipe_poll+0x21b/0x7f0 [ 3274.791152] ? p9_fd_close+0x4a0/0x4a0 [ 3274.791951] ? anon_pipe_buf_release+0x280/0x280 [ 3274.792915] ? p9_fd_poll+0x1e0/0x2c0 [ 3274.793702] ? p9_fd_create+0x357/0x4a0 [ 3274.794519] ? p9_conn_create+0x510/0x510 [ 3274.795362] ? p9_client_create+0x798/0x1230 [ 3274.796272] ? kfree+0xd7/0x340 [ 3274.796954] p9_client_create+0xa76/0x1230 [ 3274.797833] ? p9_client_flush+0x430/0x430 [ 3274.798696] ? trace_hardirqs_on+0x5b/0x180 [ 3274.799584] ? lockdep_init_map_type+0x2c7/0x780 [ 3274.800563] ? __raw_spin_lock_init+0x36/0x110 [ 3274.801497] v9fs_session_init+0x1dd/0x1680 [ 3274.802374] ? lock_release+0x680/0x680 [ 3274.803202] ? kmem_cache_alloc_trace+0x151/0x320 [ 3274.804196] ? v9fs_show_options+0x690/0x690 [ 3274.805103] ? trace_hardirqs_on+0x5b/0x180 [ 3274.805990] ? kasan_unpoison_shadow+0x33/0x50 [ 3274.806918] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3274.807960] v9fs_mount+0x79/0x8f0 [ 3274.808658] ? v9fs_write_inode+0x60/0x60 [ 3274.809484] legacy_get_tree+0x105/0x220 [ 3274.810297] vfs_get_tree+0x8e/0x300 [ 3274.811054] path_mount+0x1429/0x2120 [ 3274.811830] ? strncpy_from_user+0x9e/0x470 [ 3274.812713] ? finish_automount+0xa90/0xa90 [ 3274.813582] ? getname_flags.part.0+0x1dd/0x4f0 [ 3274.814513] ? _copy_from_user+0xfb/0x1b0 [ 3274.815357] __x64_sys_mount+0x282/0x300 [ 3274.816191] ? copy_mnt_ns+0xa00/0xa00 [ 3274.816981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3274.818034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3274.819072] do_syscall_64+0x33/0x40 [ 3274.819812] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3274.820850] RIP: 0033:0x7fbfa6f6fb19 [ 3274.821600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3274.825316] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3274.826855] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3274.828298] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3274.829742] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3274.831178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3274.832627] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:37:56 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3274.871474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3274.929209] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=68322 comm=syz-executor.0 05:37:56 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xffffff7f}]}]}, 0x24}}, 0x0) [ 3274.931915] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=68322 comm=syz-executor.0 05:37:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:37:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf9fdffff00000000, 0x0) 05:37:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfa990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:37:57 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:37:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 48) [ 3275.046950] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3275.060896] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3275.128572] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=68481 comm=syz-executor.0 [ 3275.130838] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=68481 comm=syz-executor.0 05:37:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3275.180867] FAULT_INJECTION: forcing a failure. [ 3275.180867] name failslab, interval 1, probability 0, space 0, times 0 [ 3275.183740] CPU: 1 PID: 68526 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3275.185532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3275.187666] Call Trace: [ 3275.188362] dump_stack+0x107/0x167 [ 3275.189339] should_fail.cold+0x5/0xa 05:37:57 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xffffff9e}]}]}, 0x24}}, 0x0) 05:37:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfb990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3275.190345] ? create_object.isra.0+0x3a/0xa20 [ 3275.191674] should_failslab+0x5/0x20 [ 3275.192713] kmem_cache_alloc+0x5b/0x310 [ 3275.193773] create_object.isra.0+0x3a/0xa20 [ 3275.194919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3275.196274] kmem_cache_alloc+0x159/0x310 [ 3275.197397] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3275.198857] idr_get_free+0x4b5/0x8f0 [ 3275.199898] idr_alloc_u32+0x170/0x2d0 [ 3275.200929] ? __fprop_inc_percpu_max+0x130/0x130 [ 3275.202214] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3275.203609] ? lock_release+0x680/0x680 [ 3275.204683] idr_alloc+0xc2/0x130 [ 3275.205583] ? idr_alloc_u32+0x2d0/0x2d0 [ 3275.206652] ? rwlock_bug.part.0+0x90/0x90 [ 3275.207562] p9_client_prepare_req.part.0+0x612/0xac0 [ 3275.208687] p9_client_rpc+0x220/0x1370 [ 3275.209564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3275.210712] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3275.211859] ? pipe_poll+0x21b/0x7f0 [ 3275.212671] ? p9_fd_close+0x4a0/0x4a0 [ 3275.213497] ? anon_pipe_buf_release+0x280/0x280 [ 3275.214508] ? p9_fd_poll+0x1e0/0x2c0 [ 3275.215326] ? p9_fd_create+0x357/0x4a0 [ 3275.216184] ? p9_conn_create+0x510/0x510 [ 3275.217057] ? p9_client_create+0x798/0x1230 [ 3275.217996] ? kfree+0xd7/0x340 [ 3275.218705] p9_client_create+0xa76/0x1230 [ 3275.219617] ? p9_client_flush+0x430/0x430 [ 3275.220541] ? trace_hardirqs_on+0x5b/0x180 [ 3275.221458] ? lockdep_init_map_type+0x2c7/0x780 [ 3275.222477] ? __raw_spin_lock_init+0x36/0x110 [ 3275.223474] v9fs_session_init+0x1dd/0x1680 [ 3275.224448] ? lock_release+0x680/0x680 [ 3275.225322] ? kmem_cache_alloc_trace+0x151/0x320 [ 3275.226354] ? v9fs_show_options+0x690/0x690 [ 3275.227304] ? trace_hardirqs_on+0x5b/0x180 [ 3275.228224] ? kasan_unpoison_shadow+0x33/0x50 [ 3275.229190] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3275.230248] v9fs_mount+0x79/0x8f0 [ 3275.230996] ? v9fs_write_inode+0x60/0x60 [ 3275.231867] legacy_get_tree+0x105/0x220 [ 3275.232747] vfs_get_tree+0x8e/0x300 [ 3275.233537] path_mount+0x1429/0x2120 [ 3275.234355] ? strncpy_from_user+0x9e/0x470 [ 3275.235256] ? finish_automount+0xa90/0xa90 [ 3275.236168] ? getname_flags.part.0+0x1dd/0x4f0 [ 3275.237141] ? _copy_from_user+0xfb/0x1b0 [ 3275.238018] __x64_sys_mount+0x282/0x300 [ 3275.238873] ? copy_mnt_ns+0xa00/0xa00 [ 3275.239685] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3275.240781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3275.241867] do_syscall_64+0x33/0x40 [ 3275.242649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3275.243715] RIP: 0033:0x7fbfa6f6fb19 [ 3275.244530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3275.248353] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3275.249940] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3275.251430] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3275.252928] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3275.254435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3275.255931] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:37:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 95) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3275.329158] FAULT_INJECTION: forcing a failure. [ 3275.329158] name failslab, interval 1, probability 0, space 0, times 0 [ 3275.330837] CPU: 0 PID: 68695 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3275.331845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3275.333047] Call Trace: [ 3275.333434] dump_stack+0x107/0x167 [ 3275.333963] should_fail.cold+0x5/0xa [ 3275.334534] should_failslab+0x5/0x20 [ 3275.335092] __kmalloc_node_track_caller+0x74/0x3b0 [ 3275.335820] ? skb_segment+0x9d8/0x3aa0 [ 3275.336405] __alloc_skb+0xb1/0x5b0 [ 3275.336954] skb_segment+0x9d8/0x3aa0 [ 3275.337507] ? __lock_acquire+0xbb1/0x5b00 [ 3275.338138] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3275.338863] ? lock_acquire+0x197/0x470 [ 3275.339442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3275.340209] __udp_gso_segment+0x11c6/0x1830 [ 3275.340837] ? __sk_receive_skb+0x830/0x830 [ 3275.341464] udp4_ufo_fragment+0x528/0x720 [ 3275.342075] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3275.342792] inet_gso_segment+0x4fb/0x11a0 [ 3275.343408] skb_mac_gso_segment+0x273/0x570 [ 3275.344046] ? inet_sock_destruct+0x840/0x840 [ 3275.344687] ? skb_network_protocol+0x650/0x650 [ 3275.345355] ? skb_crc32c_csum_help+0x80/0x80 [ 3275.346006] ? lock_acquire+0x197/0x470 [ 3275.346572] ? __dev_queue_xmit+0x1c6/0x2690 [ 3275.347195] __skb_gso_segment+0x32d/0x6d0 [ 3275.347794] ? mark_lock+0xf5/0x2df0 [ 3275.348339] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3275.349079] ? lock_chain_count+0x20/0x20 [ 3275.349664] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3275.350314] __dev_queue_xmit+0x825/0x2690 [ 3275.350914] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3275.351651] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3275.352313] ? mark_held_locks+0x9e/0xe0 [ 3275.352906] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3275.353678] neigh_connected_output+0x382/0x4d0 [ 3275.354352] ip_finish_output2+0x6f1/0x21f0 [ 3275.354969] ? nf_hook_slow+0xfc/0x1e0 [ 3275.355542] ? ip_frag_next+0x9e0/0x9e0 [ 3275.356113] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3275.356856] __ip_finish_output.part.0+0x5f3/0xb50 [ 3275.357569] ? ip_fragment.constprop.0+0x240/0x240 [ 3275.358287] ? netif_rx_ni+0xe7/0x300 [ 3275.358852] ip_mc_output+0x401/0xa30 [ 3275.359415] ip_send_skb+0xdd/0x260 [ 3275.359947] udp_send_skb+0x6da/0x11d0 [ 3275.360537] udp_sendmsg+0x139a/0x2160 [ 3275.361099] ? mark_lock+0xf5/0x2df0 [ 3275.361642] ? ip_frag_init+0x350/0x350 [ 3275.362224] ? lock_chain_count+0x20/0x20 [ 3275.362813] ? udp_setsockopt+0xc0/0xc0 [ 3275.363396] ? mark_lock+0xf5/0x2df0 [ 3275.363936] ? lock_acquire+0x197/0x470 [ 3275.364531] ? lock_chain_count+0x20/0x20 [ 3275.365130] ? mark_lock+0xf5/0x2df0 [ 3275.365680] ? mark_lock+0xf5/0x2df0 [ 3275.366215] ? lock_chain_count+0x20/0x20 [ 3275.366819] ? __lock_acquire+0xbb1/0x5b00 [ 3275.367440] ? lock_chain_count+0x20/0x20 [ 3275.368055] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3275.368831] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3275.369434] ? udp_v6_push_pending_frames+0x360/0x360 [ 3275.370187] ? mark_lock+0xf5/0x2df0 [ 3275.370728] ? lock_acquire+0x197/0x470 [ 3275.371310] ? find_held_lock+0x2c/0x110 [ 3275.371904] ? __might_fault+0xd3/0x180 [ 3275.372503] ? lock_downgrade+0x6d0/0x6d0 [ 3275.373106] ? lock_downgrade+0x6d0/0x6d0 [ 3275.373711] ? sock_has_perm+0x1ea/0x280 [ 3275.374290] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3275.375043] ? _copy_from_user+0xfb/0x1b0 [ 3275.375651] ? __import_iovec+0x458/0x590 [ 3275.376252] ? udp_v6_push_pending_frames+0x360/0x360 [ 3275.377008] inet6_sendmsg+0x105/0x140 [ 3275.377565] ? inet6_compat_ioctl+0x320/0x320 [ 3275.378216] __sock_sendmsg+0xf2/0x190 [ 3275.378777] ____sys_sendmsg+0x70d/0x870 [ 3275.379366] ? sock_write_iter+0x3d0/0x3d0 [ 3275.379977] ? do_recvmmsg+0x6d0/0x6d0 [ 3275.380551] ? lock_downgrade+0x6d0/0x6d0 [ 3275.381149] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3275.381913] ___sys_sendmsg+0xf3/0x170 [ 3275.382476] ? sendmsg_copy_msghdr+0x160/0x160 [ 3275.383141] ? __fget_files+0x2cf/0x520 [ 3275.383711] ? lock_downgrade+0x6d0/0x6d0 [ 3275.384308] ? find_held_lock+0x2c/0x110 [ 3275.384891] ? __fget_files+0x2f8/0x520 [ 3275.385472] ? __fget_light+0xea/0x290 [ 3275.386047] __sys_sendmsg+0xe5/0x1b0 [ 3275.386595] ? __sys_sendmsg_sock+0x40/0x40 [ 3275.387211] ? rcu_read_lock_any_held+0x75/0xa0 [ 3275.387891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3275.388658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3275.389388] ? trace_hardirqs_on+0x5b/0x180 [ 3275.390007] do_syscall_64+0x33/0x40 [ 3275.390546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3275.391282] RIP: 0033:0x7f3e899f4b19 [ 3275.391811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3275.394463] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3275.395545] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3275.396566] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3275.397580] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3275.398592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3275.399617] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3275.442496] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:38:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffffff00000000, 0x0) 05:38:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 96) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:38:13 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:38:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:38:13 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:38:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfc990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:38:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 49) 05:38:13 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffff0}]}]}, 0x24}}, 0x0) [ 3291.968667] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3291.991347] FAULT_INJECTION: forcing a failure. [ 3291.991347] name failslab, interval 1, probability 0, space 0, times 0 [ 3291.994035] CPU: 0 PID: 68770 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3291.994796] FAULT_INJECTION: forcing a failure. [ 3291.994796] name failslab, interval 1, probability 0, space 0, times 0 [ 3291.995635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3291.999347] Call Trace: [ 3291.999960] dump_stack+0x107/0x167 [ 3292.000812] should_fail.cold+0x5/0xa [ 3292.001693] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3292.002901] ? create_object.isra.0+0x3a/0xa20 [ 3292.003957] should_failslab+0x5/0x20 [ 3292.004841] kmem_cache_alloc+0x5b/0x310 [ 3292.005774] ? mark_held_locks+0x9e/0xe0 [ 3292.006716] create_object.isra.0+0x3a/0xa20 [ 3292.007759] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3292.008944] kmem_cache_alloc_node+0x169/0x330 [ 3292.010006] __alloc_skb+0x6d/0x5b0 [ 3292.010854] skb_segment+0x9d8/0x3aa0 [ 3292.011734] ? __lock_acquire+0xbb1/0x5b00 [ 3292.012759] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3292.013907] ? lock_acquire+0x197/0x470 [ 3292.014824] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.016038] __udp_gso_segment+0x11c6/0x1830 [ 3292.017042] ? __sk_receive_skb+0x830/0x830 [ 3292.018012] udp4_ufo_fragment+0x528/0x720 [ 3292.018965] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3292.020072] inet_gso_segment+0x4fb/0x11a0 [ 3292.021039] skb_mac_gso_segment+0x273/0x570 [ 3292.022027] ? inet_sock_destruct+0x840/0x840 [ 3292.023026] ? skb_network_protocol+0x650/0x650 [ 3292.024060] ? skb_crc32c_csum_help+0x80/0x80 [ 3292.025065] ? lock_acquire+0x197/0x470 [ 3292.025953] ? __dev_queue_xmit+0x1c6/0x2690 [ 3292.026948] __skb_gso_segment+0x32d/0x6d0 [ 3292.027892] ? mark_lock+0xf5/0x2df0 [ 3292.028740] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3292.029917] ? lock_chain_count+0x20/0x20 [ 3292.030847] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3292.031879] __dev_queue_xmit+0x825/0x2690 [ 3292.033007] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3292.034166] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3292.035197] ? mark_held_locks+0x9e/0xe0 [ 3292.036112] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3292.037298] neigh_connected_output+0x382/0x4d0 [ 3292.038356] ip_finish_output2+0x6f1/0x21f0 [ 3292.039324] ? nf_hook_slow+0xfc/0x1e0 [ 3292.040203] ? ip_frag_next+0x9e0/0x9e0 [ 3292.041104] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3292.042229] __ip_finish_output.part.0+0x5f3/0xb50 [ 3292.043327] ? ip_fragment.constprop.0+0x240/0x240 [ 3292.044423] ? netif_rx_ni+0xe7/0x300 [ 3292.045295] ip_mc_output+0x401/0xa30 [ 3292.046155] ip_send_skb+0xdd/0x260 [ 3292.046976] udp_send_skb+0x6da/0x11d0 [ 3292.047861] udp_sendmsg+0x139a/0x2160 [ 3292.048737] ? mark_lock+0xf5/0x2df0 [ 3292.049572] ? ip_frag_init+0x350/0x350 [ 3292.050474] ? lock_chain_count+0x20/0x20 [ 3292.051406] ? udp_setsockopt+0xc0/0xc0 [ 3292.052291] ? mark_lock+0xf5/0x2df0 [ 3292.053132] ? lock_acquire+0x197/0x470 [ 3292.054024] ? lock_chain_count+0x20/0x20 [ 3292.054945] ? mark_lock+0xf5/0x2df0 [ 3292.055781] ? mark_lock+0xf5/0x2df0 [ 3292.056624] ? lock_chain_count+0x20/0x20 [ 3292.057553] ? __lock_acquire+0xbb1/0x5b00 [ 3292.058502] ? lock_chain_count+0x20/0x20 [ 3292.059447] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.060640] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3292.061568] ? udp_v6_push_pending_frames+0x360/0x360 [ 3292.062730] ? mark_lock+0xf5/0x2df0 [ 3292.063567] ? lock_acquire+0x197/0x470 [ 3292.064452] ? find_held_lock+0x2c/0x110 [ 3292.065374] ? __might_fault+0xd3/0x180 [ 3292.066266] ? lock_downgrade+0x6d0/0x6d0 [ 3292.067195] ? lock_downgrade+0x6d0/0x6d0 [ 3292.068129] ? sock_has_perm+0x1ea/0x280 [ 3292.069045] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3292.070199] ? _copy_from_user+0xfb/0x1b0 [ 3292.071144] ? __import_iovec+0x458/0x590 [ 3292.072070] ? udp_v6_push_pending_frames+0x360/0x360 [ 3292.073236] inet6_sendmsg+0x105/0x140 [ 3292.074106] ? inet6_compat_ioctl+0x320/0x320 [ 3292.075113] __sock_sendmsg+0xf2/0x190 [ 3292.075988] ____sys_sendmsg+0x70d/0x870 [ 3292.076908] ? sock_write_iter+0x3d0/0x3d0 [ 3292.077854] ? do_recvmmsg+0x6d0/0x6d0 [ 3292.078725] ? lock_downgrade+0x6d0/0x6d0 [ 3292.079653] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.080833] ___sys_sendmsg+0xf3/0x170 [ 3292.081706] ? sendmsg_copy_msghdr+0x160/0x160 [ 3292.082731] ? __fget_files+0x2cf/0x520 [ 3292.083619] ? lock_downgrade+0x6d0/0x6d0 [ 3292.084538] ? find_held_lock+0x2c/0x110 [ 3292.085468] ? __fget_files+0x2f8/0x520 [ 3292.086365] ? __fget_light+0xea/0x290 [ 3292.087247] __sys_sendmsg+0xe5/0x1b0 [ 3292.088099] ? __sys_sendmsg_sock+0x40/0x40 [ 3292.089078] ? rcu_read_lock_any_held+0x75/0xa0 [ 3292.090137] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.091317] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3292.092466] ? trace_hardirqs_on+0x5b/0x180 [ 3292.093441] do_syscall_64+0x33/0x40 [ 3292.094280] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3292.095427] RIP: 0033:0x7f3e899f4b19 [ 3292.096262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3292.100348] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3292.102056] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3292.103648] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3292.105329] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3292.106948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3292.108542] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 [ 3292.110180] CPU: 1 PID: 68779 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3292.111310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3292.112676] Call Trace: [ 3292.113111] dump_stack+0x107/0x167 [ 3292.113712] should_fail.cold+0x5/0xa [ 3292.114351] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3292.115286] should_failslab+0x5/0x20 [ 3292.115920] kmem_cache_alloc+0x5b/0x310 [ 3292.116601] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3292.117512] idr_get_free+0x4b5/0x8f0 [ 3292.118151] idr_alloc_u32+0x170/0x2d0 [ 3292.118795] ? __fprop_inc_percpu_max+0x130/0x130 [ 3292.119536] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3292.120407] ? lock_release+0x680/0x680 [ 3292.121031] idr_alloc+0xc2/0x130 [ 3292.121598] ? idr_alloc_u32+0x2d0/0x2d0 [ 3292.122223] ? rwlock_bug.part.0+0x90/0x90 [ 3292.122923] p9_client_prepare_req.part.0+0x612/0xac0 [ 3292.123726] p9_client_rpc+0x220/0x1370 [ 3292.124360] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.125175] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3292.126035] ? pipe_poll+0x21b/0x7f0 [ 3292.126599] ? p9_fd_close+0x4a0/0x4a0 [ 3292.127214] ? anon_pipe_buf_release+0x280/0x280 [ 3292.127938] ? p9_fd_poll+0x1e0/0x2c0 [ 3292.128562] ? p9_fd_create+0x357/0x4a0 [ 3292.129164] ? p9_conn_create+0x510/0x510 [ 3292.129844] ? p9_client_create+0x798/0x1230 [ 3292.130505] ? kfree+0xd7/0x340 [ 3292.131048] p9_client_create+0xa76/0x1230 [ 3292.131695] ? p9_client_flush+0x430/0x430 [ 3292.132401] ? trace_hardirqs_on+0x5b/0x180 [ 3292.133056] ? lockdep_init_map_type+0x2c7/0x780 [ 3292.133815] ? __raw_spin_lock_init+0x36/0x110 [ 3292.134511] v9fs_session_init+0x1dd/0x1680 [ 3292.135221] ? lock_release+0x680/0x680 [ 3292.135827] ? kmem_cache_alloc_trace+0x151/0x320 [ 3292.136619] ? v9fs_show_options+0x690/0x690 [ 3292.137284] ? trace_hardirqs_on+0x5b/0x180 [ 3292.137984] ? kasan_unpoison_shadow+0x33/0x50 [ 3292.138671] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3292.139485] v9fs_mount+0x79/0x8f0 [ 3292.140022] ? v9fs_write_inode+0x60/0x60 [ 3292.140717] legacy_get_tree+0x105/0x220 [ 3292.141334] vfs_get_tree+0x8e/0x300 [ 3292.141938] path_mount+0x1429/0x2120 [ 3292.142519] ? strncpy_from_user+0x9e/0x470 [ 3292.143224] ? finish_automount+0xa90/0xa90 [ 3292.143877] ? getname_flags.part.0+0x1dd/0x4f0 [ 3292.144637] ? _copy_from_user+0xfb/0x1b0 [ 3292.145264] __x64_sys_mount+0x282/0x300 [ 3292.145917] ? copy_mnt_ns+0xa00/0xa00 [ 3292.146548] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.147396] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3292.148173] do_syscall_64+0x33/0x40 [ 3292.148780] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3292.149620] RIP: 0033:0x7fbfa6f6fb19 [ 3292.150218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3292.152990] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3292.154250] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3292.155395] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3292.156525] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3292.157696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3292.158828] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3292.203483] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=68785 comm=syz-executor.0 [ 3292.205361] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=68785 comm=syz-executor.0 05:38:14 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:38:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:38:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 97) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:38:14 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x8000000000000}]}]}, 0x24}}, 0x0) 05:38:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfd990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3292.366110] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:38:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 50) [ 3292.446730] FAULT_INJECTION: forcing a failure. [ 3292.446730] name failslab, interval 1, probability 0, space 0, times 0 [ 3292.448254] CPU: 1 PID: 69127 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3292.449270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3292.450450] Call Trace: [ 3292.450833] dump_stack+0x107/0x167 [ 3292.451360] should_fail.cold+0x5/0xa [ 3292.451921] should_failslab+0x5/0x20 [ 3292.452480] __kmalloc_node_track_caller+0x74/0x3b0 [ 3292.453207] ? skb_segment+0x9d8/0x3aa0 [ 3292.453739] __alloc_skb+0xb1/0x5b0 [ 3292.454247] skb_segment+0x9d8/0x3aa0 [ 3292.454755] ? __lock_acquire+0xbb1/0x5b00 [ 3292.455379] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3292.456063] ? lock_acquire+0x197/0x470 [ 3292.456627] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.457357] __udp_gso_segment+0x11c6/0x1830 [ 3292.457955] ? __sk_receive_skb+0x830/0x830 [ 3292.458543] udp4_ufo_fragment+0x528/0x720 [ 3292.459126] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3292.459789] inet_gso_segment+0x4fb/0x11a0 [ 3292.460392] skb_mac_gso_segment+0x273/0x570 [ 3292.461000] ? inet_sock_destruct+0x840/0x840 [ 3292.461617] ? skb_network_protocol+0x650/0x650 [ 3292.462267] ? skb_crc32c_csum_help+0x80/0x80 [ 3292.462855] ? lock_acquire+0x197/0x470 [ 3292.463411] ? __dev_queue_xmit+0x1c6/0x2690 [ 3292.464006] __skb_gso_segment+0x32d/0x6d0 [ 3292.464595] ? mark_lock+0xf5/0x2df0 [ 3292.465105] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3292.465806] ? lock_chain_count+0x20/0x20 [ 3292.466390] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3292.467007] __dev_queue_xmit+0x825/0x2690 [ 3292.467588] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3292.468300] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3292.468931] ? mark_held_locks+0x9e/0xe0 [ 3292.469484] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3292.470216] neigh_connected_output+0x382/0x4d0 [ 3292.470835] ip_finish_output2+0x6f1/0x21f0 [ 3292.471445] ? nf_hook_slow+0xfc/0x1e0 [ 3292.471968] ? ip_frag_next+0x9e0/0x9e0 [ 3292.472512] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3292.473211] __ip_finish_output.part.0+0x5f3/0xb50 [ 3292.473868] ? ip_fragment.constprop.0+0x240/0x240 [ 3292.474544] ? netif_rx_ni+0xe7/0x300 [ 3292.475063] ip_mc_output+0x401/0xa30 [ 3292.475583] ip_send_skb+0xdd/0x260 [ 3292.476084] udp_send_skb+0x6da/0x11d0 [ 3292.476643] udp_sendmsg+0x139a/0x2160 [ 3292.477230] ? mark_lock+0xf5/0x2df0 [ 3292.477767] ? ip_frag_init+0x350/0x350 [ 3292.478342] ? lock_chain_count+0x20/0x20 [ 3292.478921] ? udp_setsockopt+0xc0/0xc0 [ 3292.479463] ? mark_lock+0xf5/0x2df0 [ 3292.479976] ? lock_acquire+0x197/0x470 [ 3292.480539] ? lock_chain_count+0x20/0x20 [ 3292.481130] ? mark_lock+0xf5/0x2df0 [ 3292.481641] ? mark_lock+0xf5/0x2df0 [ 3292.482181] ? lock_chain_count+0x20/0x20 [ 3292.482725] ? __lock_acquire+0xbb1/0x5b00 [ 3292.483330] ? lock_chain_count+0x20/0x20 [ 3292.483907] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.484675] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3292.485272] ? udp_v6_push_pending_frames+0x360/0x360 [ 3292.485983] ? mark_lock+0xf5/0x2df0 [ 3292.486497] ? lock_acquire+0x197/0x470 [ 3292.487039] ? find_held_lock+0x2c/0x110 [ 3292.487601] ? __might_fault+0xd3/0x180 [ 3292.488155] ? lock_downgrade+0x6d0/0x6d0 [ 3292.488715] ? lock_downgrade+0x6d0/0x6d0 [ 3292.489370] ? sock_has_perm+0x1ea/0x280 [ 3292.489943] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3292.490653] ? _copy_from_user+0xfb/0x1b0 [ 3292.491274] ? __import_iovec+0x458/0x590 [ 3292.491853] ? udp_v6_push_pending_frames+0x360/0x360 [ 3292.492626] inet6_sendmsg+0x105/0x140 [ 3292.493190] ? inet6_compat_ioctl+0x320/0x320 [ 3292.493807] __sock_sendmsg+0xf2/0x190 [ 3292.494398] ____sys_sendmsg+0x70d/0x870 [ 3292.494979] ? sock_write_iter+0x3d0/0x3d0 [ 3292.495569] ? do_recvmmsg+0x6d0/0x6d0 [ 3292.496117] ? lock_downgrade+0x6d0/0x6d0 [ 3292.496721] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3292.497447] ___sys_sendmsg+0xf3/0x170 [ 3292.497986] ? sendmsg_copy_msghdr+0x160/0x160 [ 3292.498612] ? __fget_files+0x2cf/0x520 [ 3292.499146] ? lock_downgrade+0x6d0/0x6d0 [ 3292.499711] ? find_held_lock+0x2c/0x110 [ 3292.500316] ? __fget_files+0x2f8/0x520 [ 3292.500871] ? __fget_light+0xea/0x290 [ 3292.501384] __sys_sendmsg+0xe5/0x1b0 [ 3292.501902] ? __sys_sendmsg_sock+0x40/0x40 [ 3292.502479] ? rcu_read_lock_any_held+0x75/0xa0 [ 3292.503120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.503830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3292.504527] ? trace_hardirqs_on+0x5b/0x180 [ 3292.505117] do_syscall_64+0x33/0x40 [ 3292.505621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3292.506314] RIP: 0033:0x7f3e899f4b19 [ 3292.506819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3292.509302] RSP: 002b:00007f3e86f49188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3292.510294] RAX: ffffffffffffffda RBX: 00007f3e89b08020 RCX: 00007f3e899f4b19 [ 3292.511225] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004 [ 3292.512160] RBP: 00007f3e86f491d0 R08: 0000000000000000 R09: 0000000000000000 [ 3292.513109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3292.514073] R13: 00007ffd2f4423ff R14: 00007f3e86f49300 R15: 0000000000022000 05:38:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x9}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:38:14 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3292.547947] FAULT_INJECTION: forcing a failure. 05:38:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffffffffffff000, 0x0) [ 3292.547947] name failslab, interval 1, probability 0, space 0, times 0 [ 3292.550975] CPU: 0 PID: 69155 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3292.552550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3292.554421] Call Trace: [ 3292.555011] dump_stack+0x107/0x167 [ 3292.555830] should_fail.cold+0x5/0xa [ 3292.556696] ? ___slab_alloc+0x360/0x700 [ 3292.557609] ? create_object.isra.0+0x3a/0xa20 [ 3292.558625] should_failslab+0x5/0x20 [ 3292.559475] kmem_cache_alloc+0x5b/0x310 [ 3292.560388] create_object.isra.0+0x3a/0xa20 [ 3292.561378] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3292.562527] kmem_cache_alloc+0x159/0x310 [ 3292.563475] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3292.564752] idr_get_free+0x4b5/0x8f0 [ 3292.565623] idr_alloc_u32+0x170/0x2d0 [ 3292.566501] ? __fprop_inc_percpu_max+0x130/0x130 [ 3292.567590] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3292.568808] ? lock_release+0x680/0x680 [ 3292.569705] idr_alloc+0xc2/0x130 [ 3292.570491] ? idr_alloc_u32+0x2d0/0x2d0 [ 3292.571402] ? rwlock_bug.part.0+0x90/0x90 [ 3292.572366] p9_client_prepare_req.part.0+0x612/0xac0 [ 3292.573034] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=69182 comm=syz-executor.0 [ 3292.573537] p9_client_rpc+0x220/0x1370 [ 3292.573559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.573590] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3292.575390] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=69182 comm=syz-executor.0 [ 3292.576256] ? pipe_poll+0x21b/0x7f0 [ 3292.581597] ? p9_fd_close+0x4a0/0x4a0 [ 3292.582466] ? anon_pipe_buf_release+0x280/0x280 [ 3292.583537] ? p9_fd_poll+0x1e0/0x2c0 [ 3292.584407] ? p9_fd_create+0x357/0x4a0 [ 3292.585320] ? p9_conn_create+0x510/0x510 [ 3292.586254] ? p9_client_create+0x798/0x1230 [ 3292.587243] ? kfree+0xd7/0x340 [ 3292.587995] p9_client_create+0xa76/0x1230 [ 3292.588969] ? p9_client_flush+0x430/0x430 [ 3292.589926] ? trace_hardirqs_on+0x5b/0x180 [ 3292.590896] ? lockdep_init_map_type+0x2c7/0x780 [ 3292.591954] ? __raw_spin_lock_init+0x36/0x110 [ 3292.592999] v9fs_session_init+0x1dd/0x1680 [ 3292.593978] ? lock_release+0x680/0x680 [ 3292.594888] ? kmem_cache_alloc_trace+0x151/0x320 [ 3292.595975] ? v9fs_show_options+0x690/0x690 [ 3292.596982] ? trace_hardirqs_on+0x5b/0x180 [ 3292.597949] ? kasan_unpoison_shadow+0x33/0x50 [ 3292.598972] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3292.600107] v9fs_mount+0x79/0x8f0 [ 3292.600920] ? v9fs_write_inode+0x60/0x60 [ 3292.601853] legacy_get_tree+0x105/0x220 [ 3292.602764] vfs_get_tree+0x8e/0x300 [ 3292.603596] path_mount+0x1429/0x2120 [ 3292.604458] ? strncpy_from_user+0x9e/0x470 [ 3292.605437] ? finish_automount+0xa90/0xa90 [ 3292.606402] ? getname_flags.part.0+0x1dd/0x4f0 [ 3292.607444] ? _copy_from_user+0xfb/0x1b0 [ 3292.608388] __x64_sys_mount+0x282/0x300 [ 3292.609315] ? copy_mnt_ns+0xa00/0xa00 [ 3292.610200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3292.611376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3292.612532] do_syscall_64+0x33/0x40 [ 3292.613401] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3292.614555] RIP: 0033:0x7fbfa6f6fb19 [ 3292.615404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3292.619547] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3292.621263] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3292.622862] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3292.624463] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3292.626085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3292.627687] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:38:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) getpeername(r0, &(0x7f0000000140)=@caif=@dgm, &(0x7f0000000000)=0x80) 05:38:14 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3292.674234] 9pnet_virtio: no channels available for device [ 3292.676258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=69425 comm=syz-executor.0 [ 3292.677752] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=69425 comm=syz-executor.0 [ 3292.686535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:38:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfe990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:38:14 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:38:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) writev(r0, &(0x7f0000001480)=[{&(0x7f0000000280)="ed577faafa94f8c20f828ea4d6b9a1ae9d79e2a825d2fbe922420d7c18b7a60f43fa47d80f476689abc3f12c5b7caebdfaf181cf101c93c774c8d7dde447777d28347ba42f61d684", 0x48}], 0x1) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x77359400}}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 3292.782008] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=69633 comm=syz-executor.0 [ 3292.783429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=69633 comm=syz-executor.0 05:38:14 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x40030000000000}]}]}, 0x24}}, 0x0) [ 3292.797150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=69637 comm=syz-executor.6 [ 3292.800038] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=69637 comm=syz-executor.6 05:38:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3292.895187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3292.900929] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:38:32 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xf}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:38:32 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:38:32 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf0ffffffffffff}]}]}, 0x24}}, 0x0) 05:38:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xff990000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:38:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 51) 05:38:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 98) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:38:32 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) 05:38:32 executing program 6: sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5c}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x88c4}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000001c0), 0x180800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 3310.913490] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=69966 comm=syz-executor.0 [ 3310.916155] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=69966 comm=syz-executor.0 [ 3310.923039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3310.927160] FAULT_INJECTION: forcing a failure. [ 3310.927160] name failslab, interval 1, probability 0, space 0, times 0 [ 3310.928814] 9pnet_virtio: no channels available for device  [ 3310.929569] CPU: 0 PID: 69962 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3310.929581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3310.929589] Call Trace: [ 3310.929623] dump_stack+0x107/0x167 [ 3310.935524] should_fail.cold+0x5/0xa [ 3310.936354] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3310.937606] should_failslab+0x5/0x20 [ 3310.938426] kmem_cache_alloc+0x5b/0x310 [ 3310.939310] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3310.940521] idr_get_free+0x4b5/0x8f0 [ 3310.941364] idr_alloc_u32+0x170/0x2d0 [ 3310.942200] ? __fprop_inc_percpu_max+0x130/0x130 [ 3310.943229] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3310.944365] ? lock_release+0x680/0x680 [ 3310.945214] idr_alloc+0xc2/0x130 [ 3310.945962] ? idr_alloc_u32+0x2d0/0x2d0 [ 3310.946824] ? rwlock_bug.part.0+0x90/0x90 [ 3310.947741] p9_client_prepare_req.part.0+0x612/0xac0 [ 3310.948850] p9_client_rpc+0x220/0x1370 [ 3310.949710] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3310.950835] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3310.951973] ? pipe_poll+0x21b/0x7f0 [ 3310.952765] ? p9_fd_close+0x4a0/0x4a0 [ 3310.953594] ? anon_pipe_buf_release+0x280/0x280 [ 3310.954600] ? p9_fd_poll+0x1e0/0x2c0 [ 3310.955416] ? p9_fd_create+0x357/0x4a0 [ 3310.956258] ? p9_conn_create+0x510/0x510 [ 3310.957134] ? p9_client_create+0x798/0x1230 [ 3310.958118] ? kfree+0xd7/0x340 [ 3310.958832] p9_client_create+0xa76/0x1230 [ 3310.959743] ? p9_client_flush+0x430/0x430 [ 3310.960641] ? trace_hardirqs_on+0x5b/0x180 [ 3310.961569] ? lockdep_init_map_type+0x2c7/0x780 [ 3310.962578] ? __raw_spin_lock_init+0x36/0x110 [ 3310.963555] v9fs_session_init+0x1dd/0x1680 [ 3310.964476] ? lock_release+0x680/0x680 [ 3310.965343] ? kmem_cache_alloc_trace+0x151/0x320 [ 3310.966371] ? v9fs_show_options+0x690/0x690 [ 3310.967329] ? trace_hardirqs_on+0x5b/0x180 [ 3310.968255] ? kasan_unpoison_shadow+0x33/0x50 [ 3310.969244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3310.970332] v9fs_mount+0x79/0x8f0 [ 3310.971096] ? v9fs_write_inode+0x60/0x60 [ 3310.971986] legacy_get_tree+0x105/0x220 [ 3310.972857] vfs_get_tree+0x8e/0x300 [ 3310.973662] path_mount+0x1429/0x2120 [ 3310.974483] ? strncpy_from_user+0x9e/0x470 [ 3310.975405] ? finish_automount+0xa90/0xa90 [ 3310.976326] ? getname_flags.part.0+0x1dd/0x4f0 [ 3310.977333] ? _copy_from_user+0xfb/0x1b0 [ 3310.978233] __x64_sys_mount+0x282/0x300 [ 3310.979100] ? copy_mnt_ns+0xa00/0xa00 [ 3310.979938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3310.981054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3310.982162] do_syscall_64+0x33/0x40 [ 3310.982956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3310.984049] RIP: 0033:0x7fbfa6f6fb19 [ 3310.984843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3310.988757] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3310.990386] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3310.991910] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3310.993441] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3310.994964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3310.996484] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3311.007661] FAULT_INJECTION: forcing a failure. [ 3311.007661] name failslab, interval 1, probability 0, space 0, times 0 [ 3311.010290] CPU: 1 PID: 69971 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3311.011874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3311.013753] Call Trace: [ 3311.014355] dump_stack+0x107/0x167 [ 3311.015179] should_fail.cold+0x5/0xa [ 3311.016045] ? create_object.isra.0+0x3a/0xa20 [ 3311.017082] should_failslab+0x5/0x20 [ 3311.017947] kmem_cache_alloc+0x5b/0x310 [ 3311.018870] create_object.isra.0+0x3a/0xa20 [ 3311.019857] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3311.021020] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3311.022174] ? skb_segment+0x9d8/0x3aa0 [ 3311.023080] __alloc_skb+0xb1/0x5b0 [ 3311.023911] skb_segment+0x9d8/0x3aa0 [ 3311.024773] ? __lock_acquire+0xbb1/0x5b00 [ 3311.025772] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3311.026896] ? lock_acquire+0x197/0x470 [ 3311.027797] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3311.028979] __udp_gso_segment+0x11c6/0x1830 [ 3311.029966] ? __sk_receive_skb+0x830/0x830 [ 3311.030937] udp4_ufo_fragment+0x528/0x720 [ 3311.031887] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3311.033001] inet_gso_segment+0x4fb/0x11a0 [ 3311.033971] skb_mac_gso_segment+0x273/0x570 [ 3311.034954] ? inet_sock_destruct+0x840/0x840 [ 3311.035952] ? skb_network_protocol+0x650/0x650 [ 3311.036982] ? skb_crc32c_csum_help+0x80/0x80 [ 3311.037989] ? lock_acquire+0x197/0x470 [ 3311.038878] ? __dev_queue_xmit+0x1c6/0x2690 [ 3311.039860] __skb_gso_segment+0x32d/0x6d0 [ 3311.040803] ? mark_lock+0xf5/0x2df0 [ 3311.041655] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3311.042828] ? lock_chain_count+0x20/0x20 [ 3311.043745] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3311.044761] __dev_queue_xmit+0x825/0x2690 [ 3311.045713] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3311.046856] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3311.047877] ? mark_held_locks+0x9e/0xe0 [ 3311.048784] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3311.049956] neigh_connected_output+0x382/0x4d0 [ 3311.051000] ip_finish_output2+0x6f1/0x21f0 [ 3311.051957] ? nf_hook_slow+0xfc/0x1e0 [ 3311.052820] ? ip_frag_next+0x9e0/0x9e0 [ 3311.053710] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3311.054827] __ip_finish_output.part.0+0x5f3/0xb50 [ 3311.055921] ? ip_fragment.constprop.0+0x240/0x240 [ 3311.057006] ? netif_rx_ni+0xe7/0x300 [ 3311.057864] ip_mc_output+0x401/0xa30 [ 3311.058712] ip_send_skb+0xdd/0x260 [ 3311.059515] udp_send_skb+0x6da/0x11d0 [ 3311.060381] udp_sendmsg+0x139a/0x2160 [ 3311.061241] ? mark_lock+0xf5/0x2df0 [ 3311.062064] ? ip_frag_init+0x350/0x350 [ 3311.062939] ? lock_chain_count+0x20/0x20 [ 3311.063854] ? udp_setsockopt+0xc0/0xc0 [ 3311.064725] ? mark_lock+0xf5/0x2df0 [ 3311.065548] ? lock_acquire+0x197/0x470 [ 3311.066424] ? lock_chain_count+0x20/0x20 [ 3311.067331] ? mark_lock+0xf5/0x2df0 [ 3311.068153] ? mark_lock+0xf5/0x2df0 [ 3311.068969] ? lock_chain_count+0x20/0x20 [ 3311.069890] ? __lock_acquire+0xbb1/0x5b00 [ 3311.070821] ? lock_chain_count+0x20/0x20 [ 3311.071744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3311.072909] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3311.073827] ? udp_v6_push_pending_frames+0x360/0x360 [ 3311.074952] ? mark_lock+0xf5/0x2df0 [ 3311.075767] ? lock_acquire+0x197/0x470 [ 3311.076629] ? find_held_lock+0x2c/0x110 [ 3311.077520] ? __might_fault+0xd3/0x180 [ 3311.078382] ? lock_downgrade+0x6d0/0x6d0 [ 3311.079280] ? lock_downgrade+0x6d0/0x6d0 [ 3311.080180] ? sock_has_perm+0x1ea/0x280 [ 3311.081058] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3311.082189] ? _copy_from_user+0xfb/0x1b0 [ 3311.083100] ? __import_iovec+0x458/0x590 [ 3311.083996] ? udp_v6_push_pending_frames+0x360/0x360 [ 3311.085120] inet6_sendmsg+0x105/0x140 [ 3311.085975] ? inet6_compat_ioctl+0x320/0x320 [ 3311.086947] __sock_sendmsg+0xf2/0x190 [ 3311.087791] ____sys_sendmsg+0x70d/0x870 [ 3311.088677] ? sock_write_iter+0x3d0/0x3d0 [ 3311.089593] ? do_recvmmsg+0x6d0/0x6d0 [ 3311.090435] ? lock_downgrade+0x6d0/0x6d0 [ 3311.091327] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3311.092459] ___sys_sendmsg+0xf3/0x170 [ 3311.093309] ? sendmsg_copy_msghdr+0x160/0x160 [ 3311.094293] ? __fget_files+0x2cf/0x520 [ 3311.095144] ? lock_downgrade+0x6d0/0x6d0 [ 3311.096032] ? find_held_lock+0x2c/0x110 [ 3311.096915] ? __fget_files+0x2f8/0x520 [ 3311.097785] ? __fget_light+0xea/0x290 [ 3311.098630] __sys_sendmsg+0xe5/0x1b0 [ 3311.099448] ? __sys_sendmsg_sock+0x40/0x40 [ 3311.100372] ? rcu_read_lock_any_held+0x75/0xa0 [ 3311.101395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3311.102500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3311.103694] ? trace_hardirqs_on+0x5b/0x180 [ 3311.104750] do_syscall_64+0x33/0x40 [ 3311.105676] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3311.106926] RIP: 0033:0x7f3e899f4b19 [ 3311.107841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3311.112336] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3311.114208] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3311.115952] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3311.117702] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3311.119433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3311.121157] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:38:33 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x100000000000000}]}]}, 0x24}}, 0x0) [ 3311.172582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:38:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffff0000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:38:52 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:38:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x48}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:38:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 99) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:38:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 52) 05:38:52 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:38:52 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x80, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x2108, &(0x7f0000000340)={0x0, 0x4000000, 0x2, 0x3, 0x1c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r5 = socket$inet6_icmp(0xa, 0x2, 0x3a) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000200)=[r5, r6, r3, 0xffffffffffffffff, r0, r2, r1, r3], 0x8) openat(r4, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:38:52 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x200000000000000}]}]}, 0x24}}, 0x0) 05:38:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffff7f, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3330.536427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=70390 comm=syz-executor.0 [ 3330.539237] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=70390 comm=syz-executor.0 [ 3330.565218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3330.573661] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3330.577393] FAULT_INJECTION: forcing a failure. [ 3330.577393] name failslab, interval 1, probability 0, space 0, times 0 [ 3330.580015] CPU: 0 PID: 70405 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3330.581774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3330.581784] Call Trace: [ 3330.581813] dump_stack+0x107/0x167 [ 3330.581848] should_fail.cold+0x5/0xa [ 3330.581875] ? create_object.isra.0+0x3a/0xa20 [ 3330.581902] should_failslab+0x5/0x20 [ 3330.581938] kmem_cache_alloc+0x5b/0x310 [ 3330.581968] create_object.isra.0+0x3a/0xa20 [ 3330.581988] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3330.582018] kmem_cache_alloc+0x159/0x310 [ 3330.582054] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3330.582086] idr_get_free+0x4b5/0x8f0 [ 3330.582127] idr_alloc_u32+0x170/0x2d0 [ 3330.582156] ? __fprop_inc_percpu_max+0x130/0x130 [ 3330.582184] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 3330.582214] ? lock_release+0x680/0x680 [ 3330.582241] idr_alloc+0xc2/0x130 [ 3330.582278] ? idr_alloc_u32+0x2d0/0x2d0 [ 3330.582295] ? rwlock_bug.part.0+0x90/0x90 [ 3330.582335] p9_client_prepare_req.part.0+0x612/0xac0 [ 3330.582369] p9_client_rpc+0x220/0x1370 [ 3330.582392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3330.582427] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 3330.582456] ? pipe_poll+0x21b/0x7f0 [ 3330.582479] ? p9_fd_close+0x4a0/0x4a0 [ 3330.582501] ? anon_pipe_buf_release+0x280/0x280 [ 3330.582528] ? p9_fd_poll+0x1e0/0x2c0 [ 3330.582562] ? p9_fd_create+0x357/0x4a0 [ 3330.582585] ? p9_conn_create+0x510/0x510 [ 3330.582606] ? p9_client_create+0x798/0x1230 [ 3330.582628] ? kfree+0xd7/0x340 [ 3330.582662] p9_client_create+0xa76/0x1230 [ 3330.582698] ? p9_client_flush+0x430/0x430 [ 3330.582723] ? trace_hardirqs_on+0x5b/0x180 [ 3330.582748] ? lockdep_init_map_type+0x2c7/0x780 [ 3330.582775] ? __raw_spin_lock_init+0x36/0x110 [ 3330.582806] v9fs_session_init+0x1dd/0x1680 [ 3330.582831] ? lock_release+0x680/0x680 [ 3330.582865] ? kmem_cache_alloc_trace+0x151/0x320 [ 3330.582888] ? v9fs_show_options+0x690/0x690 [ 3330.582923] ? trace_hardirqs_on+0x5b/0x180 [ 3330.582947] ? kasan_unpoison_shadow+0x33/0x50 [ 3330.582968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3330.582994] v9fs_mount+0x79/0x8f0 [ 3330.583017] ? v9fs_write_inode+0x60/0x60 [ 3330.583042] legacy_get_tree+0x105/0x220 [ 3330.583067] vfs_get_tree+0x8e/0x300 [ 3330.583089] path_mount+0x1429/0x2120 [ 3330.583119] ? strncpy_from_user+0x9e/0x470 [ 3330.583142] ? finish_automount+0xa90/0xa90 [ 3330.583165] ? getname_flags.part.0+0x1dd/0x4f0 [ 3330.583188] ? _copy_from_user+0xfb/0x1b0 [ 3330.583221] __x64_sys_mount+0x282/0x300 [ 3330.583244] ? copy_mnt_ns+0xa00/0xa00 [ 3330.583275] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3330.583299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3330.583328] do_syscall_64+0x33/0x40 [ 3330.583352] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3330.583369] RIP: 0033:0x7fbfa6f6fb19 [ 3330.583391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3330.583404] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3330.583430] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3330.583445] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3330.583459] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3330.583473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3330.583488] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3330.603764] FAULT_INJECTION: forcing a failure. [ 3330.603764] name failslab, interval 1, probability 0, space 0, times 0 [ 3330.603788] CPU: 0 PID: 70401 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3330.603800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3330.603807] Call Trace: [ 3330.603832] dump_stack+0x107/0x167 [ 3330.603857] should_fail.cold+0x5/0xa [ 3330.603888] should_failslab+0x5/0x20 [ 3330.603912] __kmalloc_node_track_caller+0x74/0x3b0 [ 3330.603935] ? skb_segment+0x9d8/0x3aa0 [ 3330.603964] __alloc_skb+0xb1/0x5b0 [ 3330.603994] skb_segment+0x9d8/0x3aa0 [ 3330.604019] ? __lock_acquire+0xbb1/0x5b00 [ 3330.604084] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3330.604106] ? lock_acquire+0x197/0x470 [ 3330.604131] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3330.604166] __udp_gso_segment+0x11c6/0x1830 [ 3330.604187] ? __sk_receive_skb+0x830/0x830 [ 3330.604221] udp4_ufo_fragment+0x528/0x720 [ 3330.604251] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3330.604275] inet_gso_segment+0x4fb/0x11a0 [ 3330.604313] skb_mac_gso_segment+0x273/0x570 [ 3330.604343] ? inet_sock_destruct+0x840/0x840 [ 3330.604363] ? skb_network_protocol+0x650/0x650 [ 3330.604382] ? skb_crc32c_csum_help+0x80/0x80 [ 3330.604404] ? lock_acquire+0x197/0x470 [ 3330.604424] ? __dev_queue_xmit+0x1c6/0x2690 [ 3330.604452] __skb_gso_segment+0x32d/0x6d0 [ 3330.604474] ? mark_lock+0xf5/0x2df0 [ 3330.604501] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3330.604524] ? lock_chain_count+0x20/0x20 [ 3330.604544] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3330.604568] __dev_queue_xmit+0x825/0x2690 [ 3330.604599] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3330.604622] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3330.604656] ? mark_held_locks+0x9e/0xe0 [ 3330.604685] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3330.604715] neigh_connected_output+0x382/0x4d0 [ 3330.604755] ip_finish_output2+0x6f1/0x21f0 [ 3330.604779] ? nf_hook_slow+0xfc/0x1e0 [ 3330.604803] ? ip_frag_next+0x9e0/0x9e0 [ 3330.604825] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3330.604860] __ip_finish_output.part.0+0x5f3/0xb50 [ 3330.604888] ? ip_fragment.constprop.0+0x240/0x240 [ 3330.604910] ? netif_rx_ni+0xe7/0x300 [ 3330.604940] ip_mc_output+0x401/0xa30 [ 3330.604970] ip_send_skb+0xdd/0x260 [ 3330.604998] udp_send_skb+0x6da/0x11d0 [ 3330.605035] udp_sendmsg+0x139a/0x2160 [ 3330.605056] ? mark_lock+0xf5/0x2df0 [ 3330.605080] ? ip_frag_init+0x350/0x350 [ 3330.605104] ? lock_chain_count+0x20/0x20 [ 3330.605133] ? udp_setsockopt+0xc0/0xc0 [ 3330.605152] ? mark_lock+0xf5/0x2df0 [ 3330.605174] ? lock_acquire+0x197/0x470 [ 3330.605201] ? lock_chain_count+0x20/0x20 [ 3330.605225] ? mark_lock+0xf5/0x2df0 [ 3330.605251] ? mark_lock+0xf5/0x2df0 [ 3330.605274] ? lock_chain_count+0x20/0x20 [ 3330.605295] ? __lock_acquire+0xbb1/0x5b00 [ 3330.605320] ? lock_chain_count+0x20/0x20 [ 3330.605358] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3330.605397] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3330.605439] ? udp_v6_push_pending_frames+0x360/0x360 [ 3330.605470] ? mark_lock+0xf5/0x2df0 [ 3330.605499] ? lock_acquire+0x197/0x470 [ 3330.605519] ? find_held_lock+0x2c/0x110 [ 3330.605548] ? __might_fault+0xd3/0x180 [ 3330.605571] ? lock_downgrade+0x6d0/0x6d0 [ 3330.605597] ? lock_downgrade+0x6d0/0x6d0 [ 3330.605622] ? sock_has_perm+0x1ea/0x280 [ 3330.605644] ? selinux_socket_post_create+0x7f0/0x7f0 [ 3330.605672] ? _copy_from_user+0xfb/0x1b0 [ 3330.605710] ? __import_iovec+0x458/0x590 [ 3330.605734] ? udp_v6_push_pending_frames+0x360/0x360 [ 3330.605763] inet6_sendmsg+0x105/0x140 [ 3330.605787] ? inet6_compat_ioctl+0x320/0x320 [ 3330.605808] __sock_sendmsg+0xf2/0x190 [ 3330.605832] ____sys_sendmsg+0x70d/0x870 [ 3330.605858] ? sock_write_iter+0x3d0/0x3d0 [ 3330.605879] ? do_recvmmsg+0x6d0/0x6d0 [ 3330.605907] ? lock_downgrade+0x6d0/0x6d0 [ 3330.605945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3330.605976] ___sys_sendmsg+0xf3/0x170 [ 3330.606002] ? sendmsg_copy_msghdr+0x160/0x160 [ 3330.606031] ? __fget_files+0x2cf/0x520 [ 3330.606055] ? lock_downgrade+0x6d0/0x6d0 [ 3330.606079] ? find_held_lock+0x2c/0x110 [ 3330.606113] ? __fget_files+0x2f8/0x520 [ 3330.606146] ? __fget_light+0xea/0x290 [ 3330.606178] __sys_sendmsg+0xe5/0x1b0 [ 3330.606201] ? __sys_sendmsg_sock+0x40/0x40 [ 3330.606223] ? rcu_read_lock_any_held+0x75/0xa0 [ 3330.606266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3330.606289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3330.606306] ? trace_hardirqs_on+0x5b/0x180 [ 3330.606330] do_syscall_64+0x33/0x40 [ 3330.606352] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3330.606367] RIP: 0033:0x7f3e899f4b19 [ 3330.606387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3330.606399] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3330.606423] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3330.606436] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3330.606458] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3330.783715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3330.785340] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:38:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffff8c, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3330.978313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3350.361747] FAULT_INJECTION: forcing a failure. [ 3350.361747] name failslab, interval 1, probability 0, space 0, times 0 [ 3350.364008] CPU: 0 PID: 70827 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3350.365344] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3350.366953] Call Trace: [ 3350.367471] dump_stack+0x107/0x167 [ 3350.368189] should_fail.cold+0x5/0xa [ 3350.368942] ? p9pdu_readf+0xadb/0x1d40 [ 3350.369714] should_failslab+0x5/0x20 [ 3350.370452] __kmalloc+0x72/0x390 [ 3350.371138] p9pdu_readf+0xadb/0x1d40 [ 3350.371878] ? pipe_poll+0x21b/0x7f0 [ 3350.372601] ? p9pdu_writef+0x100/0x100 [ 3350.373380] ? p9_fd_poll+0x1e0/0x2c0 [ 3350.374129] ? p9_fd_create+0x357/0x4a0 [ 3350.374908] ? p9_conn_create+0x510/0x510 [ 3350.375709] ? p9_client_create+0x798/0x1230 [ 3350.376579] ? kfree+0xd7/0x340 [ 3350.377230] p9_client_create+0xaee/0x1230 [ 3350.378056] ? p9_client_flush+0x430/0x430 [ 3350.378883] ? trace_hardirqs_on+0x5b/0x180 [ 3350.379736] ? lockdep_init_map_type+0x2c7/0x780 [ 3350.380657] ? __raw_spin_lock_init+0x36/0x110 [ 3350.381558] v9fs_session_init+0x1dd/0x1680 [ 3350.382392] ? lock_release+0x680/0x680 [ 3350.383191] ? kmem_cache_alloc_trace+0x151/0x320 [ 3350.384120] ? v9fs_show_options+0x690/0x690 [ 3350.384984] ? trace_hardirqs_on+0x5b/0x180 [ 3350.385823] ? kasan_unpoison_shadow+0x33/0x50 [ 3350.387054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3350.388040] v9fs_mount+0x79/0x8f0 [ 3350.388731] ? v9fs_write_inode+0x60/0x60 [ 3350.389535] legacy_get_tree+0x105/0x220 [ 3350.390322] vfs_get_tree+0x8e/0x300 [ 3350.391061] path_mount+0x1429/0x2120 [ 3350.391805] ? strncpy_from_user+0x9e/0x470 [ 3350.392648] ? finish_automount+0xa90/0xa90 [ 3350.393476] ? getname_flags.part.0+0x1dd/0x4f0 [ 3350.394373] ? _copy_from_user+0xfb/0x1b0 [ 3350.395184] __x64_sys_mount+0x282/0x300 [ 3350.395970] ? copy_mnt_ns+0xa00/0xa00 [ 3350.396733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3350.397747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3350.398753] do_syscall_64+0x33/0x40 [ 3350.399482] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3350.400475] RIP: 0033:0x7fbfa6f6fb19 [ 3350.401190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3350.404746] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3350.406211] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3350.407594] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3350.408971] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3350.410347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3350.411726] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:39:12 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x300000000000000}]}]}, 0x24}}, 0x0) 05:39:12 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xb00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:39:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x202c2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x80, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x2108, &(0x7f0000000340)={0x0, 0x4000000, 0x2, 0x3, 0x1c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r5 = socket$inet6_icmp(0xa, 0x2, 0x3a) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000200)=[r5, r6, r3, 0xffffffffffffffff, r0, r2, r1, r3], 0x8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x17}, 0x0, 0xfffffffffffffd51, 0x0, 0x0, 0x0, {r4}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:39:12 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:39:12 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:39:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:39:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 53) 05:39:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffffe4, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3350.425946] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=70836 comm=syz-executor.0 [ 3350.428440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=70836 comm=syz-executor.0 [ 3350.432054] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3350.441118] 9pnet_virtio: no channels available for device [ 3350.442323] FAULT_INJECTION: forcing a failure. [ 3350.442323] name failslab, interval 1, probability 0, space 0, times 0 [ 3350.445067] CPU: 1 PID: 70840 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 3350.446651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3350.448530] Call Trace: [ 3350.449139] dump_stack+0x107/0x167 [ 3350.449963] should_fail.cold+0x5/0xa [ 3350.450839] ? create_object.isra.0+0x3a/0xa20 [ 3350.451876] should_failslab+0x5/0x20 [ 3350.452741] kmem_cache_alloc+0x5b/0x310 [ 3350.453668] create_object.isra.0+0x3a/0xa20 [ 3350.454673] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3350.455836] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3350.456981] ? skb_segment+0x9d8/0x3aa0 [ 3350.457891] __alloc_skb+0xb1/0x5b0 [ 3350.458730] skb_segment+0x9d8/0x3aa0 [ 3350.459605] ? __lock_acquire+0xbb1/0x5b00 [ 3350.460601] ? skb_zerocopy_iter_stream+0x800/0x800 [ 3350.461725] ? lock_acquire+0x197/0x470 [ 3350.462643] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3350.463836] __udp_gso_segment+0x11c6/0x1830 [ 3350.464825] ? __sk_receive_skb+0x830/0x830 [ 3350.465808] udp4_ufo_fragment+0x528/0x720 [ 3350.466777] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 3350.467907] inet_gso_segment+0x4fb/0x11a0 [ 3350.468879] skb_mac_gso_segment+0x273/0x570 [ 3350.469877] ? inet_sock_destruct+0x840/0x840 [ 3350.470898] ? skb_network_protocol+0x650/0x650 [ 3350.471952] ? skb_crc32c_csum_help+0x80/0x80 [ 3350.472969] ? lock_acquire+0x197/0x470 [ 3350.473863] ? __dev_queue_xmit+0x1c6/0x2690 [ 3350.474870] __skb_gso_segment+0x32d/0x6d0 [ 3350.475825] ? mark_lock+0xf5/0x2df0 [ 3350.476671] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 3350.477857] ? lock_chain_count+0x20/0x20 [ 3350.478808] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 3350.479837] __dev_queue_xmit+0x825/0x2690 [ 3350.480795] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 3350.481956] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 3350.483003] ? mark_held_locks+0x9e/0xe0 [ 3350.483923] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 3350.485113] neigh_connected_output+0x382/0x4d0 [ 3350.486177] ip_finish_output2+0x6f1/0x21f0 [ 3350.487160] ? nf_hook_slow+0xfc/0x1e0 [ 3350.488044] ? ip_frag_next+0x9e0/0x9e0 [ 3350.488946] ? skb_gso_transport_seglen+0x1ca/0x360 [ 3350.490086] __ip_finish_output.part.0+0x5f3/0xb50 [ 3350.491206] ? ip_fragment.constprop.0+0x240/0x240 [ 3350.492304] ? netif_rx_ni+0xe7/0x300 [ 3350.493169] ip_mc_output+0x401/0xa30 [ 3350.494035] ip_send_skb+0xdd/0x260 [ 3350.494868] udp_send_skb+0x6da/0x11d0 [ 3350.495765] udp_sendmsg+0x139a/0x2160 [ 3350.496640] ? mark_lock+0xf5/0x2df0 [ 3350.497484] ? ip_frag_init+0x350/0x350 [ 3350.498382] ? lock_chain_count+0x20/0x20 [ 3350.499338] ? udp_setsockopt+0xc0/0xc0 [ 3350.500233] ? mark_lock+0xf5/0x2df0 [ 3350.501073] ? lock_acquire+0x197/0x470 [ 3350.501977] ? lock_chain_count+0x20/0x20 [ 3350.502924] ? mark_lock+0xf5/0x2df0 [ 3350.503766] ? mark_lock+0xf5/0x2df0 [ 3350.504603] ? lock_chain_count+0x20/0x20 [ 3350.505535] ? __lock_acquire+0xbb1/0x5b00 [ 3350.506493] ? lock_chain_count+0x20/0x20 [ 3350.507447] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3350.508639] udpv6_sendmsg+0x1bcf/0x2ad0 [ 3350.509573] ? udp_v6_push_pending_frames+0x360/0x360 [ 3350.510755] ? mark_lock+0xf5/0x2df0 [ 3350.511602] ? lock_acquire+0x197/0x470 [ 3350.512504] ? find_held_lock+0x2c/0x110 [ 3350.513425] ? __might_fault+0xd3/0x180 [ 3350.514319] ? lock_downgrade+0x6d0/0x6d0 [ 3350.515272] ? lock_downgrade+0x6d0/0x6d0 [ 3350.516206] ? sock_has_perm+0x1ea/0x280 [ 3350.517123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3350.518304] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3350.519526] ? trace_hardirqs_on+0x5b/0x180 [ 3350.520498] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3350.521735] ? inet6_sendmsg+0x14/0x140 [ 3350.522649] ? udp_v6_push_pending_frames+0x360/0x360 [ 3350.523816] inet6_sendmsg+0x105/0x140 [ 3350.524699] ? inet6_compat_ioctl+0x320/0x320 [ 3350.525708] __sock_sendmsg+0xf2/0x190 [ 3350.526599] ____sys_sendmsg+0x70d/0x870 [ 3350.527528] ? sock_write_iter+0x3d0/0x3d0 [ 3350.528482] ? do_recvmmsg+0x6d0/0x6d0 [ 3350.529365] ? lock_downgrade+0x6d0/0x6d0 [ 3350.530304] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3350.531497] ___sys_sendmsg+0xf3/0x170 [ 3350.532385] ? sendmsg_copy_msghdr+0x160/0x160 [ 3350.533426] ? __fget_files+0x2cf/0x520 [ 3350.534322] ? lock_downgrade+0x6d0/0x6d0 [ 3350.535270] ? find_held_lock+0x2c/0x110 [ 3350.536200] ? __fget_files+0x2f8/0x520 [ 3350.537109] ? __fget_light+0xea/0x290 [ 3350.537994] __sys_sendmsg+0xe5/0x1b0 [ 3350.538859] ? __sys_sendmsg_sock+0x40/0x40 [ 3350.539836] ? rcu_read_lock_any_held+0x75/0xa0 [ 3350.540905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3350.542082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3350.543241] ? trace_hardirqs_on+0x5b/0x180 [ 3350.544219] do_syscall_64+0x33/0x40 [ 3350.545062] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3350.546215] RIP: 0033:0x7f3e899f4b19 [ 3350.547062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3350.551209] RSP: 002b:00007f3e86f6a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3350.552920] RAX: ffffffffffffffda RBX: 00007f3e89b07f60 RCX: 00007f3e899f4b19 [ 3350.554526] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 3350.556140] RBP: 00007f3e86f6a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3350.557747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 3350.559356] R13: 00007ffd2f4423ff R14: 00007f3e86f6a300 R15: 0000000000022000 05:39:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 54) 05:39:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffffff6, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3350.697789] FAULT_INJECTION: forcing a failure. [ 3350.697789] name failslab, interval 1, probability 0, space 0, times 0 [ 3350.700380] CPU: 1 PID: 71147 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3350.701932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3350.703810] Call Trace: [ 3350.704413] dump_stack+0x107/0x167 [ 3350.705231] should_fail.cold+0x5/0xa [ 3350.706100] ? create_object.isra.0+0x3a/0xa20 [ 3350.707138] should_failslab+0x5/0x20 [ 3350.708000] kmem_cache_alloc+0x5b/0x310 [ 3350.708918] create_object.isra.0+0x3a/0xa20 [ 3350.709903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3350.711054] __kmalloc+0x16e/0x390 [ 3350.711867] p9pdu_readf+0xadb/0x1d40 [ 3350.712726] ? pipe_poll+0x21b/0x7f0 [ 3350.713561] ? p9pdu_writef+0x100/0x100 [ 3350.714460] ? p9_fd_poll+0x1e0/0x2c0 [ 3350.715332] ? p9_fd_create+0x357/0x4a0 [ 3350.716223] ? p9_conn_create+0x510/0x510 [ 3350.717162] ? p9_client_create+0x798/0x1230 [ 3350.718156] ? kfree+0xd7/0x340 [ 3350.718913] p9_client_create+0xaee/0x1230 [ 3350.719868] ? p9_client_flush+0x430/0x430 [ 3350.720825] ? trace_hardirqs_on+0x5b/0x180 [ 3350.721795] ? lockdep_init_map_type+0x2c7/0x780 [ 3350.722871] ? __raw_spin_lock_init+0x36/0x110 [ 3350.723901] v9fs_session_init+0x1dd/0x1680 [ 3350.724869] ? lock_release+0x680/0x680 [ 3350.725770] ? kmem_cache_alloc_trace+0x151/0x320 [ 3350.726863] ? v9fs_show_options+0x690/0x690 [ 3350.727855] ? trace_hardirqs_on+0x5b/0x180 [ 3350.728820] ? kasan_unpoison_shadow+0x33/0x50 [ 3350.729838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3350.730983] v9fs_mount+0x79/0x8f0 [ 3350.731782] ? v9fs_write_inode+0x60/0x60 [ 3350.732716] legacy_get_tree+0x105/0x220 [ 3350.733628] vfs_get_tree+0x8e/0x300 [ 3350.734469] path_mount+0x1429/0x2120 [ 3350.735342] ? strncpy_from_user+0x9e/0x470 [ 3350.736309] ? finish_automount+0xa90/0xa90 [ 3350.737282] ? getname_flags.part.0+0x1dd/0x4f0 [ 3350.738326] ? _copy_from_user+0xfb/0x1b0 [ 3350.739270] __x64_sys_mount+0x282/0x300 [ 3350.740186] ? copy_mnt_ns+0xa00/0xa00 [ 3350.741065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3350.742247] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3350.743414] do_syscall_64+0x33/0x40 [ 3350.744254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3350.745406] RIP: 0033:0x7fbfa6f6fb19 [ 3350.746240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3350.750375] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3350.752088] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3350.753687] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3350.755298] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3350.756898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3350.758501] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:39:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:39:12 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3350.788929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=71154 comm=syz-executor.0 [ 3350.791809] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=71154 comm=syz-executor.0 05:39:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:39:12 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x400000000000000}]}]}, 0x24}}, 0x0) 05:39:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x4084ffffffff, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:12 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3350.971570] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=71369 comm=syz-executor.0 [ 3350.973290] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=71369 comm=syz-executor.0 05:39:12 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xc00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3351.095648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3351.111550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:39:31 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x500000000000000}]}]}, 0x24}}, 0x0) 05:39:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:39:31 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x68}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:39:31 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:39:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xedc000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:31 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xd00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:39:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_io_uring_setup(0x3862, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000180)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, {0x2}, [@nested={0xa, 0x1, 0x0, 0x1, [@generic="9fffc90ffe94"]}]}, 0x20}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000700)={{r2}, r3, 0x14, @unused=[0xfffffffffffffffe, 0xfffffffffffffffc, 0x7, 0x9], @name="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"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000001c0)={0x1c, 0x1, {0x77ce, @struct={0x101, 0x5}, 0x0, 0x4f2d, 0x4, 0x800, 0x400, 0x0, 0x4b0, @struct={0x7fffffff, 0xfffffff8}, 0xffffffe0, 0x1, [0x4b, 0x5, 0x7703, 0x800, 0x5, 0x3ff]}, {0x1ff, @struct={0x3, 0x3}, 0x0, 0x3, 0x8, 0x97, 0x7630, 0x2, 0x80, @struct={0xdd7f, 0x6}, 0xad1, 0x7, [0x2, 0x6, 0x4, 0x0, 0x6f, 0x88]}, {0x89ee, @usage=0x22, 0x0, 0xacf2, 0x3, 0x8001, 0x1, 0x9, 0x3, @usage=0x9d4, 0x200, 0x8, [0x80000001, 0x800, 0x7, 0x7, 0xfffffffffffffff9]}, {0x100, 0x2, 0x1}}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000940)={{r0}, r3, 0x1e, @inherit={0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000000000003000000000000000000000000000000080000000000000026000000000000000700000000000000f7ffffffffffffff0100000000000000070000000000000001010000000000000700000000000000050000cc21cbbeaf"]}, @devid=r4}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000008, 0x110, r2, 0x2e322000) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 3369.328523] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=71589 comm=syz-executor.0 [ 3369.332434] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=71589 comm=syz-executor.0 05:39:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 55) [ 3369.371143] FAULT_INJECTION: forcing a failure. [ 3369.371143] name failslab, interval 1, probability 0, space 0, times 0 [ 3369.373569] CPU: 1 PID: 71664 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3369.375038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3369.376854] Call Trace: [ 3369.377417] dump_stack+0x107/0x167 [ 3369.378196] should_fail.cold+0x5/0xa [ 3369.379041] should_failslab+0x5/0x20 [ 3369.379881] __kmalloc_track_caller+0x79/0x370 [ 3369.380852] ? kasprintf+0xbb/0xf0 [ 3369.381618] ? __delete_object+0xb3/0x100 [ 3369.382521] kvasprintf+0xb5/0x150 [ 3369.383277] ? bust_spinlocks+0xe0/0xe0 [ 3369.384148] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.385296] kasprintf+0xbb/0xf0 [ 3369.386166] ? kvasprintf_const+0x1a0/0x1a0 [ 3369.387105] ? kmem_cache_free+0x249/0x2d0 [ 3369.388042] ? p9_client_create+0xbfa/0x1230 [ 3369.389013] p9_client_create+0xc1b/0x1230 [ 3369.389960] ? p9_client_flush+0x430/0x430 [ 3369.390891] ? trace_hardirqs_on+0x5b/0x180 [ 3369.391862] ? lockdep_init_map_type+0x2c7/0x780 [ 3369.392892] ? __raw_spin_lock_init+0x36/0x110 [ 3369.393884] v9fs_session_init+0x1dd/0x1680 [ 3369.394797] ? lock_release+0x680/0x680 [ 3369.395690] ? kmem_cache_alloc_trace+0x151/0x320 [ 3369.396695] ? v9fs_show_options+0x690/0x690 [ 3369.397649] ? trace_hardirqs_on+0x5b/0x180 [ 3369.398592] ? kasan_unpoison_shadow+0x33/0x50 [ 3369.399604] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3369.400688] v9fs_mount+0x79/0x8f0 [ 3369.401452] ? v9fs_write_inode+0x60/0x60 [ 3369.402379] legacy_get_tree+0x105/0x220 [ 3369.403247] vfs_get_tree+0x8e/0x300 [ 3369.404072] path_mount+0x1429/0x2120 [ 3369.404933] ? strncpy_from_user+0x9e/0x470 [ 3369.405873] ? finish_automount+0xa90/0xa90 [ 3369.406835] ? getname_flags.part.0+0x1dd/0x4f0 [ 3369.407867] ? _copy_from_user+0xfb/0x1b0 [ 3369.408758] __x64_sys_mount+0x282/0x300 [ 3369.409617] ? copy_mnt_ns+0xa00/0xa00 [ 3369.410448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.411570] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3369.412660] do_syscall_64+0x33/0x40 [ 3369.413458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3369.414533] RIP: 0033:0x7fbfa6f6fb19 [ 3369.415373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3369.419285] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3369.420922] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3369.422413] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3369.423937] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3369.425434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3369.426940] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:39:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:31 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x600000000000000}]}]}, 0x24}}, 0x0) 05:39:31 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3369.511924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3369.526084] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3369.573156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=71990 comm=syz-executor.0 [ 3369.575916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=71990 comm=syz-executor.0 05:39:31 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:39:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3369.630266] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3369.652735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:39:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) getsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a050000000000000000000000000014000000110001000000e1ffffffffffffff000aa1b952eef1ae62d1"], 0x3c}}, 0x0) dup2(r1, r0) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x20) fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000200)=@v2={0x2000000, [{0x1, 0x2}, {0x2, 0xff}]}, 0x14, 0x2) 05:39:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 56) 05:39:31 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x700000000000000}]}]}, 0x24}}, 0x0) [ 3369.722505] 9pnet_virtio: no channels available for device 05:39:31 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x74}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3369.740264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=72112 comm=syz-executor.6 [ 3369.743148] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=72112 comm=syz-executor.6 05:39:31 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3369.778706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=72140 comm=syz-executor.0 [ 3369.780175] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=72140 comm=syz-executor.0 [ 3369.787440] FAULT_INJECTION: forcing a failure. [ 3369.787440] name failslab, interval 1, probability 0, space 0, times 0 [ 3369.788693] CPU: 0 PID: 72145 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3369.789453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3369.790376] Call Trace: [ 3369.790677] dump_stack+0x107/0x167 [ 3369.791083] should_fail.cold+0x5/0xa [ 3369.791527] ? create_object.isra.0+0x3a/0xa20 [ 3369.792041] should_failslab+0x5/0x20 [ 3369.792469] kmem_cache_alloc+0x5b/0x310 [ 3369.792928] ? vsnprintf+0x4ba/0x1600 [ 3369.793362] create_object.isra.0+0x3a/0xa20 [ 3369.793855] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3369.794427] __kmalloc_track_caller+0x177/0x370 [ 3369.794952] ? kasprintf+0xbb/0xf0 [ 3369.795371] kvasprintf+0xb5/0x150 [ 3369.795771] ? bust_spinlocks+0xe0/0xe0 [ 3369.796219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.796811] kasprintf+0xbb/0xf0 [ 3369.797188] ? kvasprintf_const+0x1a0/0x1a0 [ 3369.797669] ? kmem_cache_free+0x249/0x2d0 [ 3369.798147] ? p9_client_create+0xbfa/0x1230 [ 3369.798637] p9_client_create+0xc1b/0x1230 [ 3369.799112] ? p9_client_flush+0x430/0x430 [ 3369.799591] ? trace_hardirqs_on+0x5b/0x180 [ 3369.800072] ? lockdep_init_map_type+0x2c7/0x780 [ 3369.800598] ? __raw_spin_lock_init+0x36/0x110 [ 3369.801113] v9fs_session_init+0x1dd/0x1680 [ 3369.801600] ? lock_release+0x680/0x680 [ 3369.802046] ? kmem_cache_alloc_trace+0x151/0x320 [ 3369.802581] ? v9fs_show_options+0x690/0x690 [ 3369.803072] ? trace_hardirqs_on+0x5b/0x180 [ 3369.803562] ? kasan_unpoison_shadow+0x33/0x50 [ 3369.804071] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3369.804641] v9fs_mount+0x79/0x8f0 [ 3369.805038] ? v9fs_write_inode+0x60/0x60 [ 3369.805497] legacy_get_tree+0x105/0x220 [ 3369.805945] vfs_get_tree+0x8e/0x300 [ 3369.806358] path_mount+0x1429/0x2120 [ 3369.806782] ? strncpy_from_user+0x9e/0x470 [ 3369.807265] ? finish_automount+0xa90/0xa90 [ 3369.807748] ? getname_flags.part.0+0x1dd/0x4f0 [ 3369.808265] ? _copy_from_user+0xfb/0x1b0 [ 3369.808731] __x64_sys_mount+0x282/0x300 [ 3369.809177] ? copy_mnt_ns+0xa00/0xa00 [ 3369.809610] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.810191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3369.810764] do_syscall_64+0x33/0x40 [ 3369.811175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3369.811746] RIP: 0033:0x7fbfa6f6fb19 [ 3369.812156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3369.814180] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3369.815013] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3369.815802] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3369.816585] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3369.817381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3369.818168] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3369.830946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:39:31 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:39:31 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3369.964042] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=72453 comm=syz-executor.0 [ 3369.965440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=72453 comm=syz-executor.0 05:39:49 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:39:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file1\x00'}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x20, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}, {@access_uid={'access', 0x3d, 0xee00}}, {@loose}, {@cache_none}, {@loose}], [{@smackfsdef={'smackfsdef', 0x3d, '))}%,'}}, {@uid_gt={'uid>', r2}}, {@fowner_lt={'fowner<', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@appraise}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@appraise_type}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:39:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3387.587798] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=72568 comm=syz-executor.0 [ 3387.590261] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=72568 comm=syz-executor.0 [ 3387.625528] FAULT_INJECTION: forcing a failure. [ 3387.625528] name failslab, interval 1, probability 0, space 0, times 0 [ 3387.627979] CPU: 0 PID: 72623 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3387.629287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3387.630827] Call Trace: [ 3387.631326] dump_stack+0x107/0x167 [ 3387.632019] should_fail.cold+0x5/0xa [ 3387.632745] should_failslab+0x5/0x20 [ 3387.633467] __kmalloc_track_caller+0x79/0x370 [ 3387.634324] ? kstrdup_const+0x53/0x80 [ 3387.635061] ? kasprintf+0xbb/0xf0 [ 3387.635731] kstrdup+0x36/0x70 [ 3387.636342] kstrdup_const+0x53/0x80 [ 3387.637044] kmem_cache_create_usercopy+0x12f/0x2f0 [ 3387.638009] p9_client_create+0xc6a/0x1230 [ 3387.638805] ? p9_client_flush+0x430/0x430 [ 3387.639606] ? trace_hardirqs_on+0x5b/0x180 [ 3387.640419] ? lockdep_init_map_type+0x2c7/0x780 [ 3387.641324] ? __raw_spin_lock_init+0x36/0x110 [ 3387.642198] v9fs_session_init+0x1dd/0x1680 [ 3387.643016] ? lock_release+0x680/0x680 [ 3387.643777] ? kmem_cache_alloc_trace+0x151/0x320 [ 3387.644937] ? v9fs_show_options+0x690/0x690 [ 3387.645785] ? trace_hardirqs_on+0x5b/0x180 [ 3387.646603] ? kasan_unpoison_shadow+0x33/0x50 [ 3387.647469] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3387.648413] v9fs_mount+0x79/0x8f0 [ 3387.649096] ? v9fs_write_inode+0x60/0x60 [ 3387.649887] legacy_get_tree+0x105/0x220 [ 3387.650668] vfs_get_tree+0x8e/0x300 [ 3387.651361] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3387.652956] path_mount+0x1429/0x2120 [ 3387.653686] ? strncpy_from_user+0x9e/0x470 [ 3387.654500] ? finish_automount+0xa90/0xa90 [ 3387.655313] ? getname_flags.part.0+0x1dd/0x4f0 [ 3387.656205] ? _copy_from_user+0xfb/0x1b0 [ 3387.656993] __x64_sys_mount+0x282/0x300 [ 3387.657757] ? copy_mnt_ns+0xa00/0xa00 [ 3387.658494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3387.659481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3387.660461] do_syscall_64+0x33/0x40 [ 3387.661163] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3387.662129] RIP: 0033:0x7fbfa6f6fb19 [ 3387.662822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3387.666268] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3387.667710] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3387.669066] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3387.670403] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3387.671737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3387.673087] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3387.674624] kmem_cache_create(9p-fcall-cache-252) failed with error -12 [ 3387.675909] CPU: 0 PID: 72623 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3387.677219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3387.678771] Call Trace: [ 3387.679262] dump_stack+0x107/0x167 [ 3387.679955] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3387.680938] p9_client_create+0xc6a/0x1230 [ 3387.681736] ? p9_client_flush+0x430/0x430 [ 3387.682525] ? trace_hardirqs_on+0x5b/0x180 [ 3387.683329] ? lockdep_init_map_type+0x2c7/0x780 [ 3387.684221] ? __raw_spin_lock_init+0x36/0x110 [ 3387.685074] v9fs_session_init+0x1dd/0x1680 [ 3387.685875] ? lock_release+0x680/0x680 [ 3387.686626] ? kmem_cache_alloc_trace+0x151/0x320 [ 3387.687526] ? v9fs_show_options+0x690/0x690 [ 3387.688361] ? trace_hardirqs_on+0x5b/0x180 [ 3387.689166] ? kasan_unpoison_shadow+0x33/0x50 [ 3387.690017] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3387.690962] v9fs_mount+0x79/0x8f0 [ 3387.691625] ? v9fs_write_inode+0x60/0x60 [ 3387.692401] legacy_get_tree+0x105/0x220 [ 3387.693158] vfs_get_tree+0x8e/0x300 [ 3387.693850] path_mount+0x1429/0x2120 [ 3387.694560] ? strncpy_from_user+0x9e/0x470 [ 3387.695367] ? finish_automount+0xa90/0xa90 [ 3387.696175] ? getname_flags.part.0+0x1dd/0x4f0 [ 3387.697036] ? _copy_from_user+0xfb/0x1b0 [ 3387.697804] __x64_sys_mount+0x282/0x300 [ 3387.698545] ? copy_mnt_ns+0xa00/0xa00 [ 3387.699266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3387.700241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3387.701197] do_syscall_64+0x33/0x40 [ 3387.701887] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3387.702827] RIP: 0033:0x7fbfa6f6fb19 [ 3387.703510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3387.706913] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3387.708322] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3387.709641] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3387.710949] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3387.712265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3387.713535] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:39:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x9a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:49 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x800000000000000}]}]}, 0x24}}, 0x0) 05:39:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:39:49 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:39:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 57) 05:39:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x100000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:39:49 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x900000000000000}]}]}, 0x24}}, 0x0) 05:39:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6, 0x3e600000, 0xa7, 0x6, 0x400}) readahead(r0, 0x3, 0x7) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:39:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3387.969140] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=72895 comm=syz-executor.6 [ 3387.971706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=72895 comm=syz-executor.6 [ 3388.007065] 9pnet_virtio: no channels available for device  05:40:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 58) [ 3403.560215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=73115 comm=syz-executor.0 [ 3403.562613] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=73115 comm=syz-executor.0 [ 3403.585681] FAULT_INJECTION: forcing a failure. [ 3403.585681] name failslab, interval 1, probability 0, space 0, times 0 [ 3403.587667] CPU: 0 PID: 73117 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3403.589018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3403.590467] Call Trace: [ 3403.590932] dump_stack+0x107/0x167 [ 3403.591574] should_fail.cold+0x5/0xa [ 3403.592245] should_failslab+0x5/0x20 [ 3403.592913] __kmalloc_track_caller+0x79/0x370 [ 3403.593710] ? kstrdup_const+0x53/0x80 [ 3403.594396] ? kasprintf+0xbb/0xf0 [ 3403.595034] kstrdup+0x36/0x70 [ 3403.595601] kstrdup_const+0x53/0x80 [ 3403.596255] kmem_cache_create_usercopy+0x12f/0x2f0 [ 3403.597181] p9_client_create+0xc6a/0x1230 [ 3403.597961] ? p9_client_flush+0x430/0x430 [ 3403.598714] ? trace_hardirqs_on+0x5b/0x180 [ 3403.599468] ? lockdep_init_map_type+0x2c7/0x780 [ 3403.600295] ? __raw_spin_lock_init+0x36/0x110 [ 3403.601110] v9fs_session_init+0x1dd/0x1680 [ 3403.601871] ? lock_release+0x680/0x680 [ 3403.602571] ? kmem_cache_alloc_trace+0x151/0x320 [ 3403.603404] ? v9fs_show_options+0x690/0x690 [ 3403.604173] ? trace_hardirqs_on+0x5b/0x180 [ 3403.604917] ? kasan_unpoison_shadow+0x33/0x50 [ 3403.605698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3403.606563] v9fs_mount+0x79/0x8f0 [ 3403.607166] ? v9fs_write_inode+0x60/0x60 [ 3403.607880] legacy_get_tree+0x105/0x220 [ 3403.608600] vfs_get_tree+0x8e/0x300 [ 3403.609233] path_mount+0x1429/0x2120 [ 3403.609878] ? strncpy_from_user+0x9e/0x470 [ 3403.610644] ? finish_automount+0xa90/0xa90 [ 3403.611399] ? getname_flags.part.0+0x1dd/0x4f0 [ 3403.612205] ? _copy_from_user+0xfb/0x1b0 [ 3403.612936] __x64_sys_mount+0x282/0x300 [ 3403.613642] ? copy_mnt_ns+0xa00/0xa00 [ 3403.614333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3403.615226] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3403.616110] do_syscall_64+0x33/0x40 [ 3403.616761] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3403.617631] RIP: 0033:0x7fbfa6f6fb19 [ 3403.618292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3403.621464] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3403.622770] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3403.624003] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3403.625227] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3403.626431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3403.627668] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3403.629155] kmem_cache_create(9p-fcall-cache-253) failed with error -12 [ 3403.630370] CPU: 0 PID: 73117 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3403.631668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3403.633090] Call Trace: [ 3403.633561] dump_stack+0x107/0x167 [ 3403.634189] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3403.635095] p9_client_create+0xc6a/0x1230 [ 3403.635838] ? p9_client_flush+0x430/0x430 [ 3403.636572] ? trace_hardirqs_on+0x5b/0x180 [ 3403.637311] ? lockdep_init_map_type+0x2c7/0x780 [ 3403.638124] ? __raw_spin_lock_init+0x36/0x110 [ 3403.638935] v9fs_session_init+0x1dd/0x1680 [ 3403.639664] ? lock_release+0x680/0x680 [ 3403.640356] ? kmem_cache_alloc_trace+0x151/0x320 [ 3403.641178] ? v9fs_show_options+0x690/0x690 [ 3403.641938] ? trace_hardirqs_on+0x5b/0x180 [ 3403.642672] ? kasan_unpoison_shadow+0x33/0x50 [ 3403.643431] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3403.644293] v9fs_mount+0x79/0x8f0 [ 3403.644946] ? v9fs_write_inode+0x60/0x60 [ 3403.645653] legacy_get_tree+0x105/0x220 [ 3403.646338] vfs_get_tree+0x8e/0x300 [ 3403.646970] path_mount+0x1429/0x2120 [ 3403.647629] ? strncpy_from_user+0x9e/0x470 [ 3403.648353] ? finish_automount+0xa90/0xa90 [ 3403.649097] ? getname_flags.part.0+0x1dd/0x4f0 [ 3403.649889] ? _copy_from_user+0xfb/0x1b0 [ 3403.650610] __x64_sys_mount+0x282/0x300 [ 3403.651306] ? copy_mnt_ns+0xa00/0xa00 [ 3403.651971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3403.652864] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3403.653744] do_syscall_64+0x33/0x40 [ 3403.654384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3403.655260] RIP: 0033:0x7fbfa6f6fb19 [ 3403.655894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3403.659001] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3403.660283] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3403.661491] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3403.662681] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3403.663869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3403.665076] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3403.672558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:05 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf00000000000000}]}]}, 0x24}}, 0x0) 05:40:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xa, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:05 executing program 6: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x260800, 0x40) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:40:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:05 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:40:05 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x1803, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:40:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x19a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:05 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1e01000000000000}]}]}, 0x24}}, 0x0) 05:40:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x200000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000080)=@v2={0x2000000, [{0x3, 0x1ff}, {0x53, 0x4}]}, 0x14, 0x1) 05:40:05 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3403.999743] 9pnet_virtio: no channels available for device [ 3403.999885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=73448 comm=syz-executor.0 05:40:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x10c}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3404.002606] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=73448 comm=syz-executor.0 05:40:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 59) 05:40:06 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x4000000000000000}]}]}, 0x24}}, 0x0) [ 3404.028606] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=73444 comm=syz-executor.6 [ 3404.031840] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=73444 comm=syz-executor.6 [ 3404.040062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xe, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3404.051063] FAULT_INJECTION: forcing a failure. [ 3404.051063] name failslab, interval 1, probability 0, space 0, times 0 [ 3404.052606] CPU: 0 PID: 73528 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3404.053404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3404.054351] Call Trace: [ 3404.054658] dump_stack+0x107/0x167 [ 3404.055080] should_fail.cold+0x5/0xa [ 3404.055524] ? create_object.isra.0+0x3a/0xa20 [ 3404.056043] should_failslab+0x5/0x20 [ 3404.056485] kmem_cache_alloc+0x5b/0x310 [ 3404.056956] create_object.isra.0+0x3a/0xa20 [ 3404.057457] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3404.058028] kmem_cache_alloc+0x159/0x310 [ 3404.058501] kmem_cache_create_usercopy+0x190/0x2f0 [ 3404.059064] p9_client_create+0xc6a/0x1230 [ 3404.059546] ? p9_client_flush+0x430/0x430 [ 3404.060037] ? trace_hardirqs_on+0x5b/0x180 [ 3404.060542] ? lockdep_init_map_type+0x2c7/0x780 [ 3404.061074] ? __raw_spin_lock_init+0x36/0x110 [ 3404.061594] v9fs_session_init+0x1dd/0x1680 [ 3404.062089] ? lock_release+0x680/0x680 [ 3404.062541] ? kmem_cache_alloc_trace+0x151/0x320 [ 3404.063095] ? v9fs_show_options+0x690/0x690 [ 3404.063600] ? trace_hardirqs_on+0x5b/0x180 [ 3404.064096] ? kasan_unpoison_shadow+0x33/0x50 [ 3404.064618] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3404.065202] v9fs_mount+0x79/0x8f0 [ 3404.065603] ? v9fs_write_inode+0x60/0x60 [ 3404.066083] legacy_get_tree+0x105/0x220 [ 3404.066545] vfs_get_tree+0x8e/0x300 [ 3404.066972] path_mount+0x1429/0x2120 [ 3404.067410] ? strncpy_from_user+0x9e/0x470 [ 3404.067896] ? finish_automount+0xa90/0xa90 [ 3404.068381] ? getname_flags.part.0+0x1dd/0x4f0 [ 3404.068908] ? _copy_from_user+0xfb/0x1b0 [ 3404.069375] __x64_sys_mount+0x282/0x300 [ 3404.069829] ? copy_mnt_ns+0xa00/0xa00 [ 3404.070265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3404.070854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3404.071440] do_syscall_64+0x33/0x40 [ 3404.071873] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3404.072454] RIP: 0033:0x7fbfa6f6fb19 [ 3404.072890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3404.074955] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3404.075836] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3404.076649] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3404.077446] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3404.078247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3404.079046] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:40:06 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x8100000000000000}]}]}, 0x24}}, 0x0) 05:40:06 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:40:06 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x300}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x29a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3404.150043] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=73747 comm=syz-executor.0 [ 3404.151629] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=73747 comm=syz-executor.0 [ 3404.178728] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 60) 05:40:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 05:40:20 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:40:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x500}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:20 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x9effffff00000000}]}]}, 0x24}}, 0x0) 05:40:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:20 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:40:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x300000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3418.977135] FAULT_INJECTION: forcing a failure. [ 3418.977135] name failslab, interval 1, probability 0, space 0, times 0 [ 3418.978923] CPU: 0 PID: 73987 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3418.980008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3418.981310] Call Trace: [ 3418.981727] dump_stack+0x107/0x167 [ 3418.982293] should_fail.cold+0x5/0xa [ 3418.982896] ? __kmem_cache_create+0x10e/0x520 [ 3418.983607] should_failslab+0x5/0x20 [ 3418.984195] kmem_cache_alloc_node+0x55/0x330 [ 3418.984896] __kmem_cache_create+0x10e/0x520 [ 3418.985596] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3418.986377] p9_client_create+0xc6a/0x1230 [ 3418.987042] ? p9_client_flush+0x430/0x430 [ 3418.987701] ? trace_hardirqs_on+0x5b/0x180 [ 3418.988377] ? lockdep_init_map_type+0x2c7/0x780 [ 3418.989128] ? __raw_spin_lock_init+0x36/0x110 [ 3418.989842] v9fs_session_init+0x1dd/0x1680 [ 3418.990520] ? lock_release+0x680/0x680 [ 3418.991149] ? kmem_cache_alloc_trace+0x151/0x320 [ 3418.991904] ? v9fs_show_options+0x690/0x690 [ 3418.992593] ? trace_hardirqs_on+0x5b/0x180 [ 3418.993282] ? kasan_unpoison_shadow+0x33/0x50 [ 3418.993995] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3418.994788] v9fs_mount+0x79/0x8f0 [ 3418.995340] ? v9fs_write_inode+0x60/0x60 [ 3418.995983] legacy_get_tree+0x105/0x220 [ 3418.996615] vfs_get_tree+0x8e/0x300 [ 3418.997197] path_mount+0x1429/0x2120 [ 3418.997800] ? strncpy_from_user+0x9e/0x470 [ 3418.998469] ? finish_automount+0xa90/0xa90 [ 3418.999150] ? getname_flags.part.0+0x1dd/0x4f0 [ 3418.999880] ? _copy_from_user+0xfb/0x1b0 [ 3419.000539] __x64_sys_mount+0x282/0x300 [ 3419.001180] ? copy_mnt_ns+0xa00/0xa00 [ 3419.001798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3419.002617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3419.003428] do_syscall_64+0x33/0x40 [ 3419.004007] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3419.004807] RIP: 0033:0x7fbfa6f6fb19 [ 3419.005387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3419.008212] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3419.009394] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3419.010494] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3419.011592] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3419.012693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3419.013794] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3419.015008] kmem_cache_create(9p-fcall-cache-255) failed with error -22 [ 3419.016796] CPU: 0 PID: 73987 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3419.017880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3419.019233] Call Trace: [ 3419.019641] dump_stack+0x107/0x167 [ 3419.020201] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3419.021014] p9_client_create+0xc6a/0x1230 [ 3419.021680] ? p9_client_flush+0x430/0x430 [ 3419.022330] ? trace_hardirqs_on+0x5b/0x180 [ 3419.022997] ? lockdep_init_map_type+0x2c7/0x780 [ 3419.023733] ? __raw_spin_lock_init+0x36/0x110 [ 3419.024440] v9fs_session_init+0x1dd/0x1680 [ 3419.025109] ? lock_release+0x680/0x680 [ 3419.025726] ? kmem_cache_alloc_trace+0x151/0x320 [ 3419.026456] ? v9fs_show_options+0x690/0x690 [ 3419.027137] ? trace_hardirqs_on+0x5b/0x180 [ 3419.027797] ? kasan_unpoison_shadow+0x33/0x50 [ 3419.028487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3419.029262] v9fs_mount+0x79/0x8f0 [ 3419.029801] ? v9fs_write_inode+0x60/0x60 [ 3419.030430] legacy_get_tree+0x105/0x220 [ 3419.031050] vfs_get_tree+0x8e/0x300 [ 3419.031614] path_mount+0x1429/0x2120 [ 3419.032191] ? strncpy_from_user+0x9e/0x470 [ 3419.032849] ? finish_automount+0xa90/0xa90 [ 3419.033508] ? getname_flags.part.0+0x1dd/0x4f0 [ 3419.034214] ? _copy_from_user+0xfb/0x1b0 [ 3419.034846] __x64_sys_mount+0x282/0x300 [ 3419.035460] ? copy_mnt_ns+0xa00/0xa00 [ 3419.036052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3419.036848] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3419.037693] do_syscall_64+0x33/0x40 [ 3419.038259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3419.038730] 9pnet_virtio: no channels available for device [ 3419.039034] RIP: 0033:0x7fbfa6f6fb19 [ 3419.039049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3419.039066] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3419.044881] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3419.045972] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3419.047055] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3419.048126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3419.049209] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3419.051789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3419.056175] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=74002 comm=syz-executor.0 [ 3419.058139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=74002 comm=syz-executor.0 [ 3419.061745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:21 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xc00e000000000000}]}]}, 0x24}}, 0x0) 05:40:21 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x600}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 61) [ 3419.213197] FAULT_INJECTION: forcing a failure. [ 3419.213197] name failslab, interval 1, probability 0, space 0, times 0 [ 3419.214824] CPU: 0 PID: 74307 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3419.215786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3419.216938] Call Trace: [ 3419.217317] dump_stack+0x107/0x167 [ 3419.217824] should_fail.cold+0x5/0xa [ 3419.218357] ? create_object.isra.0+0x3a/0xa20 [ 3419.218992] should_failslab+0x5/0x20 [ 3419.219521] kmem_cache_alloc+0x5b/0x310 [ 3419.220090] create_object.isra.0+0x3a/0xa20 [ 3419.220697] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3419.221412] kmem_cache_alloc_node+0x169/0x330 [ 3419.222051] __kmem_cache_create+0x10e/0x520 [ 3419.222663] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3419.223355] p9_client_create+0xc6a/0x1230 [ 3419.223945] ? p9_client_flush+0x430/0x430 [ 3419.224531] ? trace_hardirqs_on+0x5b/0x180 [ 3419.225135] ? lockdep_init_map_type+0x2c7/0x780 [ 3419.225789] ? __raw_spin_lock_init+0x36/0x110 [ 3419.226427] v9fs_session_init+0x1dd/0x1680 [ 3419.227035] ? lock_release+0x680/0x680 [ 3419.227588] ? kmem_cache_alloc_trace+0x151/0x320 [ 3419.228249] ? v9fs_show_options+0x690/0x690 [ 3419.228865] ? trace_hardirqs_on+0x5b/0x180 [ 3419.229488] ? kasan_unpoison_shadow+0x33/0x50 [ 3419.230116] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3419.230817] v9fs_mount+0x79/0x8f0 [ 3419.231313] ? v9fs_write_inode+0x60/0x60 [ 3419.231884] legacy_get_tree+0x105/0x220 [ 3419.232444] vfs_get_tree+0x8e/0x300 [ 3419.232955] path_mount+0x1429/0x2120 [ 3419.233496] ? strncpy_from_user+0x9e/0x470 [ 3419.234090] ? finish_automount+0xa90/0xa90 [ 3419.234683] ? getname_flags.part.0+0x1dd/0x4f0 [ 3419.235328] ? _copy_from_user+0xfb/0x1b0 [ 3419.235905] __x64_sys_mount+0x282/0x300 [ 3419.236466] ? copy_mnt_ns+0xa00/0xa00 [ 3419.237005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3419.237730] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3419.238433] do_syscall_64+0x33/0x40 [ 3419.238943] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3419.239640] RIP: 0033:0x7fbfa6f6fb19 [ 3419.240149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3419.242662] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3419.243751] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3419.244725] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3419.245702] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3419.246673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3419.247647] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3419.257034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x5242000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000080)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) 05:40:21 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3419.337816] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=74324 comm=syz-executor.0 [ 3419.339493] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=74324 comm=syz-executor.0 05:40:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x1a1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x80, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x2108, &(0x7f0000000340)={0x0, 0x4000000, 0x2, 0x3, 0x1c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r4, r5, r3, 0xffffffffffffffff, r0, r2, r1, r3], 0x8) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xc200, 0x58) 05:40:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x39a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:39 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x2800, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:40:39 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x700}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3437.118401] 9pnet_virtio: no channels available for device [ 3437.122019] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:39 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xf0ffffff00000000}]}]}, 0x24}}, 0x0) 05:40:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 62) 05:40:39 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3437.147278] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3437.150865] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=74575 comm=syz-executor.0 [ 3437.153536] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=74575 comm=syz-executor.0 [ 3437.154404] FAULT_INJECTION: forcing a failure. [ 3437.154404] name failslab, interval 1, probability 0, space 0, times 0 [ 3437.158131] CPU: 1 PID: 74569 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3437.159328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3437.160757] Call Trace: [ 3437.161219] dump_stack+0x107/0x167 [ 3437.161854] should_fail.cold+0x5/0xa [ 3437.162524] ? create_object.isra.0+0x3a/0xa20 [ 3437.163321] should_failslab+0x5/0x20 [ 3437.163968] kmem_cache_alloc+0x5b/0x310 [ 3437.164682] create_object.isra.0+0x3a/0xa20 [ 3437.165455] kmemleak_alloc_percpu+0xa0/0x100 [ 3437.166258] pcpu_alloc+0x4e2/0x1240 [ 3437.166838] __kmem_cache_create+0x35a/0x520 [ 3437.167489] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3437.168216] p9_client_create+0xc6a/0x1230 [ 3437.168831] ? p9_client_flush+0x430/0x430 [ 3437.169457] ? trace_hardirqs_on+0x5b/0x180 [ 3437.170112] ? lockdep_init_map_type+0x2c7/0x780 [ 3437.170813] ? __raw_spin_lock_init+0x36/0x110 [ 3437.171503] v9fs_session_init+0x1dd/0x1680 [ 3437.172145] ? lock_release+0x680/0x680 [ 3437.172738] ? kmem_cache_alloc_trace+0x151/0x320 [ 3437.173434] ? v9fs_show_options+0x690/0x690 [ 3437.174098] ? trace_hardirqs_on+0x5b/0x180 [ 3437.174735] ? kasan_unpoison_shadow+0x33/0x50 [ 3437.175410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3437.176162] v9fs_mount+0x79/0x8f0 [ 3437.176681] ? v9fs_write_inode+0x60/0x60 [ 3437.177296] legacy_get_tree+0x105/0x220 [ 3437.177900] vfs_get_tree+0x8e/0x300 [ 3437.178454] path_mount+0x1429/0x2120 [ 3437.179018] ? strncpy_from_user+0x9e/0x470 [ 3437.179657] ? finish_automount+0xa90/0xa90 [ 3437.180305] ? getname_flags.part.0+0x1dd/0x4f0 [ 3437.180981] ? _copy_from_user+0xfb/0x1b0 [ 3437.181601] __x64_sys_mount+0x282/0x300 [ 3437.182210] ? copy_mnt_ns+0xa00/0xa00 [ 3437.182776] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3437.183549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3437.184308] do_syscall_64+0x33/0x40 [ 3437.184849] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3437.185553] RIP: 0033:0x7fbfa6f6fb19 [ 3437.185988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3437.188131] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3437.189133] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3437.189960] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3437.190776] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3437.191611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3437.192429] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:40:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x400000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:39 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xffffff7f00000000}]}]}, 0x24}}, 0x0) 05:40:39 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3437.366564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=74941 comm=syz-executor.0 [ 3437.369336] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=74941 comm=syz-executor.0 [ 3437.398308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 63) 05:40:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3e, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x49a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) [ 3437.509610] FAULT_INJECTION: forcing a failure. [ 3437.509610] name failslab, interval 1, probability 0, space 0, times 0 [ 3437.512156] CPU: 1 PID: 75071 Comm: syz-executor.5 Not tainted 5.10.232 #1 05:40:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x80, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x2108, &(0x7f0000000340)={0x0, 0x4000000, 0x2, 0x3, 0x1c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r5 = socket$inet6_icmp(0xa, 0x2, 0x3a) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000200)=[r5, r6, r3, 0xffffffffffffffff, 0xffffffffffffffff, r2, r1, r3], 0x8) openat(r4, &(0x7f0000000340)='./file1\x00', 0x80000, 0x86) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x5}}], {0x14}}, 0x3c}}, 0x0) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x104, 0x3d, 0x100, 0x70bd27, 0x25dfdbfc, {0x1c}, [@nested={0xe2, 0x38, 0x0, 0x1, [@generic="109582793d397259caaaaade8b9896db2f54583bfed1cf47ccc3857ba864bda07f358fb892aaa97827c0bf5095a8f8df72b77f371414", @generic="46cf09d609c245f46b63d3eb1ea6423ec604a050d2c8a257baeeb99c6416bb6ed69293240f82590a65502d819c866d80356a87a18bc397febd53d868514cfa17", @generic="a14107da27216137bc0ed78a72ec7788ad8455a04b489e87900e315c2f40f22bf1996c0613e28877234a70e292307c739f4754245eaa6a8f3ff5a7b5aa9f15abc329ac188bddb5203e55b5", @generic="9f1db5e5c06af2a4b7482b095e0f9dab8388f31e96f5934476581d5ba5"]}, @typed={0xc, 0x10, 0x0, 0x0, @u64=0x9}]}, 0x104}, 0x1, 0x0, 0x0, 0x28004000}, 0x4000) dup2(r7, r8) 05:40:39 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffff000}]}]}, 0x24}}, 0x0) [ 3437.513625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3437.515558] Call Trace: [ 3437.516112] dump_stack+0x107/0x167 [ 3437.516873] should_fail.cold+0x5/0xa [ 3437.517685] ? create_object.isra.0+0x3a/0xa20 [ 3437.518654] should_failslab+0x5/0x20 [ 3437.519449] kmem_cache_alloc+0x5b/0x310 [ 3437.520295] ? mark_held_locks+0x9e/0xe0 [ 3437.521155] create_object.isra.0+0x3a/0xa20 [ 3437.522093] kmemleak_alloc_percpu+0xa0/0x100 [ 3437.523022] pcpu_alloc+0x4e2/0x1240 [ 3437.523817] __kmem_cache_create+0x35a/0x520 [ 3437.524736] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3437.525789] p9_client_create+0xc6a/0x1230 05:40:39 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x883}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3437.526683] ? p9_client_flush+0x430/0x430 [ 3437.527679] ? trace_hardirqs_on+0x5b/0x180 [ 3437.528601] ? lockdep_init_map_type+0x2c7/0x780 [ 3437.529591] ? __raw_spin_lock_init+0x36/0x110 [ 3437.530558] v9fs_session_init+0x1dd/0x1680 [ 3437.531457] ? lock_release+0x680/0x680 [ 3437.532292] ? kmem_cache_alloc_trace+0x151/0x320 [ 3437.533300] ? v9fs_show_options+0x690/0x690 [ 3437.534228] ? trace_hardirqs_on+0x5b/0x180 [ 3437.535133] ? kasan_unpoison_shadow+0x33/0x50 [ 3437.536090] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3437.537158] v9fs_mount+0x79/0x8f0 [ 3437.537908] ? v9fs_write_inode+0x60/0x60 [ 3437.538783] legacy_get_tree+0x105/0x220 [ 3437.539638] vfs_get_tree+0x8e/0x300 [ 3437.540419] path_mount+0x1429/0x2120 [ 3437.541225] ? strncpy_from_user+0x9e/0x470 [ 3437.542133] ? finish_automount+0xa90/0xa90 [ 3437.543034] ? getname_flags.part.0+0x1dd/0x4f0 [ 3437.543999] ? _copy_from_user+0xfb/0x1b0 [ 3437.544873] __x64_sys_mount+0x282/0x300 [ 3437.545732] ? copy_mnt_ns+0xa00/0xa00 [ 3437.546553] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3437.547639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3437.548713] do_syscall_64+0x33/0x40 [ 3437.549492] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3437.550564] RIP: 0033:0x7fbfa6f6fb19 [ 3437.551347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3437.555191] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3437.556788] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3437.558286] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3437.559781] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3437.561288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3437.562794] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3437.594778] 9pnet_virtio: no channels available for device [ 3437.607242] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3437.610005] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=75102 comm=syz-executor.6 [ 3437.612429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=75102 comm=syz-executor.6 [ 3437.634426] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 64) 05:40:56 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:40:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x103) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)={0x7f, 0x4, 0x2, 0x200, 0x2, [{0x8, 0x400, 0x8, '\x00', 0x2}, {0x7, 0x80000000}]}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) r5 = syz_open_procfs$namespace(r1, &(0x7f0000000400)='ns/pid_for_children\x00') ioctl$FAT_IOCTL_GET_ATTRIBUTES(r5, 0x80047210, &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="444f00ef465cbd5ee98933b749793d5d7214b8d86b6d275152d8125c31e68dbad574db4ace83", @ANYRES16=r4, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r6, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ADD_TX_TS(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r4, 0x0, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x4}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x6}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x1}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x6}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x10) [ 3454.835189] FAULT_INJECTION: forcing a failure. [ 3454.835189] name failslab, interval 1, probability 0, space 0, times 0 [ 3454.837076] CPU: 1 PID: 75305 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3454.838173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3454.839530] Call Trace: [ 3454.839950] dump_stack+0x107/0x167 [ 3454.840546] should_fail.cold+0x5/0xa [ 3454.841163] should_failslab+0x5/0x20 [ 3454.841776] __kmalloc_track_caller+0x79/0x370 [ 3454.842515] ? kstrdup_const+0x53/0x80 [ 3454.843151] kstrdup+0x36/0x70 [ 3454.843668] kstrdup_const+0x53/0x80 [ 3454.844270] kvasprintf_const+0x10c/0x1a0 [ 3454.844933] kobject_set_name_vargs+0x56/0x150 [ 3454.845675] kobject_init_and_add+0xc9/0x160 [ 3454.846391] ? kobject_create_and_add+0xb0/0xb0 [ 3454.847144] ? wait_for_completion_io+0x270/0x270 [ 3454.847922] ? kernfs_name_hash+0xe7/0x110 [ 3454.848601] ? kernfs_find_ns+0x256/0x380 [ 3454.849274] sysfs_slab_add+0x172/0x200 [ 3454.849914] __kmem_cache_create+0x3db/0x520 [ 3454.850644] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3454.851441] p9_client_create+0xc6a/0x1230 [ 3454.852136] ? p9_client_flush+0x430/0x430 [ 3454.852807] ? trace_hardirqs_on+0x5b/0x180 [ 3454.853497] ? lockdep_init_map_type+0x2c7/0x780 [ 3454.854274] ? __raw_spin_lock_init+0x36/0x110 [ 3454.855029] v9fs_session_init+0x1dd/0x1680 [ 3454.855724] ? lock_release+0x680/0x680 [ 3454.856367] ? kmem_cache_alloc_trace+0x151/0x320 [ 3454.857139] ? v9fs_show_options+0x690/0x690 [ 3454.857844] ? trace_hardirqs_on+0x5b/0x180 [ 3454.858541] ? kasan_unpoison_shadow+0x33/0x50 [ 3454.859272] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3454.860083] v9fs_mount+0x79/0x8f0 [ 3454.860650] ? v9fs_write_inode+0x60/0x60 [ 3454.861316] legacy_get_tree+0x105/0x220 [ 3454.861963] vfs_get_tree+0x8e/0x300 [ 3454.862557] path_mount+0x1429/0x2120 [ 3454.863166] ? strncpy_from_user+0x9e/0x470 [ 3454.863861] ? finish_automount+0xa90/0xa90 [ 3454.864550] ? getname_flags.part.0+0x1dd/0x4f0 [ 3454.865290] ? _copy_from_user+0xfb/0x1b0 [ 3454.865962] __x64_sys_mount+0x282/0x300 [ 3454.866621] ? copy_mnt_ns+0xa00/0xa00 [ 3454.867260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3454.868103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3454.868930] do_syscall_64+0x33/0x40 [ 3454.869524] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3454.870373] RIP: 0033:0x7fbfa6f6fb19 [ 3454.870966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3454.873894] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3454.875116] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3454.876242] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3454.877384] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3454.878519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3454.879643] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3454.882041] kobject: can not set name properly! [ 3454.882995] kmem_cache_create(9p-fcall-cache-259) failed with error -12 [ 3454.884076] CPU: 1 PID: 75305 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3454.885169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3454.886492] Call Trace: [ 3454.886909] dump_stack+0x107/0x167 [ 3454.887487] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3454.888328] p9_client_create+0xc6a/0x1230 [ 3454.888999] ? p9_client_flush+0x430/0x430 [ 3454.889685] ? trace_hardirqs_on+0x5b/0x180 [ 3454.890382] ? lockdep_init_map_type+0x2c7/0x780 [ 3454.891130] ? __raw_spin_lock_init+0x36/0x110 [ 3454.891695] 9pnet_virtio: no channels available for device [ 3454.891854] v9fs_session_init+0x1dd/0x1680 [ 3454.893847] ? lock_release+0x680/0x680 [ 3454.893885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=75313 comm=syz-executor.6 [ 3454.894488] ? kmem_cache_alloc_trace+0x151/0x320 [ 3454.894502] ? v9fs_show_options+0x690/0x690 [ 3454.894521] ? trace_hardirqs_on+0x5b/0x180 [ 3454.894540] ? kasan_unpoison_shadow+0x33/0x50 [ 3454.897364] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=75313 comm=syz-executor.6 [ 3454.898084] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3454.902049] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=28 sclass=netlink_audit_socket pid=75313 comm=syz-executor.6 [ 3454.902360] v9fs_mount+0x79/0x8f0 [ 3454.902374] ? v9fs_write_inode+0x60/0x60 [ 3454.902396] legacy_get_tree+0x105/0x220 [ 3454.907262] vfs_get_tree+0x8e/0x300 [ 3454.907853] path_mount+0x1429/0x2120 [ 3454.908464] ? strncpy_from_user+0x9e/0x470 [ 3454.909139] ? finish_automount+0xa90/0xa90 [ 3454.909827] ? getname_flags.part.0+0x1dd/0x4f0 [ 3454.910560] ? _copy_from_user+0xfb/0x1b0 [ 3454.911243] __x64_sys_mount+0x282/0x300 [ 3454.911879] ? copy_mnt_ns+0xa00/0xa00 [ 3454.912499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3454.913329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3454.914137] do_syscall_64+0x33/0x40 [ 3454.914738] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3454.915517] RIP: 0033:0x7fbfa6f6fb19 [ 3454.916113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3454.918978] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3454.920188] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3454.921305] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3454.922450] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3454.923572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3454.924689] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3454.928105] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=75307 comm=syz-executor.0 [ 3454.931067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=75307 comm=syz-executor.0 [ 3454.940283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x900}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:56 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0xf}}, 0x0) 05:40:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x1f4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x500000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:56 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 3454.976693] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:57 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x10}}, 0x0) 05:40:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 65) 05:40:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:40:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x59a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:57 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb5, 0x0, 0xc4, 0x3, 0x0, 0x0, 0x4201, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x24, 0x5}, 0x80, 0x9, 0xed3, 0x2, 0x1f, 0x400, 0x873b, 0x0, 0x800, 0x0, 0x19}, r0, 0x8, 0xffffffffffffffff, 0x8) 05:40:57 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:40:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x300, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:57 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x23}}, 0x0) 05:40:57 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3455.190075] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3455.206641] FAULT_INJECTION: forcing a failure. [ 3455.206641] name failslab, interval 1, probability 0, space 0, times 0 [ 3455.208458] 9pnet_virtio: no channels available for device [ 3455.209228] CPU: 0 PID: 75633 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3455.211564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3455.213530] Call Trace: [ 3455.214143] dump_stack+0x107/0x167 [ 3455.215027] should_fail.cold+0x5/0xa [ 3455.215928] ? create_object.isra.0+0x3a/0xa20 [ 3455.217018] should_failslab+0x5/0x20 [ 3455.217917] kmem_cache_alloc+0x5b/0x310 [ 3455.218905] create_object.isra.0+0x3a/0xa20 [ 3455.219944] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3455.221112] __kmalloc_track_caller+0x177/0x370 [ 3455.222221] ? kstrdup_const+0x53/0x80 [ 3455.223149] kstrdup+0x36/0x70 [ 3455.223916] kstrdup_const+0x53/0x80 [ 3455.224783] kvasprintf_const+0x10c/0x1a0 [ 3455.225765] kobject_set_name_vargs+0x56/0x150 [ 3455.226837] kobject_init_and_add+0xc9/0x160 [ 3455.227798] ? kobject_create_and_add+0xb0/0xb0 [ 3455.228910] ? wait_for_completion_io+0x270/0x270 [ 3455.230037] ? kernfs_name_hash+0xe7/0x110 [ 3455.231041] ? kernfs_find_ns+0x256/0x380 [ 3455.232039] sysfs_slab_add+0x172/0x200 [ 3455.232917] __kmem_cache_create+0x3db/0x520 [ 3455.233967] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3455.235154] p9_client_create+0xc6a/0x1230 [ 3455.236178] ? p9_client_flush+0x430/0x430 [ 3455.237181] ? trace_hardirqs_on+0x5b/0x180 [ 3455.238214] ? lockdep_init_map_type+0x2c7/0x780 [ 3455.239344] ? __raw_spin_lock_init+0x36/0x110 [ 3455.240452] v9fs_session_init+0x1dd/0x1680 [ 3455.241483] ? lock_release+0x680/0x680 [ 3455.242456] ? kmem_cache_alloc_trace+0x151/0x320 [ 3455.243582] ? v9fs_show_options+0x690/0x690 [ 3455.244638] ? trace_hardirqs_on+0x5b/0x180 [ 3455.245648] ? kasan_unpoison_shadow+0x33/0x50 [ 3455.246726] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3455.247932] v9fs_mount+0x79/0x8f0 [ 3455.248770] ? v9fs_write_inode+0x60/0x60 [ 3455.249760] legacy_get_tree+0x105/0x220 [ 3455.250705] vfs_get_tree+0x8e/0x300 [ 3455.251573] path_mount+0x1429/0x2120 [ 3455.252478] ? strncpy_from_user+0x9e/0x470 [ 3455.253480] ? finish_automount+0xa90/0xa90 [ 3455.254511] ? getname_flags.part.0+0x1dd/0x4f0 [ 3455.255583] ? _copy_from_user+0xfb/0x1b0 [ 3455.256506] __x64_sys_mount+0x282/0x300 05:40:57 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x26}}, 0x0) [ 3455.257416] ? copy_mnt_ns+0xa00/0xa00 [ 3455.258457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3455.259634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3455.260795] do_syscall_64+0x33/0x40 [ 3455.261660] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3455.262884] RIP: 0033:0x7fbfa6f6fb19 [ 3455.263769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3455.268030] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3455.269701] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3455.271409] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3455.273078] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3455.274789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3455.276498] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:40:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x1, 'ip6_vti0\x00'}) [ 3455.341997] 9pnet_virtio: no channels available for device [ 3455.350258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=75785 comm=syz-executor.0 [ 3455.351757] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=75785 comm=syz-executor.0 [ 3455.361915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xc01}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3455.440964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:57 executing program 6: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000000)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:40:57 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0xc0}}, 0x0) [ 3455.460648] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:40:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x600000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:40:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3e8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:40:57 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x4084, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) 05:41:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 66) 05:41:14 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0xec0}}, 0x0) 05:41:14 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000eb83354e510809c14c1b0b3186298364e839231eaacacf76b292976715d6cebf9425ed0cf8b5d5fe31a915ad1758c9e18d96a0da9b42ac168178ad81ddca2094b09b0ed96606595f143d160b412d5a1bfdc8e7ab4d40a84abe00fe7ad3d17f7816ddacceec75b011bebb98e3fe67ac968866a504aca1f3aca4305e05368f068db264c9f74276d63fb7412653cdd84ccac7b237864659b802b36cfa8dae5569b1303e374ab7f1d339caf8917b5b979ed2d85cf3561b445b9af2916c936e16668e7e8805d2306abb727badf4793889dd02bf1affed2775f769016a82f55e6e2f8e4614052486f112474c6a906df02d603d76a4700c9e0ce2a7a9b107de9b996d23442ed1402b77eeb93811328b5f34ac0cc9591c1f23aa67ba1ee093f231ddb3d9ae5bf2c3f0511af5b369b393b475d4a46aa37c8c67ed145a23d54832d530665d0090e326a305134b6e46f15d265e74ffdddcb6acd4119abb4c5d3ccbdf93e55016010320939ba124a28e3b"], 0x1c}}, 0x0) 05:41:14 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3472.990202] FAULT_INJECTION: forcing a failure. [ 3472.990202] name failslab, interval 1, probability 0, space 0, times 0 [ 3472.993016] CPU: 0 PID: 76294 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3472.994566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3472.996550] Call Trace: [ 3472.997149] dump_stack+0x107/0x167 [ 3472.997979] should_fail.cold+0x5/0xa [ 3472.998846] should_failslab+0x5/0x20 [ 3472.999721] __kmalloc_track_caller+0x79/0x370 [ 3473.000749] ? kstrdup_const+0x53/0x80 [ 3473.001633] kstrdup+0x36/0x70 [ 3473.002365] kstrdup_const+0x53/0x80 [ 3473.003217] __kernfs_new_node+0x9d/0x860 [ 3473.004164] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3473.005246] ? lock_acquire+0x197/0x470 [ 3473.006154] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3473.007346] ? lock_release+0x680/0x680 [ 3473.008243] ? find_held_lock+0x2c/0x110 [ 3473.009162] kernfs_new_node+0x18d/0x250 [ 3473.010087] kernfs_create_dir_ns+0x49/0x160 [ 3473.011099] sysfs_create_dir_ns+0x127/0x290 [ 3473.012088] ? sysfs_create_mount_point+0xb0/0xb0 [ 3473.013166] ? rwlock_bug.part.0+0x90/0x90 [ 3473.014127] ? do_raw_spin_unlock+0x4f/0x220 [ 3473.015138] kobject_add_internal+0x25e/0xa30 [ 3473.016156] kobject_init_and_add+0x101/0x160 [ 3473.017162] ? kobject_create_and_add+0xb0/0xb0 [ 3473.018212] ? wait_for_completion_io+0x270/0x270 [ 3473.019301] ? kernfs_name_hash+0xe7/0x110 [ 3473.020263] ? kernfs_find_ns+0x256/0x380 [ 3473.021208] sysfs_slab_add+0x172/0x200 [ 3473.022109] __kmem_cache_create+0x3db/0x520 [ 3473.023114] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3473.024244] p9_client_create+0xc6a/0x1230 [ 3473.025205] ? p9_client_flush+0x430/0x430 [ 3473.026155] ? trace_hardirqs_on+0x5b/0x180 [ 3473.027138] ? lockdep_init_map_type+0x2c7/0x780 [ 3473.028203] ? __raw_spin_lock_init+0x36/0x110 [ 3473.029239] v9fs_session_init+0x1dd/0x1680 [ 3473.030213] ? lock_release+0x680/0x680 [ 3473.031130] ? kmem_cache_alloc_trace+0x151/0x320 [ 3473.032206] ? v9fs_show_options+0x690/0x690 [ 3473.033201] ? trace_hardirqs_on+0x5b/0x180 [ 3473.034172] ? kasan_unpoison_shadow+0x33/0x50 [ 3473.035205] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3473.036340] v9fs_mount+0x79/0x8f0 [ 3473.037140] ? v9fs_write_inode+0x60/0x60 [ 3473.038072] legacy_get_tree+0x105/0x220 [ 3473.039000] vfs_get_tree+0x8e/0x300 [ 3473.039833] path_mount+0x1429/0x2120 [ 3473.040693] ? strncpy_from_user+0x9e/0x470 [ 3473.041654] ? finish_automount+0xa90/0xa90 [ 3473.042616] ? getname_flags.part.0+0x1dd/0x4f0 [ 3473.043662] ? _copy_from_user+0xfb/0x1b0 [ 3473.044595] __x64_sys_mount+0x282/0x300 [ 3473.045500] ? copy_mnt_ns+0xa00/0xa00 [ 3473.046373] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3473.047549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3473.048699] do_syscall_64+0x33/0x40 [ 3473.049531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3473.050669] RIP: 0033:0x7fbfa6f6fb19 [ 3473.051514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3473.055582] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3473.057269] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3473.058849] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3473.060441] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3473.062021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3473.063615] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3473.065556] kobject_add_internal failed for 9p-fcall-cache-261 (error: -12 parent: slab) [ 3473.067515] kmem_cache_create(9p-fcall-cache-261) failed with error -12 [ 3473.069036] CPU: 0 PID: 76294 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3473.070575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3473.072426] Call Trace: [ 3473.073019] dump_stack+0x107/0x167 [ 3473.073837] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3473.075025] p9_client_create+0xc6a/0x1230 [ 3473.075986] ? p9_client_flush+0x430/0x430 [ 3473.076943] ? trace_hardirqs_on+0x5b/0x180 [ 3473.077911] ? lockdep_init_map_type+0x2c7/0x780 [ 3473.078970] ? __raw_spin_lock_init+0x36/0x110 [ 3473.080008] v9fs_session_init+0x1dd/0x1680 [ 3473.080975] ? lock_release+0x680/0x680 [ 3473.081873] ? kmem_cache_alloc_trace+0x151/0x320 [ 3473.082949] ? v9fs_show_options+0x690/0x690 [ 3473.083948] ? trace_hardirqs_on+0x5b/0x180 [ 3473.084911] ? kasan_unpoison_shadow+0x33/0x50 [ 3473.085927] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3473.087072] v9fs_mount+0x79/0x8f0 [ 3473.087868] ? v9fs_write_inode+0x60/0x60 [ 3473.088794] legacy_get_tree+0x105/0x220 [ 3473.089705] vfs_get_tree+0x8e/0x300 [ 3473.090538] path_mount+0x1429/0x2120 [ 3473.091407] ? strncpy_from_user+0x9e/0x470 [ 3473.092368] ? finish_automount+0xa90/0xa90 [ 3473.093330] ? getname_flags.part.0+0x1dd/0x4f0 [ 3473.094365] ? _copy_from_user+0xfb/0x1b0 [ 3473.095306] __x64_sys_mount+0x282/0x300 [ 3473.096213] ? copy_mnt_ns+0xa00/0xa00 [ 3473.097088] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3473.098255] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3473.099424] do_syscall_64+0x33/0x40 [ 3473.100257] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3473.101398] RIP: 0033:0x7fbfa6f6fb19 [ 3473.102231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3473.106342] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3473.106377] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3473.109049] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3473.110622] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3473.112212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3473.113792] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:41:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x5c8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:41:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:41:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xec0}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:41:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x69a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:41:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xa00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3473.159437] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=76301 comm=syz-executor.0 05:41:15 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000140)={0x41040100, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 3473.161233] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=76301 comm=syz-executor.0 05:41:15 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2000}}, 0x0) 05:41:15 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3473.349251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:41:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 67) 05:41:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 05:41:34 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:41:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xe00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:41:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x700000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:41:34 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:41:34 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:41:34 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x33fe0}}, 0x0) [ 3492.192844] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=76758 comm=syz-executor.0 [ 3492.194812] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=76758 comm=syz-executor.0 [ 3492.196283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3492.199424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3492.209107] 9pnet_virtio: no channels available for device [ 3492.211353] FAULT_INJECTION: forcing a failure. [ 3492.211353] name failslab, interval 1, probability 0, space 0, times 0 [ 3492.213249] CPU: 1 PID: 76777 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3492.214295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3492.215537] Call Trace: [ 3492.215951] dump_stack+0x107/0x167 [ 3492.216501] should_fail.cold+0x5/0xa [ 3492.217077] ? create_object.isra.0+0x3a/0xa20 [ 3492.217765] should_failslab+0x5/0x20 [ 3492.218337] kmem_cache_alloc+0x5b/0x310 [ 3492.218950] create_object.isra.0+0x3a/0xa20 [ 3492.219604] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3492.220370] __kmalloc_track_caller+0x177/0x370 [ 3492.221066] ? kstrdup_const+0x53/0x80 [ 3492.221651] kstrdup+0x36/0x70 [ 3492.222133] kstrdup_const+0x53/0x80 [ 3492.222695] __kernfs_new_node+0x9d/0x860 [ 3492.223321] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3492.224044] ? lock_acquire+0x197/0x470 [ 3492.224639] ? perf_trace_lock+0xac/0x490 [ 3492.225258] ? __lockdep_reset_lock+0x180/0x180 [ 3492.225952] kernfs_new_node+0x18d/0x250 [ 3492.226563] kernfs_create_dir_ns+0x49/0x160 [ 3492.227221] sysfs_create_dir_ns+0x127/0x290 [ 3492.227884] ? sysfs_create_mount_point+0xb0/0xb0 [ 3492.228603] ? rwlock_bug.part.0+0x90/0x90 [ 3492.229240] ? do_raw_spin_unlock+0x4f/0x220 [ 3492.229901] kobject_add_internal+0x25e/0xa30 [ 3492.230576] kobject_init_and_add+0x101/0x160 [ 3492.231250] ? kobject_create_and_add+0xb0/0xb0 [ 3492.231968] ? wait_for_completion_io+0x270/0x270 [ 3492.232680] ? kernfs_name_hash+0xe7/0x110 [ 3492.233313] ? kernfs_find_ns+0x256/0x380 [ 3492.233939] sysfs_slab_add+0x172/0x200 [ 3492.234539] __kmem_cache_create+0x3db/0x520 [ 3492.235207] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3492.235961] p9_client_create+0xc6a/0x1230 [ 3492.236598] ? p9_client_flush+0x430/0x430 [ 3492.237229] ? trace_hardirqs_on+0x5b/0x180 [ 3492.237872] ? lockdep_init_map_type+0x2c7/0x780 [ 3492.238575] ? __raw_spin_lock_init+0x36/0x110 [ 3492.239260] v9fs_session_init+0x1dd/0x1680 [ 3492.239905] ? lock_release+0x680/0x680 [ 3492.240501] ? kmem_cache_alloc_trace+0x151/0x320 [ 3492.241211] ? v9fs_show_options+0x690/0x690 [ 3492.241875] ? trace_hardirqs_on+0x5b/0x180 [ 3492.242514] ? kasan_unpoison_shadow+0x33/0x50 [ 3492.243189] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3492.243949] v9fs_mount+0x79/0x8f0 [ 3492.244475] ? v9fs_write_inode+0x60/0x60 [ 3492.245095] legacy_get_tree+0x105/0x220 [ 3492.245700] vfs_get_tree+0x8e/0x300 [ 3492.246251] path_mount+0x1429/0x2120 [ 3492.246826] ? strncpy_from_user+0x9e/0x470 [ 3492.247463] ? finish_automount+0xa90/0xa90 [ 3492.248108] ? getname_flags.part.0+0x1dd/0x4f0 [ 3492.248794] ? _copy_from_user+0xfb/0x1b0 [ 3492.249414] __x64_sys_mount+0x282/0x300 [ 3492.250015] ? copy_mnt_ns+0xa00/0xa00 [ 3492.250594] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3492.251375] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3492.252146] do_syscall_64+0x33/0x40 [ 3492.252698] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3492.253456] RIP: 0033:0x7fbfa6f6fb19 [ 3492.254009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3492.256727] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3492.257848] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3492.258906] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3492.259961] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3492.261009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3492.262058] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3492.284986] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=76776 comm=syz-executor.6 [ 3492.286983] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=76776 comm=syz-executor.6 05:41:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x79a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:41:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x20000424}}, 0x0) 05:41:51 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:41:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x33, {r1}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000b0a0500001000000000000000000000140000001100010000000001000000000000000a0356c7dae1a6d26f9bd1bab36eecc0e9de71269e4d73"], 0x3c}}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x7fff, 0x104) fcntl$dupfd(r3, 0x406, r0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x1ff) 05:41:51 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:41:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 68) 05:41:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4800}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3509.406651] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3509.410142] FAULT_INJECTION: forcing a failure. [ 3509.410142] name failslab, interval 1, probability 0, space 0, times 0 [ 3509.412768] CPU: 1 PID: 77081 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3509.414326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3509.416182] Call Trace: [ 3509.416783] dump_stack+0x107/0x167 [ 3509.417604] should_fail.cold+0x5/0xa [ 3509.418462] ? __kernfs_new_node+0xd4/0x860 [ 3509.419438] should_failslab+0x5/0x20 [ 3509.420307] kmem_cache_alloc+0x5b/0x310 [ 3509.421218] __kernfs_new_node+0xd4/0x860 [ 3509.422147] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3509.423216] ? lock_acquire+0x197/0x470 [ 3509.424114] ? perf_trace_lock+0xac/0x490 [ 3509.425069] ? __lockdep_reset_lock+0x180/0x180 [ 3509.426100] kernfs_new_node+0x18d/0x250 [ 3509.427003] kernfs_create_dir_ns+0x49/0x160 [ 3509.427995] sysfs_create_dir_ns+0x127/0x290 [ 3509.429014] ? sysfs_create_mount_point+0xb0/0xb0 [ 3509.430097] ? rwlock_bug.part.0+0x90/0x90 [ 3509.431040] ? do_raw_spin_unlock+0x4f/0x220 [ 3509.432036] kobject_add_internal+0x25e/0xa30 [ 3509.433072] kobject_init_and_add+0x101/0x160 [ 3509.434076] ? kobject_create_and_add+0xb0/0xb0 [ 3509.435116] ? wait_for_completion_io+0x270/0x270 [ 3509.436210] ? kernfs_name_hash+0xe7/0x110 [ 3509.437149] ? kernfs_find_ns+0x256/0x380 [ 3509.438089] sysfs_slab_add+0x172/0x200 [ 3509.439001] __kmem_cache_create+0x3db/0x520 [ 3509.439998] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3509.441134] p9_client_create+0xc6a/0x1230 [ 3509.442116] ? p9_client_flush+0x430/0x430 [ 3509.443065] ? trace_hardirqs_on+0x5b/0x180 [ 3509.444035] ? lockdep_init_map_type+0x2c7/0x780 [ 3509.445113] ? __raw_spin_lock_init+0x36/0x110 [ 3509.446140] v9fs_session_init+0x1dd/0x1680 [ 3509.447111] ? lock_release+0x680/0x680 [ 3509.448020] ? kmem_cache_alloc_trace+0x151/0x320 [ 3509.449110] ? v9fs_show_options+0x690/0x690 [ 3509.450106] ? trace_hardirqs_on+0x5b/0x180 [ 3509.451078] ? kasan_unpoison_shadow+0x33/0x50 [ 3509.452129] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3509.453305] v9fs_mount+0x79/0x8f0 [ 3509.454105] ? v9fs_write_inode+0x60/0x60 [ 3509.455028] legacy_get_tree+0x105/0x220 [ 3509.455943] vfs_get_tree+0x8e/0x300 [ 3509.456793] path_mount+0x1429/0x2120 [ 3509.457660] ? strncpy_from_user+0x9e/0x470 [ 3509.458623] ? finish_automount+0xa90/0xa90 [ 3509.459594] ? getname_flags.part.0+0x1dd/0x4f0 [ 3509.460649] ? _copy_from_user+0xfb/0x1b0 [ 3509.461589] __x64_sys_mount+0x282/0x300 [ 3509.462495] ? copy_mnt_ns+0xa00/0xa00 [ 3509.463372] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3509.464557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3509.465712] do_syscall_64+0x33/0x40 [ 3509.466553] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3509.467694] RIP: 0033:0x7fbfa6f6fb19 [ 3509.468532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.472641] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3509.474395] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3509.475988] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3509.477584] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3509.479203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.480798] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 [ 3509.484536] kobject_add_internal failed for 9p-fcall-cache-263 (error: -12 parent: slab) [ 3509.486775] kmem_cache_create(9p-fcall-cache-263) failed with error -12 [ 3509.488373] CPU: 1 PID: 77081 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3509.489905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3509.491773] Call Trace: [ 3509.492377] dump_stack+0x107/0x167 [ 3509.493216] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3509.494416] p9_client_create+0xc6a/0x1230 [ 3509.495380] ? p9_client_flush+0x430/0x430 [ 3509.496345] ? trace_hardirqs_on+0x5b/0x180 [ 3509.497316] ? lockdep_init_map_type+0x2c7/0x780 [ 3509.498377] ? __raw_spin_lock_init+0x36/0x110 [ 3509.499379] v9fs_session_init+0x1dd/0x1680 [ 3509.499538] 9pnet_virtio: no channels available for device /dev/hwrng [ 3509.500355] ? lock_release+0x680/0x680 [ 3509.500388] ? kmem_cache_alloc_trace+0x151/0x320 [ 3509.502852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=77095 comm=syz-executor.6 [ 3509.503264] ? v9fs_show_options+0x690/0x690 [ 3509.504948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=77095 comm=syz-executor.6 [ 3509.505881] ? trace_hardirqs_on+0x5b/0x180 [ 3509.505904] ? kasan_unpoison_shadow+0x33/0x50 [ 3509.509514] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3509.510651] v9fs_mount+0x79/0x8f0 [ 3509.511466] ? v9fs_write_inode+0x60/0x60 [ 3509.512457] legacy_get_tree+0x105/0x220 [ 3509.513368] vfs_get_tree+0x8e/0x300 [ 3509.514193] path_mount+0x1429/0x2120 [ 3509.515051] ? strncpy_from_user+0x9e/0x470 [ 3509.516019] ? finish_automount+0xa90/0xa90 [ 3509.516997] ? getname_flags.part.0+0x1dd/0x4f0 [ 3509.518044] ? _copy_from_user+0xfb/0x1b0 [ 3509.518985] __x64_sys_mount+0x282/0x300 [ 3509.519893] ? copy_mnt_ns+0xa00/0xa00 [ 3509.520786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3509.521977] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3509.523134] do_syscall_64+0x33/0x40 [ 3509.523972] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3509.525132] RIP: 0033:0x7fbfa6f6fb19 [ 3509.525976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.530155] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3509.531885] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3509.533509] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3509.535098] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3509.536724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.538326] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:41:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x1c00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3509.555509] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=77146 comm=syz-executor.0 [ 3509.558352] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=77146 comm=syz-executor.0 05:41:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4c00}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:41:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x12a) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 05:41:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x7ffff000}}, 0x0) [ 3509.689994] 9pnet_virtio: no channels available for device 05:41:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x2000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) 05:41:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 69) [ 3509.743968] FAULT_INJECTION: forcing a failure. [ 3509.743968] name failslab, interval 1, probability 0, space 0, times 0 [ 3509.745434] CPU: 0 PID: 77424 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 3509.746236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3509.747203] Call Trace: [ 3509.747505] dump_stack+0x107/0x167 [ 3509.747921] should_fail.cold+0x5/0xa [ 3509.748372] ? create_object.isra.0+0x3a/0xa20 [ 3509.748918] should_failslab+0x5/0x20 [ 3509.749365] kmem_cache_alloc+0x5b/0x310 [ 3509.749843] create_object.isra.0+0x3a/0xa20 [ 3509.750347] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3509.750940] kmem_cache_alloc+0x159/0x310 [ 3509.751428] __kernfs_new_node+0xd4/0x860 [ 3509.751910] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3509.752474] ? lock_acquire+0x197/0x470 [ 3509.752931] ? perf_trace_lock+0xac/0x490 [ 3509.753414] ? __lockdep_reset_lock+0x180/0x180 [ 3509.753962] kernfs_new_node+0x18d/0x250 [ 3509.754434] kernfs_create_dir_ns+0x49/0x160 [ 3509.754934] sysfs_create_dir_ns+0x127/0x290 [ 3509.755445] ? sysfs_create_mount_point+0xb0/0xb0 [ 3509.755997] ? rwlock_bug.part.0+0x90/0x90 [ 3509.756491] ? do_raw_spin_unlock+0x4f/0x220 [ 3509.757008] kobject_add_internal+0x25e/0xa30 [ 3509.757532] kobject_init_and_add+0x101/0x160 [ 3509.758050] ? kobject_create_and_add+0xb0/0xb0 [ 3509.758594] ? wait_for_completion_io+0x270/0x270 [ 3509.759150] ? kernfs_name_hash+0xe7/0x110 [ 3509.759642] ? kernfs_find_ns+0x256/0x380 [ 3509.760122] sysfs_slab_add+0x172/0x200 [ 3509.760602] __kmem_cache_create+0x3db/0x520 [ 3509.761110] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3509.761678] p9_client_create+0xc6a/0x1230 [ 3509.762168] ? p9_client_flush+0x430/0x430 [ 3509.762663] ? trace_hardirqs_on+0x5b/0x180 [ 3509.763168] ? lockdep_init_map_type+0x2c7/0x780 [ 3509.763718] ? __raw_spin_lock_init+0x36/0x110 [ 3509.764254] v9fs_session_init+0x1dd/0x1680 [ 3509.764764] ? lock_release+0x680/0x680 [ 3509.765238] ? kmem_cache_alloc_trace+0x151/0x320 [ 3509.765799] ? v9fs_show_options+0x690/0x690 [ 3509.766313] ? trace_hardirqs_on+0x5b/0x180 [ 3509.766813] ? kasan_unpoison_shadow+0x33/0x50 [ 3509.767338] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3509.767922] v9fs_mount+0x79/0x8f0 [ 3509.768337] ? v9fs_write_inode+0x60/0x60 [ 3509.768822] legacy_get_tree+0x105/0x220 [ 3509.769294] vfs_get_tree+0x8e/0x300 [ 3509.769727] path_mount+0x1429/0x2120 [ 3509.770164] ? strncpy_from_user+0x9e/0x470 [ 3509.770662] ? finish_automount+0xa90/0xa90 [ 3509.771145] ? getname_flags.part.0+0x1dd/0x4f0 [ 3509.771685] ? _copy_from_user+0xfb/0x1b0 [ 3509.772171] __x64_sys_mount+0x282/0x300 [ 3509.772652] ? copy_mnt_ns+0xa00/0xa00 [ 3509.773104] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3509.773712] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3509.774308] do_syscall_64+0x33/0x40 [ 3509.774727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3509.775322] RIP: 0033:0x7fbfa6f6fb19 [ 3509.775752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.777879] RSP: 002b:00007fbfa44e5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3509.778765] RAX: ffffffffffffffda RBX: 00007fbfa7082f60 RCX: 00007fbfa6f6fb19 [ 3509.779597] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 3509.780429] RBP: 00007fbfa44e51d0 R08: 0000000020000140 R09: 0000000000000000 [ 3509.781249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.782064] R13: 00007fffcdfb09ff R14: 00007fbfa44e5300 R15: 0000000000022000 05:41:51 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:41:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x800000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:41:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0xfffffdef}}, 0x0) [ 3509.813443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=77493 comm=syz-executor.0 [ 3509.816421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=77493 comm=syz-executor.0 05:41:51 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}, 0x2}, 0x0) [ 3509.889036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:41:51 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x3]}, 0x8) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x400042, 0x14f) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_getfd(r0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xb, &(0x7f00000000c0)=0xba, 0x4) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000140)) [ 3509.897888] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3509.943211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=77727 comm=syz-executor.6 [ 3509.946010] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=77727 comm=syz-executor.6 [ 3510.046890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:41:52 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}, 0x4}, 0x0) 05:41:52 executing program 1: ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x65, 0x4) r1 = dup2(0xffffffffffffffff, r0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@private}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xfd0e) write(0xffffffffffffffff, &(0x7f0000000100)='8', 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lseek(r2, 0xf2fd000100000000, 0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000180)=0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 05:41:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6800}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) 05:41:52 executing program 0: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x4cc3, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSET={0x14}], {0x14}}, 0x3c}}, 0x0) 05:41:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x89a000000000000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) 05:41:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3e00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x4, "9755154351ac9a"}) [ 3510.064769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3510.121782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=77844 comm=syz-executor.0 [ 3510.123353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=77844 comm=syz-executor.0 05:41:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6c00}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3510.147418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3510.156156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 05:41:52 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x24, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}, 0x8}, 0x0) 05:41:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) r1 = gettid() tkill(r1, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3, 0x1, 0x9, 0xff, 0x0, 0x5, 0x29e0e, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x11000, 0x100000000, 0x101, 0x4, 0x10000, 0x2000002, 0x101, 0x0, 0x0, 0x0, 0x7}, r1, 0x10, 0xffffffffffffffff, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) rt_tgsigqueueinfo(r3, r1, 0x1d, &(0x7f0000000ac0)={0x1a, 0x9, 0x9}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000000181f00ec9ca366390a96177fa4ee89000000", @ANYRES32=r2, @ANYBLOB="fcffffff000000002e2f66696c653100"]) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3f, 0x4, 0x29, 0x81, 0x0, 0xe40, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x400, 0x3, 0x4, 0x2, 0x1, 0x80000001, 0x21, 0x0, 0xfbad, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r4, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000a40)={0x5, 0x80, 0x1, 0x6, 0x5, 0x8c, 0x0, 0x1, 0xc0000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x89, 0x2be09cea7d7c7e83, @perf_config_ext={0x3, 0x1}, 0x10100, 0x8, 0x3, 0xe, 0x0, 0x20, 0x9, 0x0, 0x3f, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r2, 0xe) perf_event_open(&(0x7f00000009c0)={0x3, 0x80, 0x7, 0x6a, 0x7, 0x6, 0x0, 0x10000, 0x2a044, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000980), 0x4}, 0xa00, 0x10000, 0x55f, 0x4, 0x3, 0x4, 0xf, 0x0, 0x0, 0x0, 0x7}, r1, 0x9, r5, 0x18) tkill(r3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000300)={0x570, 0x2f, 0x100, 0x70bd2a, 0x25dfdbff, {0x1a}, [@generic="7766fc68fc245533cc10d29feaa663d15436ceda13326a166ad6b6f44c6f378047cdb18429fc1af765265bd6e9b81a7f990b79100781c0f2aa6bacc0c133373c911d866fa1ac45eae074e814811282ae5e7c5414dd9b117dddf9dfceb75f92dfd4236270fcc056a5a57a799455fe1a70c6b2c0e27209954649764cb8537903d2d9b78ac4979cb4e0d1cfb678571b45ef7ada6f81367219bf5ee14c1b2150a14b16598b8a63db8ba3f0e0fa4a6f6a50da8278ed0aef2f3fb349dd26cb70fcc8566c1d8c8e66d4", @generic="5f48ad240173c6a67af1dc08046fcdace4a6a1d229679bd1b61737bb950eda3596cc638cf83d8bd383169b3a2ada06e40d097f0858d0d85780105bf87805b5fee75ec086a2daca256d757bc0dad88d74bd4d5ac4699a2d3e54e9182c0593cd990a088d682e29f2d4877b1af9f8ca73cd1137c5657e3915ccbd41e0880189f95a40d1e72e533ac9313fae43738c2a363832103cd1a349c02e0074c85b189794cd637b4122383bcd87f5c37d2397bcd8fc34fc52080e83", @nested={0x92, 0xc, 0x0, 0x1, [@typed={0x7, 0x68, 0x0, 0x0, @str='9p\x00'}, @generic="b53ff3044fa431e3610f00ad2f69cbafdcff4f0d3e5c8f633160d6aa1f077b1f07cfea825c57283347be20d8cfe4399594c5d7d0c480927eb4dbc6775f95b15e89", @generic="8f78c2fa", @typed={0xc, 0x7e, 0x0, 0x0, @u64=0x1625}, @generic="598d67671ba7366c901bded23fc5410e380b438f8b20d307e413496dacff5eb20f47156602af0fc8abed4c70c66c575ac802fab088"]}, @typed={0x8, 0x44, 0x0, 0x0, @uid=0xffffffffffffffff}, @nested={0x1f1, 0x6e, 0x0, 0x1, [@typed={0xf3, 0x57, 0x0, 0x0, @binary="0e1d1a4e6e33d42c791ab22f2ea7aa68c8bff7470ad1fae334749df6fdda87fac52f026a8457c7b159b8839a387aec793e8f21ff580be60b238e1c1ba09518a7cdd7dae26be59ceeb2db92b710059a1be3e7f2eb29c9c00586fe03ad3876ec9cbfac46c58eaab7ae9f1d30b3c6a15c9601c4adf6999c25e99dcc1ddaf42a312a6d162db0e24c1950d4965949097873622c3f6781150208aa4a7ff29c6a6b4a90311f2705cb2fd28aab5fb2684d514aa49c86263987b1d686f711ee0808e9c26f05f55716310fff88e92a7402a0d7d4814ea1686e8fc28a0422d66e26df2878cadb2506aca99c82b1afac0b7de9f961"}, @generic="dbc84a6626030ccb956cfd21c65aabe43e3fd2b7976403bd8d93ddf4c31b02ac2fb97607443f20a5a96785415534b4946595647e61b3f1df16078d8e92c90d7311c0f5db4b8d0b155274e544b15c33361d706544385ada5c811e1a30c6311bb45313f0287b0cd16654782745192025fc669a644f462d032200d10533537aaa41d0ccf0ea6da4267644c5f453d9c1e2f3eba4346cadf3a3eb1936165ae5d5528b9dc7b8516e20ef4377167074a3811cc10806584f7b6254ac6a1879f9fdce04051a3c10e63bc3e3c924fc69ab17a52d09723433de1f4435c729c191533e8aecdb08dfc4087ba829de664f3317ff00f11f1fc71a7de5d0583afd"]}, @nested={0x104, 0x3b, 0x0, 0x1, [@generic="63b109442964d8b8361582ffb7f642e2df0b5aae0c59d29e3a6f5f13da9caaad706a8df18f040b3069afdec93eb2318b906b15bfdf09582f651cada69e443374983e1278a8c5bf4149c53a5c266400863de899355ce18c1b69b0042f72c7e58c75c0702c374b15a04e897f8d0adbab3b7910bd41e63d612af6f64acfd9ec3c2bdeaafb973536befe01088226a86d07dda163be038375d81aeed9f6c7c289c8933903c003ed35c84038288b7a94e42631f4dd93fa58678fabe6820e8c5752299aca9906d82640c25daebdc9dc2e16ee898526", @generic="590e3ec92f5cd200fcfa3860f8542fa880ee6d39f559b35a61c5b1a251c97b737e8115f428c9129a6f813bc3848e"]}, @generic="2f6d52f6fe27bb23ae55a5ca4f9d606a0c9c7a10a5ff4bcba27a5fa3646f03ad3af8483d4f9e4b8544ebdb92f7739af3f4b4019fadd911b40936f1e4e5b501cbe8cd5d52aac21c6dfa"]}, 0x570}, 0x1, 0x0, 0x0, 0x40000c0}, 0x40050) 05:41:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) [ 3510.188446] 9pnet_virtio: no channels available for device [ 3510.231614] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3510.245708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3526.671445] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800ce9de40 (size 32): comm "syz-executor.5", pid 77081, jiffies 4298176386 (age 26.928s) hex dump (first 32 bytes): 39 70 2d 66 63 61 6c 6c 2d 63 61 63 68 65 2d 32 9p-fcall-cache-2 36 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63.............. backtrace: [<00000000892d8967>] kstrdup+0x36/0x70 [<00000000e7640c13>] kstrdup_const+0x53/0x80 [<00000000909c55f3>] kvasprintf_const+0x10c/0x1a0 [<00000000012f99d0>] kobject_set_name_vargs+0x56/0x150 [<000000007305e965>] kobject_init_and_add+0xc9/0x160 [<0000000080619d6e>] sysfs_slab_add+0x172/0x200 [<00000000f481f806>] __kmem_cache_create+0x3db/0x520 [<00000000cd40f5d4>] kmem_cache_create_usercopy+0x1db/0x2f0 [<00000000d30d2502>] p9_client_create+0xc6a/0x1230 [<00000000c3b3580d>] v9fs_session_init+0x1dd/0x1680 [<000000001f724559>] v9fs_mount+0x79/0x8f0 [<00000000c7be28b7>] legacy_get_tree+0x105/0x220 [<000000009f0c8cd0>] vfs_get_tree+0x8e/0x300 [<000000003cf9820b>] path_mount+0x1429/0x2120 [<000000002051e294>] __x64_sys_mount+0x282/0x300 [<00000000cbf3b783>] do_syscall_64+0x33/0x40 BUG: leak checking failed VM DIAGNOSIS: 05:42:18 Registers: info registers vcpu 0 RAX=ffffffff83e7e960 RBX=0000000000000000 RCX=ffffffff83e6653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7ef68 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85677688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e96e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005564012976cc CR3=0000000009b92000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29323320657a697328203034656439 XMM03=373720646970202c22352e726f747563 XMM04=6c6c6163662d70392020323320643220 XMM05=32206336206336203136203336203636 XMM06=73657479622032332074737269662820 XMM07=2e363220656761282036383336373138 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7e960 RBX=0000000000000001 RCX=ffffffff83e6653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7ef68 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85677688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e96e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd660e2c58 CR3=0000000019fc8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000415505ca00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000