01600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:03:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:03:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext, 0xa400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "f39eb869ea8235240e67805b472f7f22"}, 0x11, 0x2) 20:03:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x1, r0, &(0x7f00000003c0)=0x2, 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="c3cb1409f08daf701c10167309debc412a02c492d030c900fca7e348fca9fabd7320dcc11484e1fb75e8015f55f87dbd50f12051f63300c87c8503575c8a965cac4d8114c96b5a77ba35647da923d3e008ecbc76770d6803fdf564080abb150067887b"], 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = syz_io_uring_setup(0x68d4, &(0x7f0000000100)={0x0, 0x80867e, 0x0, 0x0, 0x399}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000500)) sync_file_range(0xffffffffffffffff, 0x4, 0x4279, 0x1) syz_open_dev$rtc(&(0x7f0000000380), 0x80000000, 0x8000) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5049c, 0x0, 0x460, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fgetxattr(r3, &(0x7f00000002c0)=@random={'btrfs.', '[%\x00'}, &(0x7f0000000400)=""/39, 0x27) [ 2842.264838] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 20:03:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:03:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4103, 0x1007}], 0x1) read(r0, &(0x7f00000010c0)=""/80, 0x50) 20:03:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext, 0xa400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "f39eb869ea8235240e67805b472f7f22"}, 0x11, 0x2) 20:03:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:03:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000040), 0x0) 20:03:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x3f000000) 20:03:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:03:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x1, r0, &(0x7f00000003c0)=0x2, 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="c3cb1409f08daf701c10167309debc412a02c492d030c900fca7e348fca9fabd7320dcc11484e1fb75e8015f55f87dbd50f12051f63300c87c8503575c8a965cac4d8114c96b5a77ba35647da923d3e008ecbc76770d68"], 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = syz_io_uring_setup(0x68d4, &(0x7f0000000100)={0x0, 0x80867e, 0x0, 0x0, 0x399}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000500)) sync_file_range(0xffffffffffffffff, 0x4, 0x4279, 0x1) syz_open_dev$rtc(&(0x7f0000000380), 0x80000000, 0x8000) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/148, 0x94}, {&(0x7f0000000580)=""/98, 0x62}, {&(0x7f0000000440)=""/181, 0xb5}, {&(0x7f0000000300)=""/67, 0x43}], 0x4) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5049c, 0x0, 0x460, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fgetxattr(r3, &(0x7f00000002c0)=@random={'btrfs.', '[%\x00'}, &(0x7f0000000400)=""/39, 0x27) 20:03:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = fork() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x80, 0x2, 0x20, 0x3f, 0x0, 0xfffffffffffffff8, 0x8290d, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x200, 0x0, 0xab1, 0x5, 0x20, 0x2000007, 0x1, 0x0, 0x1f, 0x0, 0x1f}, r1, 0xa, 0xffffffffffffffff, 0xc) add_key$keyring(&(0x7f0000000180), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 20:03:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000014c0)=ANY=[@ANYBLOB="280000001800210c000000000000000002000000080002fbf38e7a076ed819c800000000", @ANYRES32, @ANYBLOB="b5ed5798cffe38049e892e0f1e0056d8dc87e8eb5bbe0699ff3394a44bc4ba2a9d5a214263ffaf3687ba9edbde231b033bc680ac8781f265155ef0517ff41aeb87892d3c886f89162c37f2b5c47bf10c4be81a2ee7b96acddfd0a94eae852aa0dda679cc4eec34cc74fa3cba5a707f0e7c97c448ec6cdf67748c0062b90c0860a17aeb1a14fd41f065370965c752bb"], 0x28}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="30c30ad7a0f8e431fd73d7b541b1a44c88837b78e13d1438"], 0x28}}, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000440)) r5 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x30, r7, 0x3052d000) [ 2856.823884] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 20:03:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:03:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 1) [ 2857.004873] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:03:43 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x40000000) [ 2857.034576] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:03:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:03:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) [ 2857.174695] FAULT_INJECTION: forcing a failure. [ 2857.174695] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.176310] CPU: 0 PID: 26443 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2857.177902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2857.179841] Call Trace: [ 2857.180443] dump_stack+0x107/0x167 [ 2857.181274] should_fail.cold+0x5/0xa [ 2857.182132] ? getname_flags.part.0+0x50/0x4f0 [ 2857.183077] should_failslab+0x5/0x20 [ 2857.183790] kmem_cache_alloc+0x5b/0x310 [ 2857.184553] getname_flags.part.0+0x50/0x4f0 [ 2857.185378] getname_flags+0x9a/0xe0 [ 2857.186076] do_mkdirat+0x8f/0x2b0 [ 2857.186773] ? user_path_create+0xf0/0xf0 [ 2857.187556] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2857.188533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2857.189495] do_syscall_64+0x33/0x40 [ 2857.190176] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2857.191162] RIP: 0033:0x7fcc5971bb19 [ 2857.191852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2857.194864] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2857.195587] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2857.196290] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2857.196987] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.197683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2857.198397] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:03:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) read(r2, &(0x7f0000000040)=""/225, 0xe1) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:03:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:03:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x878) unshare(0x48020200) 20:03:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) 20:03:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x1, r0, &(0x7f00000003c0)=0x2, 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="c3cb1409f08daf701c10167309debc412a02c492d030c900fca7e348fca9fabd7320dcc11484e1fb75e8015f55f87dbd50f12051f63300c87c8503575c8a965cac4d8114c96b5a77ba35647da923d3e008ecbc76770d68"], 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = syz_io_uring_setup(0x68d4, &(0x7f0000000100)={0x0, 0x80867e, 0x0, 0x0, 0x399}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000500)) sync_file_range(0xffffffffffffffff, 0x4, 0x4279, 0x1) syz_open_dev$rtc(&(0x7f0000000380), 0x80000000, 0x8000) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/148, 0x94}, {&(0x7f0000000580)=""/98, 0x62}, {&(0x7f0000000440)=""/181, 0xb5}, {&(0x7f0000000300)=""/67, 0x43}], 0x4) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5049c, 0x0, 0x460, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() fgetxattr(r3, &(0x7f00000002c0)=@random={'btrfs.', '[%\x00'}, &(0x7f0000000400)=""/39, 0x27) 20:03:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:03:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 2) 20:03:57 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x40020000) 20:03:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r4, &(0x7f0000000080)=""/4095, 0xfff, 0x303) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r5 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) r6 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001008000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f00000014c0)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1001000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x147e}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x3280011, &(0x7f0000002780)=ANY=[@ANYRESOCT, @ANYRESDEC=r4, @ANYRES64=r5, @ANYRES32=r5]) r7 = getpgrp(0x0) ptrace(0x10, r7) kcmp(0x0, r7, 0x1, r3, r6) fcntl$setown(0xffffffffffffffff, 0x8, r7) waitid(0x0, r7, 0x0, 0x8, 0x0) kcmp(r7, 0x0, 0x6, r1, r2) pwrite64(r1, &(0x7f0000001640)="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", 0x1000, 0x1ff) [ 2871.848212] FAULT_INJECTION: forcing a failure. [ 2871.848212] name failslab, interval 1, probability 0, space 0, times 0 [ 2871.849303] CPU: 0 PID: 26472 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2871.849939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2871.850712] Call Trace: [ 2871.850968] dump_stack+0x107/0x167 [ 2871.851311] should_fail.cold+0x5/0xa [ 2871.851673] ? create_object.isra.0+0x3a/0xa20 [ 2871.852103] should_failslab+0x5/0x20 [ 2871.852463] kmem_cache_alloc+0x5b/0x310 [ 2871.852843] ? ksys_write+0x21a/0x260 [ 2871.853203] create_object.isra.0+0x3a/0xa20 [ 2871.853617] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2871.854094] kmem_cache_alloc+0x159/0x310 [ 2871.858514] getname_flags.part.0+0x50/0x4f0 [ 2871.858922] getname_flags+0x9a/0xe0 [ 2871.859266] do_mkdirat+0x8f/0x2b0 [ 2871.859602] ? user_path_create+0xf0/0xf0 [ 2871.859986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2871.860473] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2871.860949] do_syscall_64+0x33/0x40 [ 2871.861294] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2871.861771] RIP: 0033:0x7fcc5971bb19 [ 2871.862113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2871.863805] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2871.864507] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2871.865166] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2871.865826] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2871.866495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2871.867145] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:03:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f00000000c0)=[{&(0x7f00000014c0)=""/4105, 0x1000}, {&(0x7f0000000100)=""/112, 0x6a}], 0xffffffffffffe0e) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x30, r0, 0xe05a5000) creat(&(0x7f0000000040)='./file0\x00', 0x0) 20:03:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:03:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 1) 20:03:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xe8030000) 20:03:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 3) 20:03:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:03:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x878) unshare(0x48020200) 20:03:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='totmaps\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 2872.628602] FAULT_INJECTION: forcing a failure. [ 2872.628602] name failslab, interval 1, probability 0, space 0, times 0 [ 2872.629639] CPU: 1 PID: 26496 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2872.630396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2872.631379] Call Trace: [ 2872.631639] dump_stack+0x107/0x167 [ 2872.631983] should_fail.cold+0x5/0xa [ 2872.632398] ? getname_flags.part.0+0x50/0x4f0 [ 2872.632823] should_failslab+0x5/0x20 [ 2872.633250] kmem_cache_alloc+0x5b/0x310 [ 2872.633631] getname_flags.part.0+0x50/0x4f0 [ 2872.634036] getname_flags+0x9a/0xe0 [ 2872.634618] do_mkdirat+0x8f/0x2b0 [ 2872.634954] ? user_path_create+0xf0/0xf0 [ 2872.635383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2872.635859] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2872.636372] do_syscall_64+0x33/0x40 [ 2872.636715] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2872.637236] RIP: 0033:0x7ff020237b19 [ 2872.637592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2872.639278] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2872.639939] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2872.640596] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2872.641273] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2872.641892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2872.642581] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 [ 2872.907968] FAULT_INJECTION: forcing a failure. [ 2872.907968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2872.909028] CPU: 1 PID: 26505 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2872.909619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2872.910333] Call Trace: [ 2872.910596] dump_stack+0x107/0x167 [ 2872.910909] should_fail.cold+0x5/0xa [ 2872.911243] strncpy_from_user+0x34/0x470 [ 2872.911602] getname_flags.part.0+0x95/0x4f0 [ 2872.911983] getname_flags+0x9a/0xe0 [ 2872.912300] do_mkdirat+0x8f/0x2b0 [ 2872.912606] ? user_path_create+0xf0/0xf0 [ 2872.912965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2872.913414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2872.913853] do_syscall_64+0x33/0x40 [ 2872.914171] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2872.914622] RIP: 0033:0x7fcc5971bb19 [ 2872.914945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2872.916490] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2872.917135] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2872.917738] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2872.918340] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2872.918957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2872.919559] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:04:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000080), 0x0) 20:04:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) dup3(r0, r1, 0x80000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x10000, 0x4) 20:04:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 4) 20:04:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 2) 20:04:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xeffdffff) 20:04:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x878) unshare(0x48020200) [ 2887.200926] FAULT_INJECTION: forcing a failure. [ 2887.200926] name failslab, interval 1, probability 0, space 0, times 0 [ 2887.201943] CPU: 1 PID: 26518 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2887.202658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2887.203474] Call Trace: [ 2887.203707] dump_stack+0x107/0x167 [ 2887.204018] should_fail.cold+0x5/0xa [ 2887.204393] ? create_object.isra.0+0x3a/0xa20 [ 2887.204780] should_failslab+0x5/0x20 [ 2887.205149] kmem_cache_alloc+0x5b/0x310 [ 2887.205496] ? ksys_write+0x21a/0x260 [ 2887.205821] create_object.isra.0+0x3a/0xa20 [ 2887.206271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2887.206730] kmem_cache_alloc+0x159/0x310 [ 2887.207225] getname_flags.part.0+0x50/0x4f0 [ 2887.207602] getname_flags+0x9a/0xe0 [ 2887.207920] do_mkdirat+0x8f/0x2b0 [ 2887.208275] ? user_path_create+0xf0/0xf0 [ 2887.208635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2887.209128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2887.209568] do_syscall_64+0x33/0x40 [ 2887.209885] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2887.210515] RIP: 0033:0x7ff020237b19 [ 2887.210846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2887.212538] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2887.213229] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2887.213828] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2887.214519] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2887.215261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2887.215859] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xf4010000) [ 2887.260888] FAULT_INJECTION: forcing a failure. [ 2887.260888] name failslab, interval 1, probability 0, space 0, times 0 [ 2887.262343] CPU: 1 PID: 26524 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2887.262986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2887.263710] Call Trace: [ 2887.263941] dump_stack+0x107/0x167 [ 2887.264302] should_fail.cold+0x5/0xa [ 2887.264629] ? __d_alloc+0x2a/0x990 [ 2887.264941] should_failslab+0x5/0x20 [ 2887.265343] kmem_cache_alloc+0x5b/0x310 [ 2887.265695] ? __d_lookup+0x3bf/0x760 [ 2887.266022] __d_alloc+0x2a/0x990 [ 2887.266368] d_alloc+0x46/0x1c0 [ 2887.266776] __lookup_hash+0xcc/0x190 [ 2887.267152] filename_create+0x186/0x4a0 [ 2887.267497] ? filename_parentat+0x570/0x570 [ 2887.267870] ? getname_flags.part.0+0x1dd/0x4f0 [ 2887.268316] do_mkdirat+0xa2/0x2b0 [ 2887.268621] ? user_path_create+0xf0/0xf0 [ 2887.268977] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2887.269495] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2887.269941] do_syscall_64+0x33/0x40 [ 2887.270303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2887.271212] RIP: 0033:0x7fcc5971bb19 [ 2887.271775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2887.273512] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2887.274269] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2887.274883] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2887.275558] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2887.276237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2887.276830] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:04:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x0, 0x3f, 0x7, 0xfff}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:04:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000180)={&(0x7f0000000080)=""/248, 0xf8, 0x80000001, 0x3}) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000000040)={0x1, 0x0, 0x1, 0x8, 0x0, [0x2, 0xa95c, 0x7, 0xe27e]}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e21, 0xfffffffc, @loopback, 0x8001}, 0x1c) 20:04:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 5) 20:04:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 3) 20:04:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd0", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x87e) unshare(0x48020200) [ 2887.628694] FAULT_INJECTION: forcing a failure. [ 2887.628694] name failslab, interval 1, probability 0, space 0, times 0 [ 2887.630034] CPU: 1 PID: 26549 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2887.630804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2887.631514] Call Trace: [ 2887.631741] dump_stack+0x107/0x167 [ 2887.632049] should_fail.cold+0x5/0xa [ 2887.632371] ? create_object.isra.0+0x3a/0xa20 [ 2887.632756] should_failslab+0x5/0x20 [ 2887.633076] kmem_cache_alloc+0x5b/0x310 [ 2887.633425] create_object.isra.0+0x3a/0xa20 [ 2887.633795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2887.634232] kmem_cache_alloc+0x159/0x310 [ 2887.634712] __d_alloc+0x2a/0x990 [ 2887.635014] d_alloc+0x46/0x1c0 [ 2887.635301] __lookup_hash+0xcc/0x190 [ 2887.635626] filename_create+0x186/0x4a0 [ 2887.635970] ? filename_parentat+0x570/0x570 [ 2887.636342] ? getname_flags.part.0+0x1dd/0x4f0 [ 2887.636742] do_mkdirat+0xa2/0x2b0 [ 2887.637045] ? user_path_create+0xf0/0xf0 [ 2887.637402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2887.637845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2887.638290] do_syscall_64+0x33/0x40 [ 2887.638779] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2887.639211] RIP: 0033:0x7fcc5971bb19 [ 2887.639528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2887.641060] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2887.641704] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2887.642305] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2887.643016] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2887.643608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2887.644204] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2887.671846] FAULT_INJECTION: forcing a failure. [ 2887.671846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2887.673109] CPU: 0 PID: 26547 Comm: syz-executor.5 Not tainted 5.10.226 #1 20:04:13 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2887.673753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2887.682580] Call Trace: [ 2887.682839] dump_stack+0x107/0x167 [ 2887.683188] should_fail.cold+0x5/0xa [ 2887.683558] strncpy_from_user+0x34/0x470 [ 2887.683966] getname_flags.part.0+0x95/0x4f0 [ 2887.684445] getname_flags+0x9a/0xe0 [ 2887.684855] do_mkdirat+0x8f/0x2b0 [ 2887.685250] ? user_path_create+0xf0/0xf0 [ 2887.685707] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2887.686236] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2887.686738] do_syscall_64+0x33/0x40 [ 2887.687090] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2887.687570] RIP: 0033:0x7ff020237b19 [ 2887.687923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2887.689618] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2887.690327] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2887.690999] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2887.691664] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2887.692330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2887.692993] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfdffffff) 20:04:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$9p(r0, &(0x7f00000003c0)="9b3719e56dc14f703d152e12e4d63504faeb710aa63fe3e8c06a968e0ccdfd8cd6934e4a1ce0ded63fbfb2a204828b5895719e36134b819b56c08b341164fac80a90435f89c3efbeec5730ce4c9d84893b02af7af2dcf5e005535b192fcf58917ee14d22987dca3905d5b3cd0bfef5cf74bff6a4270445d10c1bebcf73d8a821dba2cebb0392e4e9d9788ed8cacefcafb21c7679669355a41bc82dd590b634851f8740297a9551ff4b472ba886d6524fe436cfeb0dab0c70adf8422dbd1241719bed778a7ebe88025ab5f7099ad1266f", 0xd0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="40000080", @ANYRES16=0x0, @ANYBLOB="ec362abd7000fcdbdf255c0000000c004d00000008006b005a00000008006b005a00000008006b0014001061585310001400000033277b1e11ea1d68a9bdbc26fa5ec3040000000000000069223128806bbf7cd81b73fc6f8c7e85c44d51233488752a8ff1a14e16cda4b49ba494b83ad0a3daf77a369ffa2bd9d477c00a6151b695c279d489005d1254847d1b29ee224b97c4666de87d1f0361fee90c9851a5e0e9aaaa1bec7b4bd2dfecbffde2897682be7b9e7056ae72b3a6bbab57d4608a5028f2995c"], 0x40}, 0x1, 0x0, 0x0, 0x44040}, 0x24000c50) ioctl$SG_IO(r2, 0x2285, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x7c, 0x1, @buffer={0x0, 0x65, &(0x7f0000000040)=""/101}, &(0x7f00000000c0)="6862f3b21a094f1ab4db1fb48c2003f2ce7f97aaa9462f2a63f70fb9cb096b1e0cd7eae97613069ab5e4a294c98dbb0ed2f92485b850ec384c42ca1728f1eaf2fd04b13705712fb8ccab50dde7c3c01f6879a5b7801a5af62fa2719f8d8d907a4c93e9cdf192ca2680174f70ad0aad937160defdf4af1684538e8e7d", &(0x7f0000000140)=""/35, 0x1, 0x10015, 0x2, &(0x7f0000000180)}) 20:04:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r0) socketpair(0x9, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe4, 0xb, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}, @IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xbca2}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x20}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xb7f7}]}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR2={0x5, 0x15, 0x5}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x21}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1a1a}]}, @IPSET_ATTR_DATA={0x68, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x4}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x484}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x331}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffff}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x4}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 20:04:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 6) 20:04:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 4) 20:04:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd0", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x87e) unshare(0x48020200) [ 2901.974045] FAULT_INJECTION: forcing a failure. [ 2901.974045] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.976836] CPU: 1 PID: 26568 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2901.978331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2901.979174] Call Trace: [ 2901.979429] dump_stack+0x107/0x167 [ 2901.979772] should_fail.cold+0x5/0xa [ 2901.980134] ? ext4_alloc_inode+0x1a/0x670 [ 2901.980536] should_failslab+0x5/0x20 [ 2901.980894] kmem_cache_alloc+0x5b/0x310 [ 2901.981278] ? security_compute_validatetrans.part.0+0x960/0x960 [ 2901.981842] ? ext4_init_journal_params+0x350/0x350 [ 2901.982306] ext4_alloc_inode+0x1a/0x670 [ 2901.982770] ? ext4_init_journal_params+0x350/0x350 [ 2901.983225] alloc_inode+0x63/0x240 [ 2901.983565] new_inode+0x23/0x250 [ 2901.983884] __ext4_new_inode+0x32c/0x5370 [ 2901.984205] ? avc_has_extended_perms+0xf40/0xf40 [ 2901.984597] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2901.984953] ? dquot_initialize_needed+0x290/0x290 [ 2901.985320] ? selinux_determine_inode_label+0x1ab/0x340 [ 2901.985745] ext4_mkdir+0x32c/0xb10 [ 2901.986015] ? ext4_rmdir+0xf70/0xf70 [ 2901.986311] vfs_mkdir+0x493/0x750 [ 2901.986688] do_mkdirat+0x150/0x2b0 [ 2901.987028] ? user_path_create+0xf0/0xf0 [ 2901.987416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2901.987810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2901.988182] do_syscall_64+0x33/0x40 [ 2901.988480] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2901.988869] RIP: 0033:0x7fcc5971bb19 [ 2901.989137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2901.990745] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2901.991443] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2901.992015] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2901.992575] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2901.993220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2901.993873] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2902.008149] FAULT_INJECTION: forcing a failure. [ 2902.008149] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.009739] CPU: 0 PID: 26575 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2902.010423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2902.011254] Call Trace: [ 2902.011530] dump_stack+0x107/0x167 [ 2902.011909] should_fail.cold+0x5/0xa [ 2902.012300] ? __d_alloc+0x2a/0x990 [ 2902.012681] should_failslab+0x5/0x20 [ 2902.013067] kmem_cache_alloc+0x5b/0x310 [ 2902.013464] ? __d_lookup+0x3bf/0x760 [ 2902.013840] __d_alloc+0x2a/0x990 [ 2902.014198] d_alloc+0x46/0x1c0 [ 2902.014570] __lookup_hash+0xcc/0x190 [ 2902.014973] filename_create+0x186/0x4a0 [ 2902.015392] ? filename_parentat+0x570/0x570 [ 2902.015847] ? getname_flags.part.0+0x1dd/0x4f0 [ 2902.016340] do_mkdirat+0xa2/0x2b0 [ 2902.016717] ? user_path_create+0xf0/0xf0 [ 2902.017148] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2902.017664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2902.018195] do_syscall_64+0x33/0x40 [ 2902.018594] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2902.019109] RIP: 0033:0x7ff020237b19 [ 2902.019488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2902.021269] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2902.022028] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2902.022750] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2902.023457] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2902.024157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2902.024854] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfeffffff) 20:04:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) poll(&(0x7f0000000040)=[{r0, 0x4000}, {r1, 0x1012}, {r0, 0x28}, {r0, 0x400}, {r2, 0x940e}, {r0, 0x1803}], 0x6, 0x4) 20:04:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 7) 20:04:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') socketpair(0x18, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:04:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 5) [ 2902.283761] FAULT_INJECTION: forcing a failure. [ 2902.283761] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.284905] CPU: 0 PID: 26593 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2902.285584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2902.286392] Call Trace: [ 2902.286683] dump_stack+0x107/0x167 [ 2902.287037] should_fail.cold+0x5/0xa [ 2902.287414] ? ext4_alloc_inode+0x1a/0x670 [ 2902.287839] should_failslab+0x5/0x20 [ 2902.288228] kmem_cache_alloc+0x5b/0x310 [ 2902.288636] ? security_compute_validatetrans.part.0+0x960/0x960 [ 2902.289247] ? ext4_init_journal_params+0x350/0x350 [ 2902.289749] ext4_alloc_inode+0x1a/0x670 [ 2902.290162] ? ext4_init_journal_params+0x350/0x350 [ 2902.290681] alloc_inode+0x63/0x240 [ 2902.291049] new_inode+0x23/0x250 [ 2902.291406] __ext4_new_inode+0x32c/0x5370 [ 2902.291832] ? avc_has_extended_perms+0xf40/0xf40 [ 2902.292336] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2902.292832] ? dquot_initialize_needed+0x290/0x290 [ 2902.293324] ? selinux_determine_inode_label+0x1ab/0x340 [ 2902.293871] ext4_mkdir+0x32c/0xb10 [ 2902.294240] ? ext4_rmdir+0xf70/0xf70 [ 2902.294651] vfs_mkdir+0x493/0x750 [ 2902.295009] do_mkdirat+0x150/0x2b0 [ 2902.295369] ? user_path_create+0xf0/0xf0 [ 2902.295788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2902.296310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2902.296826] do_syscall_64+0x33/0x40 [ 2902.297205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2902.297712] RIP: 0033:0x7fcc5971bb19 [ 2902.298086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2902.299888] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2902.300647] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2902.301350] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2902.302053] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2902.302775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2902.303476] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2902.362969] FAULT_INJECTION: forcing a failure. [ 2902.362969] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.364232] CPU: 0 PID: 26600 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2902.364911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2902.365720] Call Trace: [ 2902.365997] dump_stack+0x107/0x167 [ 2902.366377] should_fail.cold+0x5/0xa [ 2902.366787] ? __d_alloc+0x2a/0x990 [ 2902.367161] should_failslab+0x5/0x20 [ 2902.367553] kmem_cache_alloc+0x5b/0x310 [ 2902.367963] ? __d_lookup+0x3bf/0x760 [ 2902.368362] __d_alloc+0x2a/0x990 [ 2902.368734] d_alloc+0x46/0x1c0 [ 2902.369085] __lookup_hash+0xcc/0x190 [ 2902.369474] filename_create+0x186/0x4a0 [ 2902.369869] ? filename_parentat+0x570/0x570 [ 2902.370324] ? getname_flags.part.0+0x1dd/0x4f0 [ 2902.370960] do_mkdirat+0xa2/0x2b0 [ 2902.371390] ? user_path_create+0xf0/0xf0 [ 2902.371882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2902.372462] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2902.372988] do_syscall_64+0x33/0x40 [ 2902.373372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2902.373884] RIP: 0033:0x7ff020237b19 [ 2902.374263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2902.376069] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2902.376828] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2902.377528] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2902.378185] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2902.378857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2902.379511] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd0", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x87e) unshare(0x48020200) 20:04:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 6) 20:04:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 8) 20:04:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xffff0000) 20:04:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') pread64(r0, &(0x7f0000000040)=""/86, 0x56, 0x80000000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x68000, 0x2) 20:04:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000100)=""/93, 0x5d}, {&(0x7f0000000180)=""/130, 0x82}], 0x4, &(0x7f0000000280)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x100) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0xa, 0xeb, &(0x7f0000002640)}) 20:04:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f00000001c0)) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f0000000040)) sendmsg$IPSET_CMD_HEADER(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0xc, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x50eaf146f0b2582e}, 0x20044090) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0xfffffffa, 0x5}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0xf801}}, './file0\x00'}) dup(r1) [ 2916.442761] FAULT_INJECTION: forcing a failure. [ 2916.442761] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.444051] CPU: 0 PID: 26617 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2916.444690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.445451] Call Trace: [ 2916.445705] dump_stack+0x107/0x167 [ 2916.446053] should_fail.cold+0x5/0xa [ 2916.446417] ? cgroup_mkdir+0x254/0xf50 [ 2916.446825] should_failslab+0x5/0x20 [ 2916.447182] __kmalloc+0x72/0x390 [ 2916.447520] cgroup_mkdir+0x254/0xf50 [ 2916.447884] ? cgroup_destroy_locked+0x710/0x710 [ 2916.448334] kernfs_iop_mkdir+0x14d/0x1e0 [ 2916.448728] vfs_mkdir+0x493/0x750 [ 2916.449068] do_mkdirat+0x150/0x2b0 [ 2916.449415] ? user_path_create+0xf0/0xf0 [ 2916.449810] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2916.450296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2916.450801] do_syscall_64+0x33/0x40 [ 2916.451153] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2916.451630] RIP: 0033:0x7ff020237b19 [ 2916.451980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.453660] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2916.454365] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2916.459046] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2916.459700] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.460349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2916.461000] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 [ 2916.467154] FAULT_INJECTION: forcing a failure. [ 2916.467154] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.468251] CPU: 0 PID: 26620 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2916.468883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.469639] Call Trace: [ 2916.469885] dump_stack+0x107/0x167 [ 2916.470223] should_fail.cold+0x5/0xa [ 2916.470601] ? security_inode_alloc+0x34/0x160 [ 2916.471028] should_failslab+0x5/0x20 [ 2916.471385] kmem_cache_alloc+0x5b/0x310 [ 2916.471768] security_inode_alloc+0x34/0x160 [ 2916.472177] inode_init_always+0xa4e/0xd10 [ 2916.472572] alloc_inode+0x84/0x240 [ 2916.472909] new_inode+0x23/0x250 [ 2916.473238] __ext4_new_inode+0x32c/0x5370 [ 2916.473629] ? avc_has_extended_perms+0xf40/0xf40 [ 2916.474091] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2916.478572] ? dquot_initialize_needed+0x290/0x290 [ 2916.479031] ? selinux_determine_inode_label+0x1ab/0x340 [ 2916.479539] ext4_mkdir+0x32c/0xb10 [ 2916.479885] ? ext4_rmdir+0xf70/0xf70 [ 2916.480246] vfs_mkdir+0x493/0x750 [ 2916.480578] do_mkdirat+0x150/0x2b0 [ 2916.480916] ? user_path_create+0xf0/0xf0 [ 2916.481303] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2916.481785] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2916.482260] do_syscall_64+0x33/0x40 [ 2916.482618] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2916.483095] RIP: 0033:0x7fcc5971bb19 [ 2916.483438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.485112] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2916.485812] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2916.486464] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2916.487139] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.487796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2916.488449] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:04:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000040)={0x1, 0x3, 0x2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)) 20:04:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfffffdef) 20:04:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x881) unshare(0x48020200) 20:04:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 7) 20:04:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 9) 20:04:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) [ 2917.272187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1548 sclass=netlink_route_socket pid=26632 comm=syz-executor.0 [ 2917.275140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1548 sclass=netlink_route_socket pid=26633 comm=syz-executor.0 20:04:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="50b1924a8e1a3ee5925627e4f37af610dbc19ced8c901afd3f386d506ec1e4710674be5f3720ace9705ac555d7f261a428"], 0x28}}, 0x0) pread64(r2, &(0x7f0000000040)=""/152, 0x98, 0x102000000000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:04:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001800210c00fff2000000001d1000000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x7, 0xfffffffffffffe00, 0x2, 0x8}) fcntl$dupfd(r0, 0x0, r0) r3 = socket$netlink(0x10, 0x3, 0x1) syncfs(r3) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000004780)=ANY=[@ANYBLOB="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"], 0x3108}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 20:04:43 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xffffff7f) [ 2917.611772] FAULT_INJECTION: forcing a failure. [ 2917.611772] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.612760] CPU: 1 PID: 26644 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2917.613336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2917.614033] Call Trace: [ 2917.614265] dump_stack+0x107/0x167 [ 2917.614594] should_fail.cold+0x5/0xa [ 2917.614922] ? create_object.isra.0+0x3a/0xa20 [ 2917.615328] should_failslab+0x5/0x20 [ 2917.615661] kmem_cache_alloc+0x5b/0x310 [ 2917.616019] create_object.isra.0+0x3a/0xa20 [ 2917.616400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2917.616842] kmem_cache_alloc+0x159/0x310 [ 2917.617206] security_inode_alloc+0x34/0x160 [ 2917.617583] inode_init_always+0xa4e/0xd10 [ 2917.617944] alloc_inode+0x84/0x240 [ 2917.618255] new_inode+0x23/0x250 [ 2917.618572] __ext4_new_inode+0x32c/0x5370 [ 2917.618932] ? avc_has_extended_perms+0xf40/0xf40 [ 2917.619362] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2917.619782] ? dquot_initialize_needed+0x290/0x290 [ 2917.620204] ? selinux_determine_inode_label+0x1ab/0x340 [ 2917.620675] ext4_mkdir+0x32c/0xb10 [ 2917.620994] ? ext4_rmdir+0xf70/0xf70 [ 2917.621328] vfs_mkdir+0x493/0x750 [ 2917.621635] do_mkdirat+0x150/0x2b0 [ 2917.621947] ? user_path_create+0xf0/0xf0 [ 2917.622306] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2917.622804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2917.624694] do_syscall_64+0x33/0x40 [ 2917.625019] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2917.625459] RIP: 0033:0x7fcc5971bb19 [ 2917.625783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2917.627341] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2917.627986] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2917.628584] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2917.629185] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2917.629784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2917.630383] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2917.637673] FAULT_INJECTION: forcing a failure. [ 2917.637673] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.642844] CPU: 0 PID: 26646 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2917.643493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2917.644261] Call Trace: [ 2917.644510] dump_stack+0x107/0x167 [ 2917.644855] should_fail.cold+0x5/0xa [ 2917.645217] ? create_object.isra.0+0x3a/0xa20 [ 2917.645643] should_failslab+0x5/0x20 [ 2917.645997] kmem_cache_alloc+0x5b/0x310 [ 2917.646373] ? selinux_determine_inode_label+0x1ab/0x340 [ 2917.646893] create_object.isra.0+0x3a/0xa20 [ 2917.647302] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2917.647778] __kmalloc+0x16e/0x390 [ 2917.648128] cgroup_mkdir+0x254/0xf50 [ 2917.648493] ? cgroup_destroy_locked+0x710/0x710 [ 2917.648945] kernfs_iop_mkdir+0x14d/0x1e0 [ 2917.649335] vfs_mkdir+0x493/0x750 [ 2917.649676] do_mkdirat+0x150/0x2b0 [ 2917.650024] ? user_path_create+0xf0/0xf0 [ 2917.650418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2917.650922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2917.651422] do_syscall_64+0x33/0x40 [ 2917.651779] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2917.652261] RIP: 0033:0x7ff020237b19 [ 2917.652610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2917.654294] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2917.655015] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2917.655670] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2917.656326] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2917.656981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2917.657638] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:43 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x881) unshare(0x48020200) 20:04:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:04:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000080)=""/172, 0xac}, {&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000180)=""/254, 0xfe}, {&(0x7f0000000280)=""/101, 0x65}], 0x6) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1484024bf5efbab6dffe8004060000001077000000"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 20:04:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 10) 20:04:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 8) 20:04:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200002000000c00098008000000", @ANYRES32, @ANYBLOB="bbccf7dc13302009b57d80c01dcb7d6a1b457fc3a758ccc1bdda17fd61f168d0711f5caa3643308768ee045d4dcf453061d7c8d80d0547a363da19dece7b2d96bcccb551f3866c49cc7a622ae30933d7871a76941d26a43c54cf02fb47c53b0572bfe2eb42fa4dad92e0eb29dd9c25525a2c000000000000"], 0x28}}, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/176, 0xb0}], 0x1) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_RATE_DEL(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x44}}, 0x1) 20:04:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfffffffd) [ 2932.790250] audit: type=1400 audit(1727899498.954:81): avc: denied { read } for pid=26667 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 20:04:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfffffffe) 20:04:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x3f, &(0x7f00000004c0)=[0xffffffffffffffff, r1, r1, 0xffffffffffffffff], 0x4, 0x0, 0x0, {0x0, r2}}, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x300}, 0x1, {0x0, r2}}, 0x7fffffff) [ 2932.839982] FAULT_INJECTION: forcing a failure. [ 2932.839982] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.841056] CPU: 0 PID: 26676 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2932.841697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2932.842458] Call Trace: [ 2932.846664] dump_stack+0x107/0x167 [ 2932.847004] should_fail.cold+0x5/0xa [ 2932.847361] ? create_object.isra.0+0x3a/0xa20 [ 2932.847785] should_failslab+0x5/0x20 [ 2932.848138] kmem_cache_alloc+0x5b/0x310 [ 2932.848517] create_object.isra.0+0x3a/0xa20 [ 2932.848922] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2932.849391] kmem_cache_alloc+0x159/0x310 [ 2932.849783] security_inode_alloc+0x34/0x160 [ 2932.850190] inode_init_always+0xa4e/0xd10 [ 2932.850596] alloc_inode+0x84/0x240 [ 2932.850938] new_inode+0x23/0x250 [ 2932.851266] __ext4_new_inode+0x32c/0x5370 [ 2932.851655] ? avc_has_extended_perms+0xf40/0xf40 [ 2932.852117] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2932.852572] ? dquot_initialize_needed+0x290/0x290 [ 2932.853026] ? selinux_determine_inode_label+0x1ab/0x340 [ 2932.853533] ext4_mkdir+0x32c/0xb10 [ 2932.853878] ? ext4_rmdir+0xf70/0xf70 [ 2932.854240] vfs_mkdir+0x493/0x750 [ 2932.854582] do_mkdirat+0x150/0x2b0 [ 2932.854931] ? user_path_create+0xf0/0xf0 [ 2932.855320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2932.855804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2932.856280] do_syscall_64+0x33/0x40 [ 2932.856626] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2932.857097] RIP: 0033:0x7fcc5971bb19 [ 2932.857443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2932.859134] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2932.859833] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2932.860486] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2932.861140] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.861792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2932.862445] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2932.895945] FAULT_INJECTION: forcing a failure. [ 2932.895945] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.897033] CPU: 0 PID: 26675 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2932.897675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2932.898436] Call Trace: [ 2932.902718] dump_stack+0x107/0x167 [ 2932.903064] should_fail.cold+0x5/0xa [ 2932.903424] ? create_object.isra.0+0x3a/0xa20 [ 2932.903850] should_failslab+0x5/0x20 [ 2932.904204] kmem_cache_alloc+0x5b/0x310 [ 2932.904590] create_object.isra.0+0x3a/0xa20 [ 2932.905007] kmemleak_alloc_percpu+0xa0/0x100 [ 2932.905430] pcpu_alloc+0x4e2/0x1240 [ 2932.905800] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2932.906241] percpu_ref_init+0x31/0x3d0 [ 2932.906635] cgroup_mkdir+0x28b/0xf50 [ 2932.907005] ? cgroup_destroy_locked+0x710/0x710 [ 2932.907453] kernfs_iop_mkdir+0x14d/0x1e0 [ 2932.907845] vfs_mkdir+0x493/0x750 [ 2932.908184] do_mkdirat+0x150/0x2b0 [ 2932.908531] ? user_path_create+0xf0/0xf0 [ 2932.908925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2932.909411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2932.909898] do_syscall_64+0x33/0x40 [ 2932.910247] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2932.910738] RIP: 0033:0x7ff020237b19 [ 2932.911086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2932.912763] RSP: 002b:00007ff01d7ad188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2932.913467] RAX: ffffffffffffffda RBX: 00007ff02034af60 RCX: 00007ff020237b19 [ 2932.914127] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 2932.914802] RBP: 00007ff01d7ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.915459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2932.916113] R13: 00007ffc1c5dc59f R14: 00007ff01d7ad300 R15: 0000000000022000 20:04:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:04:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 11) 20:04:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2933.887814] FAULT_INJECTION: forcing a failure. [ 2933.887814] name failslab, interval 1, probability 0, space 0, times 0 [ 2933.888968] CPU: 0 PID: 26700 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2933.889609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2933.890373] Call Trace: [ 2933.890646] dump_stack+0x107/0x167 [ 2933.890989] should_fail.cold+0x5/0xa [ 2933.891349] ? create_object.isra.0+0x3a/0xa20 [ 2933.891777] should_failslab+0x5/0x20 [ 2933.892133] kmem_cache_alloc+0x5b/0x310 [ 2933.892521] create_object.isra.0+0x3a/0xa20 [ 2933.892932] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2933.893412] kmem_cache_alloc+0x159/0x310 [ 2933.893807] jbd2__journal_start+0x190/0x7e0 [ 2933.894228] __ext4_journal_start_sb+0x214/0x390 [ 2933.894703] __ext4_new_inode+0x2db9/0x5370 [ 2933.895128] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2933.895589] ? dquot_initialize_needed+0x290/0x290 [ 2933.896045] ? selinux_determine_inode_label+0x1ab/0x340 [ 2933.896563] ext4_mkdir+0x32c/0xb10 [ 2933.896914] ? ext4_rmdir+0xf70/0xf70 [ 2933.897282] vfs_mkdir+0x493/0x750 [ 2933.897619] do_mkdirat+0x150/0x2b0 [ 2933.897967] ? user_path_create+0xf0/0xf0 [ 2933.898360] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2933.898864] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2933.899346] do_syscall_64+0x33/0x40 [ 2933.899693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2933.900164] RIP: 0033:0x7fcc5971bb19 [ 2933.900512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2933.902195] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2933.902911] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2933.903566] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2933.904223] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2933.904878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2933.905535] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:05:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 9) 20:05:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x881) unshare(0x48020200) 20:05:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:05:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 12) 20:05:13 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYRES16=r2, @ANYRES64]) r4 = getpgrp(0x0) ptrace(0x10, r4) kcmp(0x0, r4, 0x1, r0, r3) fcntl$setown(0xffffffffffffffff, 0x8, r4) waitid(0x0, r4, 0x0, 0x8, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r6, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r8 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r6, @ANYRES16=r7, @ANYRES64]) r9 = getpgrp(0x0) ptrace(0x10, r9) kcmp(0x0, r9, 0x1, r5, r8) r10 = syz_open_procfs(r9, &(0x7f00000014c0)='net/ip6_tables_matches\x00') readv(r10, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x4000000000000) 20:05:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:13 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="3d0000006f0100040020040000000300000000000000000300000004000200008004000000010000000000000045000000004ced42bafc50c2b4cabe0600000000000800000000"], 0x3d) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x20042, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180)=0x5, 0xeb) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r2, 0x8008f512, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:14 executing program 0: readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 2948.021364] FAULT_INJECTION: forcing a failure. [ 2948.021364] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.026774] CPU: 0 PID: 26727 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2948.027430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2948.028183] Call Trace: [ 2948.028435] dump_stack+0x107/0x167 [ 2948.028776] should_fail.cold+0x5/0xa [ 2948.029137] should_failslab+0x5/0x20 [ 2948.029492] __kmalloc_track_caller+0x79/0x370 [ 2948.029915] ? sidtab_sid2str_get+0x17e/0x720 [ 2948.030336] kmemdup+0x23/0x50 [ 2948.038655] sidtab_sid2str_get+0x17e/0x720 [ 2948.039057] sidtab_entry_to_string+0x33/0x110 [ 2948.039482] security_sid_to_context_core+0x33c/0x5d0 [ 2948.039960] selinux_inode_init_security+0x4ab/0x690 [ 2948.040430] ? selinux_dentry_init_security+0x280/0x280 [ 2948.040916] ? get_cached_acl_rcu+0x120/0x120 [ 2948.041332] ? find_held_lock+0x2c/0x110 [ 2948.041716] security_inode_init_security+0x151/0x360 [ 2948.042189] ? ext4_init_acl+0x310/0x310 [ 2948.042576] ? inode_free_by_rcu+0x20/0x20 [ 2948.042988] ? chksum_update+0x4c/0xb0 [ 2948.043356] __ext4_new_inode+0x3869/0x5370 [ 2948.043774] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2948.044228] ? dquot_initialize_needed+0x290/0x290 [ 2948.044679] ? selinux_determine_inode_label+0x1ab/0x340 [ 2948.045187] ext4_mkdir+0x32c/0xb10 [ 2948.045533] ? ext4_rmdir+0xf70/0xf70 [ 2948.045894] vfs_mkdir+0x493/0x750 [ 2948.046226] do_mkdirat+0x150/0x2b0 [ 2948.046574] ? user_path_create+0xf0/0xf0 [ 2948.046969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2948.047455] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2948.047935] do_syscall_64+0x33/0x40 [ 2948.048281] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2948.048752] RIP: 0033:0x7fcc5971bb19 [ 2948.049097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2948.050807] RSP: 002b:00007fcc56c70188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2948.051505] RAX: ffffffffffffffda RBX: 00007fcc5982f020 RCX: 00007fcc5971bb19 [ 2948.052158] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2948.052809] RBP: 00007fcc56c701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.053461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2948.054114] R13: 00007ffcf279409f R14: 00007fcc56c70300 R15: 0000000000022000 20:05:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20000000000000) 20:05:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) 20:05:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000040)=""/51, 0x33}, {&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/213, 0xd5}, {&(0x7f0000000340)=""/193, 0xc1}], 0x5, 0x4, 0x200) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 13) 20:05:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b1", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x882) unshare(0x48020200) 20:05:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) 20:05:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/71, 0x47}, {&(0x7f0000002280)=""/4085, 0x1033}, {&(0x7f0000001100)=""/228, 0xef}, {&(0x7f0000000100)=""/143}], 0x3) [ 2949.502003] FAULT_INJECTION: forcing a failure. [ 2949.502003] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.503099] CPU: 0 PID: 26846 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2949.503741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2949.504505] Call Trace: [ 2949.504761] dump_stack+0x107/0x167 [ 2949.505105] should_fail.cold+0x5/0xa [ 2949.505471] should_failslab+0x5/0x20 [ 2949.505829] __kmalloc_track_caller+0x79/0x370 [ 2949.506263] ? sidtab_sid2str_get+0x17e/0x720 [ 2949.506708] kmemdup+0x23/0x50 [ 2949.507017] sidtab_sid2str_get+0x17e/0x720 [ 2949.507428] sidtab_entry_to_string+0x33/0x110 [ 2949.507863] security_sid_to_context_core+0x33c/0x5d0 [ 2949.508353] selinux_inode_init_security+0x4ab/0x690 [ 2949.508831] ? selinux_dentry_init_security+0x280/0x280 [ 2949.509326] ? get_cached_acl_rcu+0x120/0x120 [ 2949.509754] ? find_held_lock+0x2c/0x110 [ 2949.510147] security_inode_init_security+0x151/0x360 [ 2949.510640] ? ext4_init_acl+0x310/0x310 [ 2949.511028] ? inode_free_by_rcu+0x20/0x20 [ 2949.511442] ? chksum_update+0x4c/0xb0 [ 2949.511818] __ext4_new_inode+0x3869/0x5370 [ 2949.512246] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2949.512712] ? dquot_initialize_needed+0x290/0x290 [ 2949.513173] ? selinux_determine_inode_label+0x1ab/0x340 [ 2949.513693] ext4_mkdir+0x32c/0xb10 [ 2949.514050] ? ext4_rmdir+0xf70/0xf70 [ 2949.514420] vfs_mkdir+0x493/0x750 [ 2949.514777] do_mkdirat+0x150/0x2b0 [ 2949.515124] ? user_path_create+0xf0/0xf0 [ 2949.515519] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2949.516012] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.516501] do_syscall_64+0x33/0x40 [ 2949.516853] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2949.517332] RIP: 0033:0x7fcc5971bb19 [ 2949.517681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2949.519388] RSP: 002b:00007fcc56c70188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2949.520098] RAX: ffffffffffffffda RBX: 00007fcc5982f020 RCX: 00007fcc5971bb19 [ 2949.520760] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2949.521420] RBP: 00007fcc56c701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.522079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2949.522755] R13: 00007ffcf279409f R14: 00007fcc56c70300 R15: 0000000000022000 20:05:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x9, &(0x7f00000018c0)=[{&(0x7f00000000c0)="a4b945dbe412b5daf1835011dcc3d0b69c48866afd7cc34cca1de586f68d3b9ec98ca1fc9dba8f354dde8c07f8b223a4726f44e509dec6730116d81c2eff6e913448645e3bb01410f82749f33407e1afc6a4dd3f69f4bcbbac131f414035c714acb6b84426196d6d655fd160de7d930c6bb6e7c0013cc22c80c81a52d0f0a9cb5740fe8f3fd5e9d9fd06894e91dc8022550234aa1e9005b9a47e0ed85e5def79587f5188e695b7b36ee9fa5dc8dbea0ff5494574fa2ddf1a8fda4bb036067bf3c49a88a0a2123367f611d3efd3cdf60a5daa0cdfd49d9e02ee51483ef00bb263d8d4d85b6fb4", 0xe6, 0x3}, {&(0x7f00000001c0)="fb4521181e32307d75d96e120279bb6573665ecd1f6709bdab20c0c3b7a0adc5f601996006e429e517eab021b7be55839ba5bbf9979634fcde67ed29664237e022b8d975d9d13bb9d8d11750c372a92d9dee787475dc209a306a4163131c8e50e1ede92a1d3cfd49b451a0162d6ce3fcaca6a01501a71612d2e08e17d280a66d843a8a12f44a323bd37e1ea0bfd6a6bf1068713a188dfb22f0ac3579d7a700d95f72720d7ec6ec067aa85000a7f3a80b6c5fe4f1fb2a22d521a8e49028a5e6d092fbb67e125330d9166042c53630790c7e39127ca5fc030ce210fabf6043edc8c8e8292cc43e121e0a4b2322560fc99da11aa464cdab0b53", 0xf8, 0x101}, {&(0x7f00000002c0)="232dd7a4caf20a7a5e0d6b836e69600942359d03e00a7bb0ddb7b6bb94572dfc04451a76e6650c04987c1632d387d9bbfcb3e5230f045dcdc18db86d153858299a6296f315e2213f99633dec1b0cf59a4dd1ae588802ffc6130bb8fd239e6c288ff401afb75aaa9f266c901d52a7461dc791a370f8200fff8e4323673f49a7cc6342e99c6ba592d61faaabfc587633a9230417b3f0e7ecca09cbfc2cc7ce59e3b5dae07ffd97d9e963ae4c52f4d50048f0a6", 0xb2, 0xd3fa}, {&(0x7f0000000380)="28b0ed1c2689ce3b931692dd55f8af69e61b97a7a76d36567a494784c5a197970ff79f8aa5c96366fe40ce0e91c2d9b213dd71943f6a2b547de708e3492aaba4a1a51dc36fa79978c99c59a43cb05b1d76b2f92b7bac282cb088c22dccf665e036454a19387ee278db375aca6c91016ccb5ea8efc9dfa31689783f6b8f8de922a755cfc65a5ef102e4a1fccfafdf01ac05430a8d72376f4e8597df", 0x9b, 0x8001}, {&(0x7f00000014c0)="66f0e0880577d934260e31b98911d2875c1468b97405ca60e92331ca179e48b628978799de38fab0b0fbe1bdc2e54c885cd980d06883fac34911ee343999eb8398dee9eeaac0bee1598f6fd6f46b485c2a50bca098c7432bc7c169e144b6ee321bc3f76e26b6eebba1cfe32d97d5568e312731e54d66f620f5277856d76b5622b99bb768914ec7652585773e57205f10c5bd575e89eeed04886869da8c7350e4a1bd30175af88f58e4f11e54b00e0502b56bd2bb4deb443e356556", 0xbb, 0x90c}, {&(0x7f0000000440)="c7e805f30327", 0x6, 0x8}, {&(0x7f0000001640)="7be684bd48548acdd5ee349346d11c8d1eb53593c4638de59db2bf486f742a2809fd56cf392e1df4f857b6b867386517016158fff6ec5ff62aa2451d4a715869d1ea04b55490ebe1a388e6851518a2d3facec5789e46761bf6b9a3d39afb9c4ba78bf7abf988691e101a15ec7fae1f4fef62f1a81c5d01352dfb2ad3e6bd31f066ebee70d3c99a57b30d431dfa3c5ed907174a38eeafbce4131028617e7fd58bbc187e264432de080e2dd464389878cd93d6782485a1ccf27fef89808e5a3a6c8c9f555c589362524c46973ad63af045bbee3873529b50da5d3fdbd463f6", 0xde, 0x1}, {&(0x7f0000001740)="30cf2d8c46049d2a2c8b84a666d1e0c99936e4ce3d5d86b0551ce0e47ba24d4baea78b9a37d68b402426f844792753ccd917647fe9cca628853c48e19c9d3e770d8e398a3e58dd0cde1cc3a0d399b07476df78126f0aafe4e3e58e44b1ea1b2dc3e3c5d761e78f3683f03be2ac225f80c122ec4d6ee68f75def845e9834605e42ed4", 0x82}, {&(0x7f0000001800)="4e8b2df47ba8686bcb165e207af2e58e9e74f9d19c8f1a391a4003668f4cad12796b62c7a5fad8cb103c1f15a45750c6937b1c1598d7d2edaf2bae7018a6175c259b5078d6f52dc0c5d11220ed9572f89efc5972e7ceb3ba26b88875032638235b365f133eb223d12841b1e097008aade554b67b9e1a5cb9bca1f5c9077fba9881c1e8a3302300b35b241b5a2c", 0x8d, 0x6}], 0x2, &(0x7f0000001580)={[{@grpjquota}, {@nobarrier}, {@test_dummy_encryption}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'mounts\x00'}}, {@uid_lt={'uid<', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r1, 0xf503, 0x0) 20:05:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x18940, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:31 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 14) 20:05:31 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x40030000000000) 20:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:05:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) 20:05:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b1", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x882) unshare(0x48020200) 20:05:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000100)='sessionid\x00') sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000140)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x4008094}, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000040)=0x2) ioctl$CDROM_GET_CAPABILITY(r0, 0x5331) r4 = syz_open_dev$mouse(&(0x7f0000000080), 0x10001, 0x230800) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x3b, &(0x7f0000000180)={0x3a, 0x1d, '\x00', [@hao={0xc9, 0x10, @local}, @generic={0x6, 0xd6, "d166a5d022ed699e0f1a69a4bdad27254ef222ce7748fd5bc1f736d8752a109d3c81d6f9eca9c2d0a42398a76771b7ca0e3201e7897745ac4281b2af54d613de7f4d57657ec20f8b5811430488e40669a254c0472ce7cf6c406a052989fb889b096522239e8b0995f71261e0bd1781680cd86022a1beb5794d4073ec204dda8e927cd4596e41a7b31b149a02ce38d5e6712f2db62167a06d34bf416f215df7d3f5929dd87f8fc83d07a2dc66618d986379eaff401e97ac9496b48c5b8c87ec40cf7c5f984040f1867b7db2413c048adf3b317afd590d"}]}, 0xf8) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 2965.603239] FAULT_INJECTION: forcing a failure. [ 2965.603239] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.604637] CPU: 0 PID: 26866 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2965.605341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2965.607156] Call Trace: [ 2965.607664] dump_stack+0x107/0x167 [ 2965.608045] should_fail.cold+0x5/0xa [ 2965.608434] ? create_object.isra.0+0x3a/0xa20 [ 2965.608904] should_failslab+0x5/0x20 [ 2965.609296] kmem_cache_alloc+0x5b/0x310 [ 2965.609709] ? sidtab_sid2str_get+0x65/0x720 [ 2965.610199] create_object.isra.0+0x3a/0xa20 [ 2965.610686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2965.611202] __kmalloc_track_caller+0x177/0x370 [ 2965.611666] ? sidtab_sid2str_get+0x17e/0x720 [ 2965.612160] kmemdup+0x23/0x50 [ 2965.612491] sidtab_sid2str_get+0x17e/0x720 [ 2965.612937] sidtab_entry_to_string+0x33/0x110 [ 2965.613415] security_sid_to_context_core+0x33c/0x5d0 [ 2965.618988] selinux_inode_init_security+0x4ab/0x690 [ 2965.619770] ? selinux_dentry_init_security+0x280/0x280 [ 2965.620929] ? get_cached_acl_rcu+0x120/0x120 [ 2965.621887] ? find_held_lock+0x2c/0x110 [ 2965.622806] security_inode_init_security+0x151/0x360 [ 2965.623711] ? ext4_init_acl+0x310/0x310 [ 2965.624122] ? inode_free_by_rcu+0x20/0x20 [ 2965.624582] ? chksum_update+0x4c/0xb0 [ 2965.624991] __ext4_new_inode+0x3869/0x5370 [ 2965.625453] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2965.625979] ? dquot_initialize_needed+0x290/0x290 [ 2965.626473] ? selinux_determine_inode_label+0x1ab/0x340 [ 2965.627054] ext4_mkdir+0x32c/0xb10 [ 2965.627435] ? ext4_rmdir+0xf70/0xf70 [ 2965.627861] vfs_mkdir+0x493/0x750 [ 2965.628229] do_mkdirat+0x150/0x2b0 [ 2965.628604] ? user_path_create+0xf0/0xf0 [ 2965.629043] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2965.629577] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2965.630135] do_syscall_64+0x33/0x40 [ 2965.630515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2965.631061] RIP: 0033:0x7fcc5971bb19 [ 2965.631451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.633305] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2965.634076] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2965.634861] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2965.635599] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.636312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2965.636990] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:05:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4095, 0xc0a}], 0xffffc6e) 20:05:31 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 15) 20:05:31 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x100000000000000) 20:05:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) [ 2966.727917] FAULT_INJECTION: forcing a failure. [ 2966.727917] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.737027] CPU: 0 PID: 26994 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2966.740299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2966.743538] Call Trace: [ 2966.744168] dump_stack+0x107/0x167 [ 2966.745048] should_fail.cold+0x5/0xa [ 2966.745958] ? ext4_find_extent+0xa3d/0xd30 [ 2966.747056] should_failslab+0x5/0x20 [ 2966.747857] __kmalloc+0x72/0x390 [ 2966.748587] ext4_find_extent+0xa3d/0xd30 [ 2966.749460] ext4_ext_map_blocks+0x1c8/0x5830 [ 2966.750381] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2966.751050] ? find_held_lock+0x2c/0x110 [ 2966.751478] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2966.752048] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 2966.752593] ? ext4_ext_release+0x10/0x10 [ 2966.753066] ? lock_release+0x680/0x680 [ 2966.753490] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2966.753990] ? lock_downgrade+0x6d0/0x6d0 [ 2966.754413] ? down_read+0x10f/0x430 [ 2966.755079] ? down_write+0x160/0x160 [ 2966.756035] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2966.757268] ext4_map_blocks+0x8e1/0x1910 [ 2966.758390] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2966.758992] ? __brelse+0x84/0xa0 [ 2966.759358] ? __ext4_new_inode+0x148/0x5370 [ 2966.759865] ext4_append+0x1b8/0x4e0 [ 2966.760270] ? ext4_move_extents+0x3050/0x3050 [ 2966.760697] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2966.761151] ext4_init_new_dir+0x25e/0x4d0 [ 2966.761544] ? ext4_init_dot_dotdot+0x610/0x610 [ 2966.761989] ext4_mkdir+0x3c1/0xb10 [ 2966.762332] ? ext4_rmdir+0xf70/0xf70 [ 2966.762742] vfs_mkdir+0x493/0x750 [ 2966.763077] do_mkdirat+0x150/0x2b0 [ 2966.763416] ? user_path_create+0xf0/0xf0 [ 2966.763802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2966.764286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2966.764764] do_syscall_64+0x33/0x40 [ 2966.765108] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2966.765579] RIP: 0033:0x7fcc5971bb19 [ 2966.765923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2966.769476] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2966.770986] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2966.772430] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2966.773765] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2966.775110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2966.776452] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:05:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b1", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x882) unshare(0x48020200) 20:05:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 16) 20:05:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/71, 0x47}, {&(0x7f0000002280)=""/4085, 0x1033}, {&(0x7f0000001100)=""/228, 0xef}, {&(0x7f0000000100)=""/143}], 0x3) 20:05:47 executing program 4: fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x3) 20:05:47 executing program 0: stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/14, 0xe}, {&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000005c0)=""/111, 0x6f}, {&(0x7f0000000780)=""/32, 0x20}, {&(0x7f0000000680)=""/3, 0x3}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000001500), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) pread64(r2, &(0x7f00000014c0)=""/20, 0x14, 0x2) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/102, 0x66}, {&(0x7f00000000c0)=""/97, 0x61}, {&(0x7f0000000140)=""/103, 0x67}, {&(0x7f00000001c0)=""/180, 0xb4}, {&(0x7f0000000280)=""/248, 0xf8}], 0x5) 20:05:47 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x200000000000000) 20:05:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='\\.\x82,.\\\x00', &(0x7f00000000c0)=':\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='mounts\x00', &(0x7f0000000180)='+\x00', &(0x7f00000001c0)='#$:\x00', &(0x7f0000000200)='mounts\x00', &(0x7f0000000240)='mounts\x00', &(0x7f0000000280)='mounts\x00'], 0x1000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:05:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}, 0x0) pread64(r1, &(0x7f0000000040)=""/93, 0x5d, 0x2) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f00000000c0)) 20:05:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) [ 2981.264170] FAULT_INJECTION: forcing a failure. [ 2981.264170] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.271408] CPU: 0 PID: 27004 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2981.272044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2981.272801] Call Trace: [ 2981.273055] dump_stack+0x107/0x167 [ 2981.273396] should_fail.cold+0x5/0xa [ 2981.273755] ? __es_insert_extent+0xed1/0x1370 [ 2981.274187] should_failslab+0x5/0x20 [ 2981.274545] kmem_cache_alloc+0x5b/0x310 [ 2981.278959] __es_insert_extent+0xed1/0x1370 [ 2981.279375] ? do_raw_read_unlock+0x70/0x70 [ 2981.279781] ? perf_trace_lock+0xac/0x490 [ 2981.280175] ext4_es_insert_extent+0x45d/0xf10 [ 2981.280606] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2981.281008] ? ext4_es_find_extent_range+0x1cb/0x460 [ 2981.281479] ? lock_downgrade+0x6d0/0x6d0 [ 2981.281872] ? __ext4_handle_dirty_super+0x100/0x100 [ 2981.282341] ? __es_find_extent_range+0x197/0x4b0 [ 2981.282810] ? do_raw_read_unlock+0x3b/0x70 [ 2981.283220] ext4_ext_map_blocks+0x1863/0x5830 [ 2981.283654] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2981.284143] ? find_held_lock+0x2c/0x110 [ 2981.284519] ? perf_trace_lock+0xac/0x490 [ 2981.284914] ? ext4_ext_release+0x10/0x10 [ 2981.285309] ? lock_release+0x680/0x680 [ 2981.285680] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2981.286122] ? lock_downgrade+0x6d0/0x6d0 [ 2981.286518] ? down_read+0x10f/0x430 [ 2981.286873] ? down_write+0x160/0x160 [ 2981.287236] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2981.287678] ext4_map_blocks+0x8e1/0x1910 [ 2981.288079] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2981.288498] ? __brelse+0x84/0xa0 [ 2981.288822] ? __ext4_new_inode+0x148/0x5370 [ 2981.289241] ext4_append+0x1b8/0x4e0 [ 2981.289591] ? ext4_move_extents+0x3050/0x3050 [ 2981.290016] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2981.290477] ext4_init_new_dir+0x25e/0x4d0 [ 2981.290882] ? ext4_init_dot_dotdot+0x610/0x610 [ 2981.291332] ext4_mkdir+0x3c1/0xb10 [ 2981.291679] ? ext4_rmdir+0xf70/0xf70 [ 2981.292043] vfs_mkdir+0x493/0x750 [ 2981.292382] do_mkdirat+0x150/0x2b0 [ 2981.292724] ? user_path_create+0xf0/0xf0 [ 2981.293112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2981.293602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2981.294082] do_syscall_64+0x33/0x40 [ 2981.294433] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2981.294922] RIP: 0033:0x7fcc5971bb19 [ 2981.295269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.296964] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2981.297677] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2981.298333] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2981.298999] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2981.299660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2981.300327] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:05:47 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x300000000000000) 20:05:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:05:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 17) 20:05:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x4) 20:05:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') readv(r0, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/5, 0x5}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/67, 0x43}], 0x6) 20:05:48 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x400000000000000) [ 2982.707831] FAULT_INJECTION: forcing a failure. [ 2982.707831] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.708827] CPU: 1 PID: 27137 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2982.709415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2982.710109] Call Trace: [ 2982.710345] dump_stack+0x107/0x167 [ 2982.710668] should_fail.cold+0x5/0xa [ 2982.714985] ? create_object.isra.0+0x3a/0xa20 [ 2982.715372] should_failslab+0x5/0x20 [ 2982.715693] kmem_cache_alloc+0x5b/0x310 [ 2982.716040] create_object.isra.0+0x3a/0xa20 [ 2982.716412] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2982.716842] kmem_cache_alloc+0x159/0x310 [ 2982.717198] __es_insert_extent+0xed1/0x1370 [ 2982.717575] ? do_raw_read_unlock+0x70/0x70 [ 2982.717939] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2982.718388] ext4_es_insert_extent+0x45d/0xf10 [ 2982.718792] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2982.719157] ? ext4_es_find_extent_range+0x1cb/0x460 [ 2982.719585] ? lock_downgrade+0x6d0/0x6d0 [ 2982.719941] ? __ext4_handle_dirty_super+0x100/0x100 [ 2982.720365] ? __es_find_extent_range+0x197/0x4b0 [ 2982.720774] ? do_raw_read_unlock+0x3b/0x70 [ 2982.721144] ext4_ext_map_blocks+0x1863/0x5830 [ 2982.721540] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2982.721980] ? find_held_lock+0x2c/0x110 [ 2982.722325] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2982.722781] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 2982.723225] ? ext4_ext_release+0x10/0x10 [ 2982.723582] ? lock_release+0x680/0x680 [ 2982.723921] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2982.724321] ? lock_downgrade+0x6d0/0x6d0 [ 2982.724681] ? down_read+0x10f/0x430 [ 2982.724998] ? down_write+0x160/0x160 [ 2982.725320] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2982.725722] ext4_map_blocks+0x8e1/0x1910 [ 2982.726082] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2982.726462] ? __brelse+0x84/0xa0 [ 2982.726772] ? __ext4_new_inode+0x148/0x5370 [ 2982.727152] ext4_append+0x1b8/0x4e0 [ 2982.727470] ? ext4_move_extents+0x3050/0x3050 [ 2982.727861] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2982.728274] ext4_init_new_dir+0x25e/0x4d0 [ 2982.728635] ? ext4_init_dot_dotdot+0x610/0x610 [ 2982.729035] ext4_mkdir+0x3c1/0xb10 [ 2982.729349] ? ext4_rmdir+0xf70/0xf70 [ 2982.729680] vfs_mkdir+0x493/0x750 [ 2982.729985] do_mkdirat+0x150/0x2b0 [ 2982.730295] ? user_path_create+0xf0/0xf0 [ 2982.730649] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2982.731108] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2982.731546] do_syscall_64+0x33/0x40 [ 2982.731864] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2982.732295] RIP: 0033:0x7fcc5971bb19 [ 2982.732614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2982.734149] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2982.734818] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2982.735412] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2982.736007] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2982.736598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2982.737191] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x120, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xa0ba}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xca97}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x3c}}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x44000}, 0x4000c000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:06:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 18) 20:06:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:06:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x5) 20:06:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x101302, 0x75) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3ff, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="1647f741d892dd4ff90545966f40f5", 0xf, 0x8}, {&(0x7f0000000100)="8797cc8dc7b8631ce5fea748f5f1f1b26561e565f236bf36b649de751bd57b12fbfbed16e20a0d16d1186661081773493e380652f7285b3f72e8ba7e2031d9ab615633a8ffe80e6607f0689046dcca56f0af830e42f8f06c653064fe368f9aa8e6d92298859d9d5b7a19ef9eee47c98af589486c3a19cc653adc4c65892c556dc1db93401ba8aaee7c1bc4892c277aaf3146e307dfb2acfb", 0x98, 0x1000}], 0x400, &(0x7f0000000340)=ANY=[@ANYBLOB='mounts\x00,,smackfsdef=/],euid>', @ANYRESDEC=0x0, @ANYBLOB=',eu)d>', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b667372954307e220d36f6f743d7bb03f2c0075397554b3260bf9e00b707da4de0220f36e5e5977d2b6e199ac4154d58f323488d3ff8786308bc428aed000f1d48b035c36bcead2bcc605b0f46448f8a237e80f477fc199bd924802444128c7a25353f0afa0311c9b1dd2254bf9f2f47f77fda3977e976224fffe3e88d721f4bcb6d227127d6a34c6092c606a7cfc7ef73de8f55fc2220d42c59756f7af98575ebb9c2451128683afa41f4c0a48a9aa6894ace250afc3aae721504e1ccb44d772c020f32e"]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84082, 0x80) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x4, 0x81}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) fallocate(r4, 0x45, 0x400, 0x3) r5 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r5, 0x0, r5) preadv(r5, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/109, 0x6d}], 0x1, 0x9, 0x6) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='./file0\x00') inotify_add_watch(r7, &(0x7f00000014c0)='./file0\x00', 0x4) 20:06:03 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x800000000000000) [ 2997.160879] FAULT_INJECTION: forcing a failure. [ 2997.160879] name failslab, interval 1, probability 0, space 0, times 0 [ 2997.161937] CPU: 1 PID: 27258 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 2997.162524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2997.167234] Call Trace: [ 2997.167468] dump_stack+0x107/0x167 [ 2997.167780] should_fail.cold+0x5/0xa [ 2997.168107] ? alloc_pipe_info+0x10a/0x590 [ 2997.168468] should_failslab+0x5/0x20 [ 2997.168792] kmem_cache_alloc_trace+0x55/0x320 [ 2997.169178] ? avc_has_perm+0x108/0x1b0 [ 2997.169520] alloc_pipe_info+0x10a/0x590 [ 2997.169867] splice_direct_to_actor+0x774/0x980 [ 2997.170262] ? _cond_resched+0x12/0x80 [ 2997.170593] ? pipe_to_sendpage+0x380/0x380 [ 2997.170991] ? selinux_file_permission+0x92/0x520 [ 2997.171399] ? do_splice_to+0x160/0x160 [ 2997.171738] ? security_file_permission+0xb1/0xe0 [ 2997.172152] do_splice_direct+0x1c4/0x290 [ 2997.172503] ? splice_direct_to_actor+0x980/0x980 [ 2997.172924] do_sendfile+0x553/0x11e0 [ 2997.173262] ? do_pwritev+0x270/0x270 [ 2997.173587] ? wait_for_completion_io+0x270/0x270 [ 2997.173997] ? rcu_read_lock_any_held+0x75/0xa0 [ 2997.174387] ? vfs_write+0x354/0xb10 [ 2997.174714] __x64_sys_sendfile64+0x1d1/0x210 [ 2997.175111] ? __ia32_sys_sendfile+0x220/0x220 [ 2997.175502] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2997.175943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2997.176385] do_syscall_64+0x33/0x40 [ 2997.176701] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2997.177132] RIP: 0033:0x7f19518bbb19 [ 2997.177447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2997.179014] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2997.179652] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 2997.180249] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2997.180843] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 2997.181438] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 2997.182034] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:06:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') flock(r0, 0x1) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4101, 0x1005}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r4, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r6 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r7 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000010c0)="a7e9f8258a3cec035a86a44d00504d4dff", 0x11, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESDEC=r6, @ANYRESDEC=r4, @ANYRES16=r5, @ANYRES64]) r8 = getpgrp(0x0) ptrace(0x10, r8) kcmp(0x0, r8, 0x1, r3, r7) fcntl$setown(0xffffffffffffffff, 0x8, r8) waitid(0x0, r8, 0x0, 0x8, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000100)={0x0, 0x0, 0x3ff, 0x2fd, r8}) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001800210c00070000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r2, &(0x7f0000000040)={0xa03, 0x30, 0x10}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r9}}, 0x8) 20:06:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2997.275111] FAULT_INJECTION: forcing a failure. [ 2997.275111] name failslab, interval 1, probability 0, space 0, times 0 [ 2997.279659] CPU: 0 PID: 27265 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 2997.280308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2997.281087] Call Trace: [ 2997.281350] dump_stack+0x107/0x167 [ 2997.281698] should_fail.cold+0x5/0xa [ 2997.282065] ? create_object.isra.0+0x3a/0xa20 [ 2997.282504] should_failslab+0x5/0x20 [ 2997.286894] kmem_cache_alloc+0x5b/0x310 [ 2997.287284] create_object.isra.0+0x3a/0xa20 [ 2997.287698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2997.288174] kmem_cache_alloc+0x159/0x310 [ 2997.288573] __es_insert_extent+0xed1/0x1370 [ 2997.288992] ? do_raw_read_unlock+0x70/0x70 [ 2997.289393] ? perf_trace_lock+0xac/0x490 [ 2997.289792] ext4_es_insert_extent+0x45d/0xf10 [ 2997.290228] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2997.290634] ? ext4_es_find_extent_range+0x1cb/0x460 [ 2997.291127] ? lock_downgrade+0x6d0/0x6d0 [ 2997.291530] ? __ext4_handle_dirty_super+0x100/0x100 [ 2997.292006] ? __es_find_extent_range+0x197/0x4b0 [ 2997.292466] ? do_raw_read_unlock+0x3b/0x70 [ 2997.292870] ext4_ext_map_blocks+0x1863/0x5830 [ 2997.293300] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2997.293786] ? find_held_lock+0x2c/0x110 [ 2997.294162] ? perf_trace_lock+0xac/0x490 [ 2997.294556] ? ext4_ext_release+0x10/0x10 [ 2997.294964] ? lock_release+0x680/0x680 [ 2997.295334] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2997.295777] ? lock_downgrade+0x6d0/0x6d0 [ 2997.296184] ? down_read+0x10f/0x430 [ 2997.296540] ? down_write+0x160/0x160 [ 2997.296899] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2997.297345] ext4_map_blocks+0x8e1/0x1910 [ 2997.297744] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2997.298166] ? __brelse+0x84/0xa0 [ 2997.298496] ? __ext4_new_inode+0x148/0x5370 [ 2997.298943] ext4_append+0x1b8/0x4e0 [ 2997.299297] ? ext4_move_extents+0x3050/0x3050 [ 2997.299733] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2997.300196] ext4_init_new_dir+0x25e/0x4d0 [ 2997.300597] ? ext4_init_dot_dotdot+0x610/0x610 [ 2997.301049] ext4_mkdir+0x3c1/0xb10 [ 2997.301396] ? ext4_rmdir+0xf70/0xf70 [ 2997.301762] vfs_mkdir+0x493/0x750 [ 2997.302097] do_mkdirat+0x150/0x2b0 [ 2997.302444] ? user_path_create+0xf0/0xf0 [ 2997.302851] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2997.303335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2997.303818] do_syscall_64+0x33/0x40 [ 2997.304166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2997.304646] RIP: 0033:0x7fcc5971bb19 [ 2997.305000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2997.306731] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2997.307460] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 2997.308130] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 2997.308802] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 2997.309468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2997.310133] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 [ 2997.324963] nfs: Unknown parameter 'mounts' 20:06:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x6) 20:06:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/vlan/vlan1\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/238, 0xee}, {&(0x7f0000000140)=""/35, 0x23}], 0x2, 0x9, 0xbc4) [ 2998.709893] FAULT_INJECTION: forcing a failure. [ 2998.709893] name failslab, interval 1, probability 0, space 0, times 0 [ 2998.711117] CPU: 0 PID: 27385 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 2998.711757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2998.712518] Call Trace: [ 2998.712773] dump_stack+0x107/0x167 [ 2998.713116] should_fail.cold+0x5/0xa [ 2998.713476] ? create_object.isra.0+0x3a/0xa20 [ 2998.713904] should_failslab+0x5/0x20 [ 2998.714262] kmem_cache_alloc+0x5b/0x310 [ 2998.714646] create_object.isra.0+0x3a/0xa20 [ 2998.715073] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2998.715549] kmem_cache_alloc_trace+0x151/0x320 [ 2998.715986] ? avc_has_perm+0x108/0x1b0 [ 2998.716362] alloc_pipe_info+0x10a/0x590 [ 2998.716745] splice_direct_to_actor+0x774/0x980 [ 2998.717185] ? _cond_resched+0x12/0x80 [ 2998.717549] ? pipe_to_sendpage+0x380/0x380 [ 2998.717956] ? selinux_file_permission+0x92/0x520 [ 2998.718404] ? do_splice_to+0x160/0x160 [ 2998.718788] ? security_file_permission+0xb1/0xe0 [ 2998.719246] do_splice_direct+0x1c4/0x290 [ 2998.719634] ? splice_direct_to_actor+0x980/0x980 [ 2998.720088] ? security_file_permission+0xb1/0xe0 [ 2998.720542] do_sendfile+0x553/0x11e0 [ 2998.720905] ? do_pwritev+0x270/0x270 [ 2998.721264] ? wait_for_completion_io+0x270/0x270 [ 2998.721715] ? rcu_read_lock_any_held+0x75/0xa0 [ 2998.722147] ? vfs_write+0x354/0xb10 [ 2998.722499] __x64_sys_sendfile64+0x1d1/0x210 [ 2998.722934] ? __ia32_sys_sendfile+0x220/0x220 [ 2998.723364] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2998.723850] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2998.724330] do_syscall_64+0x33/0x40 [ 2998.724678] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2998.725151] RIP: 0033:0x7f19518bbb19 [ 2998.725499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2998.727209] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2998.727915] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 2998.728572] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2998.729229] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 2998.729887] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 2998.730548] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:06:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x900000000000000) 20:06:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x7) 20:06:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 20:06:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 19) 20:06:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:06:20 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYRES16=r2, @ANYRES64]) r4 = getpgrp(0x0) ptrace(0x10, r4) kcmp(0x0, r4, 0x1, r0, r3) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$FIOCLEX(r6, 0x5451) fcntl$setown(0xffffffffffffffff, 0x8, r4) waitid(0x0, r4, 0x0, 0x8, 0x0) r7 = syz_open_procfs(r4, &(0x7f0000000000)='mounts\x00') readv(r7, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:06:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x10280, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) [ 3014.505714] FAULT_INJECTION: forcing a failure. [ 3014.505714] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.511231] CPU: 1 PID: 27498 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3014.512860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3014.514596] Call Trace: [ 3014.514841] dump_stack+0x107/0x167 [ 3014.515159] should_fail.cold+0x5/0xa [ 3014.515547] ? alloc_pipe_info+0x1e5/0x590 [ 3014.515910] should_failslab+0x5/0x20 [ 3014.517710] __kmalloc+0x72/0x390 [ 3014.518010] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3014.518441] alloc_pipe_info+0x1e5/0x590 [ 3014.518889] splice_direct_to_actor+0x774/0x980 [ 3014.519330] ? _cond_resched+0x12/0x80 [ 3014.519756] ? pipe_to_sendpage+0x380/0x380 [ 3014.520160] ? selinux_file_permission+0x92/0x520 [ 3014.520657] ? do_splice_to+0x160/0x160 [ 3014.521030] ? security_file_permission+0xb1/0xe0 [ 3014.521563] do_splice_direct+0x1c4/0x290 [ 3014.521958] ? splice_direct_to_actor+0x980/0x980 [ 3014.522414] ? security_file_permission+0xb1/0xe0 [ 3014.522967] do_sendfile+0x553/0x11e0 [ 3014.523341] ? do_pwritev+0x270/0x270 [ 3014.523759] ? wait_for_completion_io+0x270/0x270 [ 3014.524217] ? rcu_read_lock_any_held+0x75/0xa0 [ 3014.524721] ? vfs_write+0x354/0xb10 [ 3014.525089] __x64_sys_sendfile64+0x1d1/0x210 [ 3014.525611] ? __ia32_sys_sendfile+0x220/0x220 [ 3014.526058] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3014.526597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3014.527131] do_syscall_64+0x33/0x40 [ 3014.527534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3014.528035] RIP: 0033:0x7f19518bbb19 [ 3014.528394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3014.530146] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3014.530859] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3014.531508] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3014.532114] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.532758] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3014.533354] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3014.538950] FAULT_INJECTION: forcing a failure. [ 3014.538950] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.540266] CPU: 0 PID: 27500 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3014.540968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3014.541792] Call Trace: [ 3014.542065] dump_stack+0x107/0x167 [ 3014.542439] should_fail.cold+0x5/0xa [ 3014.542851] ? create_object.isra.0+0x3a/0xa20 [ 3014.543315] should_failslab+0x5/0x20 [ 3014.543701] kmem_cache_alloc+0x5b/0x310 [ 3014.544122] create_object.isra.0+0x3a/0xa20 [ 3014.544564] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3014.545077] __kmalloc+0x16e/0x390 [ 3014.545448] ext4_find_extent+0xa3d/0xd30 [ 3014.545880] ext4_ext_map_blocks+0x1c8/0x5830 [ 3014.546352] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3014.546893] ? perf_trace_lock+0xac/0x490 [ 3014.547319] ? __lockdep_reset_lock+0x180/0x180 [ 3014.547787] ? ext4_ext_release+0x10/0x10 [ 3014.548217] ? ext4_map_blocks+0x5cd/0x1910 [ 3014.548660] ? lock_release+0x680/0x680 [ 3014.549066] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3014.549543] ? lock_downgrade+0x6d0/0x6d0 [ 3014.549977] ? down_write+0xe0/0x160 [ 3014.550357] ? down_write_killable+0x180/0x180 [ 3014.550840] ext4_map_blocks+0x63f/0x1910 [ 3014.551269] ? _down_write_nest_lock+0x160/0x160 [ 3014.551747] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3014.552198] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3014.552685] ext4_getblk+0x144/0x680 [ 3014.553069] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3014.553569] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3014.554022] ? __brelse+0x84/0xa0 [ 3014.554377] ? __ext4_new_inode+0x148/0x5370 [ 3014.554843] ext4_bread+0x29/0x1f0 [ 3014.555208] ext4_append+0x228/0x4e0 [ 3014.555589] ? ext4_move_extents+0x3050/0x3050 [ 3014.556058] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3014.556558] ext4_init_new_dir+0x25e/0x4d0 [ 3014.556988] ? ext4_init_dot_dotdot+0x610/0x610 [ 3014.557464] ext4_mkdir+0x3c1/0xb10 [ 3014.557839] ? ext4_rmdir+0xf70/0xf70 [ 3014.558234] vfs_mkdir+0x493/0x750 [ 3014.558601] do_mkdirat+0x150/0x2b0 [ 3014.558988] ? user_path_create+0xf0/0xf0 [ 3014.559411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3014.559936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3014.560459] do_syscall_64+0x33/0x40 [ 3014.560838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3014.561349] RIP: 0033:0x7fcc5971bb19 [ 3014.561725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3014.563491] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3014.564194] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3014.564847] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3014.565501] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.566159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3014.566839] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 20) 20:06:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xa00000000000000) 20:06:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f0000000040)={0x80000000, {0x20, 0x0, 0x9, 0xf2, 0x6}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:06:20 executing program 0: keyctl$set_timeout(0xf, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x2) r2 = fcntl$dupfd(r1, 0x406, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)=@keyring) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x800, 0x8000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) sendfile(r1, r2, 0x0, 0x7ff) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/83, 0x53}, {&(0x7f0000000500)=""/182, 0xb6}, {&(0x7f0000000340)=""/126, 0x7e}, {&(0x7f00000003c0)=""/188, 0xbc}], 0x5) 20:06:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x8) [ 3014.831102] FAULT_INJECTION: forcing a failure. [ 3014.831102] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.832222] CPU: 0 PID: 27620 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3014.832901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3014.833704] Call Trace: [ 3014.833980] dump_stack+0x107/0x167 [ 3014.834351] should_fail.cold+0x5/0xa [ 3014.834742] ? create_object.isra.0+0x3a/0xa20 [ 3014.835211] should_failslab+0x5/0x20 [ 3014.835587] kmem_cache_alloc+0x5b/0x310 [ 3014.835982] create_object.isra.0+0x3a/0xa20 [ 3014.836414] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3014.836913] __kmalloc+0x16e/0x390 [ 3014.837274] ext4_find_extent+0xa3d/0xd30 [ 3014.837700] ext4_ext_map_blocks+0x1c8/0x5830 [ 3014.838162] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3014.838689] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3014.839238] ? ext4_ext_release+0x10/0x10 [ 3014.839659] ? ext4_map_blocks+0x5cd/0x1910 [ 3014.840093] ? lock_release+0x680/0x680 [ 3014.840491] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3014.840967] ? lock_downgrade+0x6d0/0x6d0 [ 3014.841389] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 3014.841930] ? down_write+0xe0/0x160 [ 3014.842311] ? down_write_killable+0x180/0x180 [ 3014.842808] ext4_map_blocks+0x63f/0x1910 [ 3014.843233] ? _down_write_nest_lock+0x160/0x160 [ 3014.843701] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3014.844157] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3014.844639] ext4_getblk+0x144/0x680 [ 3014.845028] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3014.845527] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3014.845980] ? __brelse+0x84/0xa0 [ 3014.846337] ? __ext4_new_inode+0x148/0x5370 [ 3014.846799] ext4_bread+0x29/0x1f0 [ 3014.847164] ext4_append+0x228/0x4e0 [ 3014.847546] ? ext4_move_extents+0x3050/0x3050 [ 3014.848007] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3014.848504] ext4_init_new_dir+0x25e/0x4d0 [ 3014.848931] ? ext4_init_dot_dotdot+0x610/0x610 [ 3014.849404] ext4_mkdir+0x3c1/0xb10 [ 3014.849780] ? ext4_rmdir+0xf70/0xf70 [ 3014.850178] vfs_mkdir+0x493/0x750 [ 3014.850544] do_mkdirat+0x150/0x2b0 [ 3014.850958] ? user_path_create+0xf0/0xf0 [ 3014.851382] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3014.851912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3014.852423] do_syscall_64+0x33/0x40 [ 3014.852794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3014.853289] RIP: 0033:0x7fcc5971bb19 [ 3014.853662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3014.855483] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3014.856242] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3014.856948] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3014.857654] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.858358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3014.859081] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 21) 20:06:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) recvmmsg(r0, &(0x7f0000008d00)=[{{&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000280)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/85, 0x55}, {&(0x7f0000000240)=""/47, 0x2f}], 0x8, &(0x7f0000000300)=""/97, 0x61}, 0x2}, {{&(0x7f0000000380)=@tipc=@name, 0x80, &(0x7f0000000400)=[{&(0x7f00000014c0)=""/196, 0xc4}, {&(0x7f0000004640)=""/238, 0xee}], 0x2}, 0x7fff}, {{&(0x7f0000000440)=@x25, 0x80, &(0x7f0000005800)=[{&(0x7f00000015c0)=""/42, 0x2a}, {&(0x7f0000004740)=""/56, 0x38}, {&(0x7f0000004780)=""/121, 0x79}, {&(0x7f0000004800)=""/4096, 0x1000}], 0x4, &(0x7f0000005840)=""/112, 0x70}, 0x8658}, {{0x0, 0x0, &(0x7f0000006a80)=[{&(0x7f00000058c0)=""/4096, 0x1000}, {&(0x7f00000068c0)=""/65, 0x41}, {&(0x7f0000006940)=""/142, 0x8e}, {&(0x7f0000006a00)=""/116, 0x74}], 0x4, &(0x7f0000006ac0)=""/6, 0x6}, 0x21}, {{&(0x7f0000006b00)=@can, 0x80, &(0x7f0000006dc0)=[{&(0x7f0000006b80)=""/23, 0x17}, {&(0x7f0000006bc0)=""/173, 0xad}, {&(0x7f0000006c80)=""/207, 0xcf}, {&(0x7f0000006d80)=""/6, 0x6}], 0x4, &(0x7f0000006e00)=""/103, 0x67}}, {{&(0x7f0000006e80)=@isdn, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006f00)=""/57, 0x39}], 0x1, &(0x7f0000006f80)=""/31, 0x1f}, 0x4}, {{&(0x7f0000006fc0)=@caif=@rfm, 0x80, &(0x7f0000007240)=[{&(0x7f0000007040)=""/65, 0x41}, {&(0x7f00000070c0)=""/96, 0x60}, {&(0x7f0000007140)=""/169, 0xa9}, {&(0x7f0000007200)=""/32, 0x20}], 0x4, &(0x7f0000007280)=""/70, 0x46}, 0xea}, {{&(0x7f0000007300)=@qipcrtr, 0x80, &(0x7f0000008540)=[{&(0x7f0000007380)=""/4096, 0x1000}, {&(0x7f0000008380)=""/228, 0xe4}, {&(0x7f0000008480)=""/148, 0x94}], 0x3}, 0x7}, {{&(0x7f0000008580)=@nfc, 0x80, &(0x7f0000008900)=[{&(0x7f0000008600)=""/241, 0xf1}, {&(0x7f0000008700)=""/220, 0xdc}, {&(0x7f0000008800)=""/237, 0xed}], 0x3}, 0x6269}, {{0x0, 0x0, &(0x7f0000008c00)=[{&(0x7f0000008940)=""/171, 0xab}, {&(0x7f0000008a00)=""/32, 0x20}, {&(0x7f0000008a40)=""/33, 0x21}, {&(0x7f0000008a80)=""/154, 0x9a}, {&(0x7f0000008b40)=""/39, 0x27}, {&(0x7f0000008b80)=""/92, 0x5c}], 0x6, &(0x7f0000008c80)=""/102, 0x66}, 0x1}], 0xa, 0x40000000, &(0x7f0000008f80)={0x77359400}) 20:06:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) [ 3015.132118] FAULT_INJECTION: forcing a failure. [ 3015.132118] name failslab, interval 1, probability 0, space 0, times 0 [ 3015.133142] CPU: 1 PID: 27679 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3015.133719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3015.134403] Call Trace: [ 3015.134636] dump_stack+0x107/0x167 [ 3015.135274] should_fail.cold+0x5/0xa [ 3015.135926] ? create_object.isra.0+0x3a/0xa20 [ 3015.136708] should_failslab+0x5/0x20 [ 3015.137355] kmem_cache_alloc+0x5b/0x310 [ 3015.138045] create_object.isra.0+0x3a/0xa20 [ 3015.138834] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3015.139974] __kmalloc+0x16e/0x390 [ 3015.140598] alloc_pipe_info+0x1e5/0x590 [ 3015.141305] splice_direct_to_actor+0x774/0x980 [ 3015.142111] ? _cond_resched+0x12/0x80 [ 3015.142800] ? pipe_to_sendpage+0x380/0x380 [ 3015.143755] ? selinux_file_permission+0x92/0x520 [ 3015.144568] ? do_splice_to+0x160/0x160 [ 3015.145241] ? security_file_permission+0xb1/0xe0 [ 3015.146060] do_splice_direct+0x1c4/0x290 [ 3015.146756] ? splice_direct_to_actor+0x980/0x980 [ 3015.151369] ? security_file_permission+0xb1/0xe0 [ 3015.151807] do_sendfile+0x553/0x11e0 [ 3015.152141] ? do_pwritev+0x270/0x270 [ 3015.152466] ? wait_for_completion_io+0x270/0x270 [ 3015.152878] ? rcu_read_lock_any_held+0x75/0xa0 [ 3015.153269] ? vfs_write+0x354/0xb10 [ 3015.153588] __x64_sys_sendfile64+0x1d1/0x210 [ 3015.153970] ? __ia32_sys_sendfile+0x220/0x220 [ 3015.154361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3015.154828] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3015.155299] do_syscall_64+0x33/0x40 [ 3015.155641] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3015.156101] RIP: 0033:0x7f19518bbb19 [ 3015.156447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3015.158079] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3015.158773] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3015.159415] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3015.160058] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3015.160701] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3015.161339] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3015.231829] FAULT_INJECTION: forcing a failure. [ 3015.231829] name failslab, interval 1, probability 0, space 0, times 0 [ 3015.232948] CPU: 1 PID: 27741 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3015.233553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3015.234289] Call Trace: [ 3015.234544] dump_stack+0x107/0x167 [ 3015.234899] should_fail.cold+0x5/0xa [ 3015.235258] ? ext4_mb_new_blocks+0x698/0x45c0 [ 3015.235682] should_failslab+0x5/0x20 [ 3015.236043] kmem_cache_alloc+0x5b/0x310 [ 3015.236430] ext4_mb_new_blocks+0x698/0x45c0 [ 3015.236855] ? trace_hardirqs_on+0x5b/0x180 [ 3015.237245] ? kasan_unpoison_shadow+0x33/0x50 [ 3015.237637] ? ext4_cache_extents+0x68/0x2d0 [ 3015.238015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3015.238445] ? ext4_discard_preallocations+0xd80/0xd80 [ 3015.238919] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3015.239321] ? ext4_inode_to_goal_block+0x320/0x430 [ 3015.239752] ext4_ext_map_blocks+0x1d49/0x5830 [ 3015.240159] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3015.240605] ? perf_trace_lock+0xac/0x490 [ 3015.240965] ? __lockdep_reset_lock+0x180/0x180 [ 3015.241360] ? ext4_ext_release+0x10/0x10 [ 3015.241716] ? ext4_map_blocks+0x5cd/0x1910 [ 3015.242087] ? lock_release+0x680/0x680 [ 3015.242431] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3015.242843] ? lock_downgrade+0x6d0/0x6d0 [ 3015.243224] ? down_write_killable+0x180/0x180 [ 3015.243630] ext4_map_blocks+0x63f/0x1910 [ 3015.243991] ? _down_write_nest_lock+0x160/0x160 [ 3015.244400] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3015.244779] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3015.245191] ext4_getblk+0x144/0x680 [ 3015.245515] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3015.245934] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3015.246317] ? __brelse+0x84/0xa0 [ 3015.246617] ? __ext4_new_inode+0x148/0x5370 [ 3015.251022] ext4_bread+0x29/0x1f0 [ 3015.251328] ext4_append+0x228/0x4e0 [ 3015.251647] ? ext4_move_extents+0x3050/0x3050 [ 3015.252032] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3015.252454] ext4_init_new_dir+0x25e/0x4d0 [ 3015.252814] ? ext4_init_dot_dotdot+0x610/0x610 [ 3015.253219] ext4_mkdir+0x3c1/0xb10 [ 3015.253539] ? ext4_rmdir+0xf70/0xf70 [ 3015.253876] vfs_mkdir+0x493/0x750 [ 3015.254182] do_mkdirat+0x150/0x2b0 [ 3015.254497] ? user_path_create+0xf0/0xf0 [ 3015.254865] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3015.255304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3015.255742] do_syscall_64+0x33/0x40 [ 3015.256056] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3015.256486] RIP: 0033:0x7fcc5971bb19 [ 3015.256802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3015.258309] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3015.258957] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3015.259550] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3015.260146] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3015.260741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3015.261334] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:36 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xe00000000000000) 20:06:36 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 20:06:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1c6) 20:06:36 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x344841, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r0, r1, &(0x7f0000000040)=0x401, 0x6) 20:06:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 22) 20:06:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) [ 3030.243263] FAULT_INJECTION: forcing a failure. [ 3030.243263] name failslab, interval 1, probability 0, space 0, times 0 [ 3030.244434] CPU: 1 PID: 27762 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3030.245018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3030.245711] Call Trace: [ 3030.245947] dump_stack+0x107/0x167 [ 3030.246262] should_fail.cold+0x5/0xa [ 3030.246595] ? alloc_pipe_info+0x1e5/0x590 [ 3030.246977] should_failslab+0x5/0x20 [ 3030.247306] __kmalloc+0x72/0x390 [ 3030.247606] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3030.248045] alloc_pipe_info+0x1e5/0x590 [ 3030.248399] splice_direct_to_actor+0x774/0x980 [ 3030.248800] ? _cond_resched+0x12/0x80 [ 3030.249135] ? pipe_to_sendpage+0x380/0x380 [ 3030.249508] ? selinux_file_permission+0x92/0x520 [ 3030.249919] ? do_splice_to+0x160/0x160 [ 3030.250263] ? security_file_permission+0xb1/0xe0 [ 3030.250681] do_splice_direct+0x1c4/0x290 [ 3030.251044] ? splice_direct_to_actor+0x980/0x980 [ 3030.254959] ? security_file_permission+0xb1/0xe0 [ 3030.255380] do_sendfile+0x553/0x11e0 [ 3030.255716] ? do_pwritev+0x270/0x270 [ 3030.256051] ? wait_for_completion_io+0x270/0x270 [ 3030.256471] ? rcu_read_lock_any_held+0x75/0xa0 [ 3030.256863] ? vfs_write+0x354/0xb10 [ 3030.257187] __x64_sys_sendfile64+0x1d1/0x210 [ 3030.257571] ? __ia32_sys_sendfile+0x220/0x220 [ 3030.257963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3030.258406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3030.262874] do_syscall_64+0x33/0x40 [ 3030.263204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3030.263661] RIP: 0033:0x7f19518bbb19 [ 3030.263986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3030.265590] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3030.266265] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3030.266901] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3030.267537] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3030.268160] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3030.268780] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:06:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x1c, 0x1d, 0xc21, 0x0, 0x500, {0x5, 0x0, 0x2}, [@nested={0x5, 0x11, 0x0, 0x1, [@generic='D']}]}, 0x1c}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000040)=""/12, 0xc}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000080)=""/228, 0xe4}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f00000001c0)=""/69, 0x45}, {&(0x7f0000000240)=""/112, 0x70}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/124, 0x7c}, {&(0x7f0000000380)=""/241, 0xf1}], 0xa) 20:06:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40880, 0x0) write(r1, &(0x7f0000000080)="fd20b14494c5c386760206bf2275bee53eb19c30e00a4edd1278ffe6a9f10eed81eb2478a8779e48acb187f714481bbe9be12fa0a41cd9520fd541ca0b0f50b9184afcaf", 0x44) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 3030.324468] FAULT_INJECTION: forcing a failure. [ 3030.324468] name failslab, interval 1, probability 0, space 0, times 0 [ 3030.325781] CPU: 1 PID: 27765 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3030.326394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3030.331125] Call Trace: [ 3030.331363] dump_stack+0x107/0x167 [ 3030.331680] should_fail.cold+0x5/0xa [ 3030.332014] ? ext4_mb_new_blocks+0x1fd8/0x45c0 [ 3030.332426] should_failslab+0x5/0x20 [ 3030.332749] kmem_cache_alloc+0x5b/0x310 [ 3030.333098] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 3030.333508] ? trace_hardirqs_on+0x5b/0x180 [ 3030.333876] ? kasan_unpoison_shadow+0x33/0x50 [ 3030.334268] ? ext4_cache_extents+0x68/0x2d0 [ 3030.334649] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3030.335084] ? ext4_discard_preallocations+0xd80/0xd80 [ 3030.335535] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3030.335945] ? ext4_inode_to_goal_block+0x320/0x430 [ 3030.336381] ext4_ext_map_blocks+0x1d49/0x5830 [ 3030.336789] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3030.337238] ? perf_trace_lock+0xac/0x490 [ 3030.337601] ? __lockdep_reset_lock+0x180/0x180 [ 3030.338001] ? ext4_ext_release+0x10/0x10 [ 3030.338366] ? ext4_map_blocks+0x5cd/0x1910 [ 3030.338745] ? lock_release+0x680/0x680 [ 3030.339103] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3030.339516] ? lock_downgrade+0x6d0/0x6d0 [ 3030.339894] ? down_write_killable+0x180/0x180 [ 3030.340292] ext4_map_blocks+0x63f/0x1910 [ 3030.340659] ? _down_write_nest_lock+0x160/0x160 [ 3030.341070] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3030.341461] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3030.341882] ext4_getblk+0x144/0x680 [ 3030.342209] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3030.342639] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3030.343043] ? __brelse+0x84/0xa0 [ 3030.343351] ? __ext4_new_inode+0x148/0x5370 [ 3030.343737] ext4_bread+0x29/0x1f0 [ 3030.344051] ext4_append+0x228/0x4e0 [ 3030.344384] ? ext4_move_extents+0x3050/0x3050 [ 3030.344773] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3030.345200] ext4_init_new_dir+0x25e/0x4d0 [ 3030.345572] ? ext4_init_dot_dotdot+0x610/0x610 [ 3030.345982] ext4_mkdir+0x3c1/0xb10 [ 3030.346305] ? ext4_rmdir+0xf70/0xf70 [ 3030.346649] vfs_mkdir+0x493/0x750 [ 3030.346967] do_mkdirat+0x150/0x2b0 [ 3030.347288] ? user_path_create+0xf0/0xf0 [ 3030.347652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3030.348112] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3030.348561] do_syscall_64+0x33/0x40 [ 3030.348885] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3030.349329] RIP: 0033:0x7fcc5971bb19 [ 3030.349656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3030.351244] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3030.351901] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3030.352520] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3030.353134] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3030.353744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3030.354359] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:36 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x300) 20:06:36 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x1100000000000000) 20:06:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:06:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 23) 20:06:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x4, @none, 0xfffa, 0x1}, 0xe) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) syz_io_uring_setup(0x7e27, &(0x7f00000000c0)={0x0, 0xdf1f, 0x2, 0x2, 0x84, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 20:06:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4106, 0x100a}], 0x1) 20:06:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x1c00000000000000) 20:06:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x408) 20:06:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) [ 3044.858208] FAULT_INJECTION: forcing a failure. [ 3044.858208] name failslab, interval 1, probability 0, space 0, times 0 [ 3044.859380] CPU: 0 PID: 27999 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3044.860016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3044.860776] Call Trace: [ 3044.861032] dump_stack+0x107/0x167 [ 3044.861375] should_fail.cold+0x5/0xa [ 3044.861736] ? create_object.isra.0+0x3a/0xa20 [ 3044.862164] should_failslab+0x5/0x20 [ 3044.862522] kmem_cache_alloc+0x5b/0x310 [ 3044.862915] create_object.isra.0+0x3a/0xa20 [ 3044.863400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3044.863959] __kmalloc+0x16e/0x390 [ 3044.864359] alloc_pipe_info+0x1e5/0x590 [ 3044.864809] splice_direct_to_actor+0x774/0x980 [ 3044.865330] ? _cond_resched+0x12/0x80 [ 3044.865758] ? pipe_to_sendpage+0x380/0x380 [ 3044.866242] ? selinux_file_permission+0x92/0x520 [ 3044.866779] ? do_splice_to+0x160/0x160 [ 3044.867230] ? security_file_permission+0xb1/0xe0 [ 3044.867775] do_splice_direct+0x1c4/0x290 [ 3044.868405] ? splice_direct_to_actor+0x980/0x980 [ 3044.868951] ? security_file_permission+0xb1/0xe0 [ 3044.869515] do_sendfile+0x553/0x11e0 [ 3044.869966] ? do_pwritev+0x270/0x270 [ 3044.870411] ? wait_for_completion_io+0x270/0x270 [ 3044.870965] ? rcu_read_lock_any_held+0x75/0xa0 [ 3044.872059] ? vfs_write+0x354/0xb10 [ 3044.872894] __x64_sys_sendfile64+0x1d1/0x210 [ 3044.873903] ? __ia32_sys_sendfile+0x220/0x220 [ 3044.874941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3044.876127] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3044.877281] do_syscall_64+0x33/0x40 [ 3044.878115] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3044.879281] RIP: 0033:0x7f19518bbb19 [ 3044.880115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3044.884280] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3044.886046] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3044.887674] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3044.889272] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3044.890896] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3044.892507] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3044.963981] FAULT_INJECTION: forcing a failure. [ 3044.963981] name failslab, interval 1, probability 0, space 0, times 0 [ 3044.966594] CPU: 0 PID: 28003 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3044.968165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3044.970063] Call Trace: [ 3044.970648] dump_stack+0x107/0x167 [ 3044.971485] should_fail.cold+0x5/0xa [ 3044.972340] ? ext4_mb_new_blocks+0x1fd8/0x45c0 [ 3044.973395] should_failslab+0x5/0x20 [ 3044.974246] kmem_cache_alloc+0x5b/0x310 [ 3044.975176] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 3044.976198] ? trace_hardirqs_on+0x5b/0x180 [ 3044.977169] ? kasan_unpoison_shadow+0x33/0x50 [ 3044.978186] ? ext4_cache_extents+0x68/0x2d0 [ 3044.979188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3044.980333] ? ext4_discard_preallocations+0xd80/0xd80 [ 3044.981512] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3044.982577] ? ext4_inode_to_goal_block+0x320/0x430 [ 3044.983724] ext4_ext_map_blocks+0x1d49/0x5830 [ 3044.984758] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3044.985943] ? perf_trace_lock+0xac/0x490 [ 3044.986872] ? __lockdep_reset_lock+0x180/0x180 [ 3044.987932] ? ext4_ext_release+0x10/0x10 [ 3044.988860] ? ext4_map_blocks+0x5cd/0x1910 [ 3044.989836] ? lock_release+0x680/0x680 [ 3044.990727] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3044.991821] ? lock_downgrade+0x6d0/0x6d0 [ 3044.992781] ? down_write_killable+0x180/0x180 [ 3044.993832] ext4_map_blocks+0x63f/0x1910 [ 3044.994764] ? _down_write_nest_lock+0x160/0x160 [ 3044.995842] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3044.996842] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3044.997903] ext4_getblk+0x144/0x680 [ 3044.998733] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3044.999882] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3045.000886] ? __brelse+0x84/0xa0 [ 3045.001668] ? __ext4_new_inode+0x148/0x5370 [ 3045.002655] ext4_bread+0x29/0x1f0 [ 3045.003468] ext4_append+0x228/0x4e0 [ 3045.004299] ? ext4_move_extents+0x3050/0x3050 [ 3045.005336] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3045.006420] ext4_init_new_dir+0x25e/0x4d0 [ 3045.007393] ? ext4_init_dot_dotdot+0x610/0x610 [ 3045.008447] ext4_mkdir+0x3c1/0xb10 [ 3045.009271] ? ext4_rmdir+0xf70/0xf70 [ 3045.010136] vfs_mkdir+0x493/0x750 [ 3045.010952] do_mkdirat+0x150/0x2b0 [ 3045.011771] ? user_path_create+0xf0/0xf0 [ 3045.012718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3045.013923] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3045.015126] do_syscall_64+0x33/0x40 [ 3045.015962] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3045.017127] RIP: 0033:0x7fcc5971bb19 [ 3045.017958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3045.022143] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3045.023856] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3045.025469] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3045.027102] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3045.028717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3045.030348] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:06:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:06:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) vmsplice(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="72a3d7213bcf6099b451f08fedbac44996b776bab394033dc0b29368c678f7a72906ec05d5ec3a83f3be8228d8c5dc7c0d6d4d0eb48134d13378e925300e9ed46f18753fecfc2a3d5343a2b670870d56068e8d9ab8c0d8d9c8e7e544d73d395043026ab53c7c7ffd9a", 0x69}, {&(0x7f00000000c0)="3b85a67d7777ab98cf64a09a04954aab9e75effee335de88780de7e6dcd9da2ed121f4d24c909999d310fd08a2e533ecc09ec90e37d5f4c5beb3af3b573ac31fd1c83fbb3bfef4335018169be17cd5e4aa8b405c0dd59c3a063b0e37bcf5e1144744582e25cdcde8d8c285f45df799ed21a5747c", 0x74}, {&(0x7f0000000140)="2ee872da234f3d57830fbf1f648d85fec6c4bab91bb6a8c49a031794b529a0de2bc74c964e5da0358453221d4232f89342c887096c6455e1d06f418654ed66a6b4037ebf5f0a96dc1bfa9c70b9e08e044660d7506f532a1be65c3b3978cc060bdf4a3e03ab54fcea0cb9d493bd9fa9523befc104b9170e925f2a6b6a50a376b78a8ba6fab3ddf662f8f25c8a9c7517ebd34ab879370b09", 0x97}, {&(0x7f0000000200)="25bbe068ba82fe99bf37a9eb733165a5a9f2e66a86553860f48f7a957f190a026c2235276625bf653c1e76bd2afddc86857c04e3379cf426c716cd01490fa812ccac9b7830f776ff4ee4b12df0b1e59aa207553d31dd06eb21c4f42a18304b9ebf74bcfdd73b5143ea196881308f5fcdab17d20e6892ee26262e8dc80f47e5c452dcd4d1c4d1541f42a8c5a33d7ebe8830a902c998a176bdfc03ece4925afd3416ee920d7ba759da069da36f129e6441962b2c322ef74255eceb80c5f791b49eb549f5acd043f6c3cf56857b01b0197c221ab57dfbf601b2e1eebc097003d51aba3e066077cb8d0a4f5ab90b07", 0xed}, {&(0x7f0000000300)="efb5010719306b1e8ee3bb65715e2871e904b3a3611dc1c0853c", 0x1a}, {&(0x7f0000000340)="31394dcaa1c84db5c9377fce906a21d4996273447d61fedfc641348a31e3bd38358a910fc328c3b400dd803e16e75ea36ed41abfd6bf074eedd870a6c4b17266be4a2eb84a241324c9c6dba0e8e846789c505a89a0ea8b1bb95614d308a1ce0446026c9292c04c97710f6140f3bc4eb41d50fe96ba4ea8022d51a1d56186c88b2e18ad040d18d2c6f7216d35de89", 0x8e}, {&(0x7f0000000400)="284ac88cb6d766d2a8b1cc34c0e2c6a7a2418d441360da63801c5ffbfb9b09ffc00a", 0x22}, {&(0x7f0000001640)="6dc95ce0b42f0f3abe1c7ba074be19d67bab9607b07dea0d2d409bb43111d844565c27bd4d49304c5d3ff557f737fd70fef4ba941414bbbe0eecd80cc1a044a267aece34e9ddeeed52418c59c4e1a2e542a7a87d9810f4909711748d7587426ece58951375827ae5670ce1533707011d0b501bb503394449f1509760f5fc5f669f7b3e8b837bf1f3ddc09c6031a45c4bd7f2223791eaddd0bad3eeac6fe998b2df962263861249d45c78dd41f94d6f0a71e054194aa44d9e21e80f486f8ec8b9267256d64b80b7b0e64b91a3d57a9b9d8644f65418b8a262d0d73340e559a08549ca3cf67051e60b7af35dbdcb521ecae7b46cbeca76c15ed812114562b64a42eb9c2ba76b36c87c2c2b68cd6b2188218700b78206e3bcd74a050240f35092eb9b4c00b54a58428d4bacff24e4da13a2dcf8d3e4ba513515deb73d2a6de5ca0aeba64d949ab2b82bd1ad5119a3eccc76d05ef12320d45eb4e5e3f62b0e0dd74fb5859e6c4cef967091482bf0b08f3cc06ac55a48f5643f84556be1fc0e750d6295d7de26045df250518fd0b14faafd6780d0e65d1a673656653be80d4a3658ffadf4b4e2bcce58d35eec0c3c7610b2e668a8cda131167d6aa9f6db518677af6eea372289a47c870bd65772a15832b78b6e274fd61561671554551fab63ac39a2ec731d67fbdd6a15c98e2161f92f7eb3a912911896593a2d831643b8466b3ca9e5a10a8191d3178f631f147dd8f47697da5cab8de85ef21631497b666325703024b551595868698463791eaf45006965b1926d6eeb28e183066dd549ec7191ea08afa084b1ee1117db855a7fb8b2f92be44f276af396ae5334d16d5ccfb60b3a3f2d3fa5532f0f1dd161846ae928e452fa4c8c4ee937fdc4b02dfc5c0288d4931d9182a79126b09cc44ac2d8330be60c564f6bf23ac01c013d299b9252934d65164f04d03b08558998f195acefec1b9aa755714cf3b15eefe5d27981c3b97f813ffdbc4323acfbe4768b4912588795babf06ed25c2e9c5795c6eb7679db8985706acb2d351065544d5f0b65050bff710950eabae52d8ad24e8b73b914b91e25d4acb75172ae02d97a661583d05b676ae893abb5525df7138777368840ca0ad9c093033f70d9f0fd962c2ed51e0fec3f6751a096a12faca395c97ba0409e686b22fee89ddbfd2345c77632aa09c0b3b799f756d6bfa724dea2aeccbbc3502f5e5c810f692a0bc13da7e9c9ed87d58d8933af7af45880f075a23d3a277bb7c137f9ffb02d7a72bc54870b051e037152bb08bf0763df9c73b8f54017530befe15d2b3a4e306a5f2eceeae8f433e7e1f0a1dc3077225a59abc3b6c8f1da4bac73bd12045c1be3c8922f03711c32911007ae9469945b1a76330514f5887588866e92a929d2cf282b53a16082d1f07119b201927ed0acc3a885dba80bdfe0187a9bfa50549f1677caaac0c10f4f3b1a2fe784a05186da72da74bd78e81b2deb4b42561e6abc35fd1adeb478fe914c0b6c32b1bc35807495875b4642f816e50fd1aa1af6a928204477c0f93c87df8b334889930c4c1062037faffb872ba1b710bd8b4211aa9f6ff3e1202b1093f6aa3b0ab9acf42739ddef093d34424f90302fdee89fc488c5107adf2946ad34183e77825e2c4120c69ed0089afcbb546fa3e51c8ff33602c75272b0ade1615af802de2b82afa21da0ed79c534620bf1ceb13f58a594a4a02adc554b4b78d9cf1f906cc9e1a361ead94aaf5394ed31d346dc5b2e593987ac941d6d75700f49c1230bb636e734079fd9066b29fb67740a4bf729b5e0036682cbd46d58f11f6ac166aededa34367fa7696e519db9a92de8a76b76b217fb748c15b9153298cc162d8940b66496fe467d3d08649972647b54751b1784f1b32c8762c5850aeba8a54e6d2be10f42b36be1540d4ddf5a1f84b030e444516e5e4fc3ad830006492a61acaf7212881873d5bd5ff1cdfaf4a7a2471c376435e48a300756bab7eff6d3507114ae301c0e5fe1752f66302782bf1018d468dcdfed712b29bea29bf34e5262fdfe696498c429ea9ce97709a79f50903e06bb630d79df20a186caf94af2ec4bd5ef4686bcd1d9441fa4836d55c0fdb613e69b583e01db93221843bd6ba81be836f14a4dadd961f89f0063a9d13e754f51142efb9794027e55c0335599e8d650683e23d91a57cc43edb5162e091ca7e85c9ba24b5297463adbc34d26f3bcbd2a3a1b488b8e50ac5508d7303f4837adb19ea301d725074018193c5533c83ae2f75d54f624d9868421fd34366e1ad683b4853e75967d09a307faf7dbd7f8a01b2ec3fb5b142bd61eafc69e106d84b3c2027cca9acd64de26de91f35d1c9cbf6da633932793a6e7a0cfc07bec32033639cb7756248fea2704f919a573ee0120bf36efa417a15672e9cd3b9bb2124bfed58e14a51f26efdad5c48a0cdd5829c2afe486d831c62caa7df66a7f65d4267f452bec061f257f5ca66219301f6286ac7e31de426e1da65a42fc69b0e84c5868637057dad666cda11f64bfe1832457c29fc04763e24a7e3736201f434a0899fbf4d81f196d7c8eaefc7c7eca1a517981f67707fd087c2cf60931041672a0cbd0ee8061066676e4c7e858e91644a5bf47716ed4aa5938ce690edfe11fa78f3f3fbeed33447eac14dcfd16edd1918f6f2a41551b241d5fcab3794a715949798191ddf3d63f621d2c274a9ac57fa342f640d9ff8bcd80ff645314a40b9a67e68ef12ac22b4eaabc855a1438328600e71dabdb8838a34723c29d92e65d26f3533820a57f77d3f8790fa4b2bd6abeabc86b6650723d86c7974f63b093247bcad84cd164f700be4c67bab6da755d152745db09dfb6409a463b33cf4e1b917f7036e535bc9706371f4dfb27757cbb1c5ceb9aaacb516eb13f7f3af79bbc4e26fb2ab3a852ddc6f2d6efc44d57d7a6ea3c850b7647dac765a02a5e57f31c110227602267380a6d9345367e08892b4957d3ee58d7c92581ab54145056b077595cc025d42496d27303a5f0ccc0d764a0247531781580171b672d8903e120eadc03ffaaac17129de0cd6f6fe710fe451dce804d363ecc081f1ebaf06dd87c5361f5befb8a940278929d94a5f6a46b3dd050de202161f8881711738443198c017c68f41bcda15050c6ae39c42d65a59dde28feebf3534f796ac2e8244f1e54894b8b2c208c3d78dd4cc8542c656632428671985787ba87a88a3851e35f6b869ae149473a7c14c5470c651a206238b857b1055d7167a47cac4b2dd875c0e4e4a1187d2e98ea6038d0068dd82f5a10bc15b92b7f14fd639ce9a608c8f38a4243c2571cce62f440a223d0e68b1f76f4ca0c5c3064be1c9099065cdba0fb90c104e2ec31942c46bc5810f0581221b56fbb6058dc7117f873e4de46654e143802f0f6a7ea3d1f3d6cedaf3088d3ac38005dafa4e665793ca29e1a8af9498c55f052026b906f5c1e24cf2d1e8585afb856216579b6ab6e330c02e722ebd6530f05845c4d77e00d5fd05f2bcc95cd9861403079e30df863360ef67b74d3fe0487a6b016f727a2808dc15715a8dcd0144b99a91a08fece1271562d049acdc7c87f8a1a4decfe681758b27ca2f734e4e74d6393b920e22064d657acfdea5398eccdf51f058ea45895a20d13e4803396e81a83925f6fb4359a0f4ae26666ce1517830aa3e0917403bbf6526a9da7e26083aa64b790d78e52a97cd3f6e2ce2711cedeb5005b8bcc7749f3c927af4d7c199c13064dbfff392d3ed7020dc6d23fd74d19411c0987540724c04b41abd11d5512618fda97e0e47f38857537b504e0a322042b2c7ea1dc5687d074bcfbadd03fb794ef1bab5a3f7eb833d74a50d86299e5f668cd7ab239dc7f82c9ee85eac8ec9323d67a2480c2b95812eff77a82ea1ed179822b0c7dd2b8a48a58ace738e433e52575ebddd57774d8cf49d9663463cd4decc7fd1b0fb7ea58b683debf923f73ce6ceac7eaaebb1e9989413a93c46ab927f0d9750022250dfe1636a863ac2417c6526382fd3e7d905bf8e1768eb77857e5f67f0cedda8be4b1c778282f3ecaea8a8dc54d3a5229db9b667e0ae4c5f9d5cfef210fa8da1eb8debe321b0347d85773f7971cc160e94ddeee607562dd15e1da8107b7562d2dc2179f1fe20444aa5f215dd566d5350668f4885d34f7b49a10df54a54231a4af57738937a9189b90001a26ce3778af068a6318797b19c74edbc08899d207dcfe6bb5648bf84aa8ea944f45b1d926572351c4f367a824eb38dd14a624dd121ecdd1e6b5008f27f3668656e1c721cff2d34be547186337d0827099d58778576e44c382fd9e66f7fbca1385940e3d66d1ab162d54c96af1ab689272d3e14705628ec87e69d87cf72982031a683143581e1a88440d0cb22d479a389f6d127a7a24d10e1e2d40072f6b878ca38faf8905eca8ae5617f47cb2fcf6836a1498033a28ca41245de320f229bad1232372ea209b0a839f266b300556e0c5157916ac9b75c97eefec0254f5a663fe0c5e2357270a52c7c152817648c259c1e22bf1b6085948b26f46e2eadcea151dcb441c4629b00748c447702a673fbd5ededf2729b34516407e3c4018c885e0eaeed6c649c1310a2d42c77242ca7a8027ad9061cb607a5e58121045137942305b4ea470bcbe068df6676bfcc5941896988a820e45d3ac496b2c5a04140118104a0578f122d296ecfcf76a37ef4f6a85a009fe5188efa0be2aa8f7334f55ba880bc6594e15d7d82bd6eb5e61430fe148637cac934dc13ac6cf029ca9f3fb118b8f6e0558e05ff199a9cd6806b64b9328d5696b7cca98cdc70164d9e6b40ef260c4f054dc82a1f54763da758876e56cd2e2d1fca8830c55990899c5decedc296ea71788fc13eb19062567d162810c7e0e59f47b6b0131b2ef149f497aa0a513bce45fa7793c183224d428dd51d7b0d6cfe4fcfc43b5103868e607065283724f87215675ebf88a9c82f53eeea1b2f5de67cb6bf68e1c66ff0311cc52a9868774d9a1857307470066d342e06f554cc813631fbff3e6a2616d6df18f9f0505612418b0bf48b986e4da26bc8395d51ddb4fe3d0c29f4b090fc102a2618352729829fed4f5bbc777d012f2832e109f682a9e979ca1eb36602495aa129bfbdd993666679f4543de63309486bc062affd1d47d821564e58da05e94c52ca76bdefea215a6be697798e3ac43e3f4562e44e86f6794e398e19be1f530bdb5dda2e28fa0776ffd4b033ff0a126dddd05a6880c1676520e0429f36648bc172442b7e891ec83faa1d9a3f470edea61453c83b63d9dab971708f7baa354e28349220bfe43f16ba7e3187fd674402acbf81c624667da5304acaa6d12776e441b62d14133a75959dc74299f5db526c9c6d4744dd8f258e146bbdd77390f9049294299d35a2226ed212e53cc3a106278a622390fb96c451e82f78fe6627ccc0b2aa4e8c3be9d93cc3ad2a798e91c3a09fe4569e3c62cfd18419c65678727e23e6b14a3733418aa6af9e63122a7e476b29c117e88b171a1dd0ef2215389a20f8a0fa3061a3ef0f9e4b7978e660860373b91bc86df4b1e5927b5b0accaf088845a6e8ceb897daaa2e7735b4ce6f773ba1107a9043ef5e270e8dadca9ee51013b77e5e069bf9a732d9205c0136d1a5367d265e49c596e24251569641d567e9d3eb4fbc62f2347b53ffe60876bd58a6c989c465dceba82e3a0d44e89efb102d2c9e92355cdfb31228148fa2c259680fd907469834433c2301557b3d0ef84a09f6805ee561deeee8e0605d5a66356a3414", 0x1000}], 0x8, 0x2) 20:06:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x2000000000000000) 20:06:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:06:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:06:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x480) 20:06:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 24) 20:06:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:06:51 executing program 0: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd0, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x400}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfc9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x44b}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40004}, 0x4008001) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = signalfd(r0, &(0x7f0000000240)={[0x81]}, 0x8) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 3045.453513] FAULT_INJECTION: forcing a failure. [ 3045.453513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3045.455149] CPU: 0 PID: 28125 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3045.455800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3045.456571] Call Trace: [ 3045.456823] dump_stack+0x107/0x167 [ 3045.457166] should_fail.cold+0x5/0xa [ 3045.457528] __alloc_pages_nodemask+0x182/0x600 [ 3045.457965] ? __lock_acquire+0xbb1/0x5b00 [ 3045.458361] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3045.462937] ? __lockdep_reset_lock+0x180/0x180 [ 3045.463368] ? perf_trace_lock+0xac/0x490 [ 3045.463755] alloc_pages_current+0x187/0x280 [ 3045.464159] ? __lockdep_reset_lock+0x180/0x180 [ 3045.464592] push_pipe+0x2b5/0x6d0 [ 3045.464927] _copy_to_iter+0x509/0x12d0 [ 3045.465299] ? __virt_addr_valid+0x346/0x5d0 [ 3045.465706] ? lock_downgrade+0x6d0/0x6d0 [ 3045.466088] ? SEQ_printf+0xca/0x120 [ 3045.466434] ? timer_list_start+0x2e0/0x2e0 [ 3045.466836] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3045.467313] ? __check_object_size+0x319/0x440 [ 3045.467739] seq_read_iter+0xdcb/0x12b0 [ 3045.468123] proc_reg_read_iter+0x20a/0x2e0 [ 3045.468528] generic_file_splice_read+0x455/0x6d0 [ 3045.468973] ? pipe_to_user+0x170/0x170 [ 3045.469353] ? fsnotify_perm.part.0+0x22d/0x620 [ 3045.469788] ? security_file_permission+0xb1/0xe0 [ 3045.470237] ? pipe_to_user+0x170/0x170 [ 3045.470607] do_splice_to+0x10e/0x160 [ 3045.470985] splice_direct_to_actor+0x2fe/0x980 [ 3045.471417] ? pipe_to_sendpage+0x380/0x380 [ 3045.471819] ? do_splice_to+0x160/0x160 [ 3045.472187] ? security_file_permission+0xb1/0xe0 [ 3045.472638] do_splice_direct+0x1c4/0x290 [ 3045.473021] ? splice_direct_to_actor+0x980/0x980 [ 3045.473471] ? security_file_permission+0xb1/0xe0 [ 3045.473923] do_sendfile+0x553/0x11e0 [ 3045.474282] ? do_pwritev+0x270/0x270 [ 3045.474639] ? wait_for_completion_io+0x270/0x270 [ 3045.475103] ? rcu_read_lock_any_held+0x75/0xa0 [ 3045.475533] ? vfs_write+0x354/0xb10 [ 3045.475883] __x64_sys_sendfile64+0x1d1/0x210 [ 3045.476300] ? __ia32_sys_sendfile+0x220/0x220 [ 3045.476726] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3045.477208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3045.477685] do_syscall_64+0x33/0x40 [ 3045.478030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3045.478501] RIP: 0033:0x7f19518bbb19 [ 3045.478845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3045.480538] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3045.481236] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3045.481888] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3045.482542] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3045.483210] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3045.483864] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3045.608172] FAULT_INJECTION: forcing a failure. [ 3045.608172] name failslab, interval 1, probability 0, space 0, times 0 [ 3045.615596] CPU: 0 PID: 28186 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3045.623180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3045.623928] Call Trace: [ 3045.624175] dump_stack+0x107/0x167 [ 3045.624515] should_fail.cold+0x5/0xa [ 3045.624871] ? create_object.isra.0+0x3a/0xa20 [ 3045.625295] should_failslab+0x5/0x20 [ 3045.625650] kmem_cache_alloc+0x5b/0x310 [ 3045.626031] create_object.isra.0+0x3a/0xa20 [ 3045.626438] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3045.626918] kmem_cache_alloc+0x159/0x310 [ 3045.627313] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 3045.627738] ? trace_hardirqs_on+0x5b/0x180 [ 3045.628139] ? kasan_unpoison_shadow+0x33/0x50 [ 3045.628569] ? ext4_cache_extents+0x68/0x2d0 [ 3045.628974] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3045.629454] ? ext4_discard_preallocations+0xd80/0xd80 [ 3045.629935] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3045.630376] ? ext4_inode_to_goal_block+0x320/0x430 [ 3045.630851] ext4_ext_map_blocks+0x1d49/0x5830 [ 3045.631313] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3045.631804] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3045.632297] ? ext4_ext_release+0x10/0x10 [ 3045.632694] ? ext4_map_blocks+0x5cd/0x1910 [ 3045.633099] ? lock_release+0x680/0x680 [ 3045.633473] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3045.633916] ? lock_downgrade+0x6d0/0x6d0 [ 3045.634306] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 3045.634821] ? down_write_killable+0x180/0x180 [ 3045.635274] ext4_map_blocks+0x63f/0x1910 [ 3045.635673] ? _down_write_nest_lock+0x160/0x160 [ 3045.636118] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3045.636540] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3045.636994] ext4_getblk+0x144/0x680 [ 3045.637345] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3045.637820] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3045.638245] ? __brelse+0x84/0xa0 [ 3045.638576] ? __ext4_new_inode+0x148/0x5370 [ 3045.639007] ext4_bread+0x29/0x1f0 [ 3045.639346] ext4_append+0x228/0x4e0 [ 3045.639702] ? ext4_move_extents+0x3050/0x3050 [ 3045.640129] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3045.640595] ext4_init_new_dir+0x25e/0x4d0 [ 3045.640994] ? ext4_init_dot_dotdot+0x610/0x610 [ 3045.641441] ext4_mkdir+0x3c1/0xb10 [ 3045.641789] ? ext4_rmdir+0xf70/0xf70 [ 3045.642151] vfs_mkdir+0x493/0x750 [ 3045.642492] do_mkdirat+0x150/0x2b0 [ 3045.642836] ? user_path_create+0xf0/0xf0 [ 3045.643245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3045.643781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3045.644283] do_syscall_64+0x33/0x40 [ 3045.644632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3045.645104] RIP: 0033:0x7fcc5971bb19 [ 3045.645449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3045.647159] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3045.647866] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3045.648525] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3045.649180] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3045.649837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3045.650501] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:06 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x4000}, {0xffffffffffffffff, 0x26}, {r0, 0x8400}, {r1, 0x408}, {r2}, {0xffffffffffffffff, 0xb19a}, {0xffffffffffffffff, 0x880}, {r4, 0x8195}], 0x8, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)={[0xfffffffffffff6ad]}, 0x8) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:06 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0x6e, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000002640)=""/4109, 0x100d}, {&(0x7f0000000140)=""/6, 0x6}], 0x3, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x110}, 0x40000000) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x500) 20:07:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x2e00000000000000) 20:07:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 25) 20:07:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800001f1800210c0000000000000d00000008010200000000000c000980110000000000ed5cfce4", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x200, 0x70bd28, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) openat(r2, &(0x7f0000000040)='./file0\x00', 0x2000, 0xf1) [ 3060.119225] FAULT_INJECTION: forcing a failure. [ 3060.119225] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.120426] CPU: 1 PID: 28252 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3060.121027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3060.121729] Call Trace: [ 3060.121961] dump_stack+0x107/0x167 [ 3060.122276] should_fail.cold+0x5/0xa [ 3060.122604] ? __should_failslab+0x43/0xf0 [ 3060.122977] ? __alloc_skb+0x6d/0x5b0 [ 3060.123314] should_failslab+0x5/0x20 [ 3060.123642] kmem_cache_alloc_node+0x55/0x330 [ 3060.124030] __alloc_skb+0x6d/0x5b0 [ 3060.124346] ? strlen+0x1e/0xa0 [ 3060.124634] alloc_skb_with_frags+0x92/0x570 [ 3060.125020] sock_alloc_send_pskb+0x7af/0x930 [ 3060.125414] ? sk_alloc+0x350/0x350 [ 3060.125728] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3060.126139] ? lock_downgrade+0x6d0/0x6d0 [ 3060.126496] ? do_raw_spin_lock+0x121/0x260 [ 3060.126866] ? wait_for_completion_io+0x270/0x270 [ 3060.127298] ? rwlock_bug.part.0+0x90/0x90 [ 3060.127671] unix_stream_sendpage+0x245/0xcd0 [ 3060.128064] ? unix_dgram_connect+0xae0/0xae0 [ 3060.128453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3060.128901] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3060.129370] kernel_sendpage.part.0+0x146/0x290 [ 3060.129773] sock_sendpage+0xe5/0x140 [ 3060.130100] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3060.130570] pipe_to_sendpage+0x2af/0x380 [ 3060.130955] ? propagate_umount+0x1550/0x1550 [ 3060.131353] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3060.131812] __splice_from_pipe+0x43d/0x890 [ 3060.132181] ? propagate_umount+0x1550/0x1550 [ 3060.132570] generic_splice_sendpage+0xd5/0x140 [ 3060.132968] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3060.133348] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3060.133809] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3060.134188] direct_splice_actor+0x10f/0x170 [ 3060.134567] splice_direct_to_actor+0x387/0x980 [ 3060.134974] ? pipe_to_sendpage+0x380/0x380 [ 3060.135353] ? do_splice_to+0x160/0x160 [ 3060.135696] ? security_file_permission+0xb1/0xe0 [ 3060.136115] do_splice_direct+0x1c4/0x290 [ 3060.136470] ? splice_direct_to_actor+0x980/0x980 [ 3060.136887] ? security_file_permission+0xb1/0xe0 [ 3060.137308] do_sendfile+0x553/0x11e0 [ 3060.137642] ? do_pwritev+0x270/0x270 [ 3060.137970] ? wait_for_completion_io+0x270/0x270 [ 3060.138633] ? rcu_read_lock_any_held+0x75/0xa0 [ 3060.139662] ? vfs_write+0x354/0xb10 [ 3060.140480] __x64_sys_sendfile64+0x1d1/0x210 [ 3060.141459] ? __ia32_sys_sendfile+0x220/0x220 [ 3060.142457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3060.143612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3060.144742] do_syscall_64+0x33/0x40 [ 3060.145566] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3060.146685] RIP: 0033:0x7f19518bbb19 [ 3060.147513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3060.151581] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3060.153260] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3060.154808] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3060.156373] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3060.157933] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3060.159497] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:07:06 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000015c0)='./file0\x00', 0x1254c0, 0x100) openat(r0, &(0x7f0000001940)='./file0\x00', 0x4a00, 0x60) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/8250', 0x20400, 0x1c8) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x4440, 0x61) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x5a, 0x1, @scatter={0x9, 0x0, &(0x7f0000001640)=[{&(0x7f0000000100)=""/207, 0xcf}, {&(0x7f0000000200)=""/141, 0x8d}, {&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/113, 0x71}, {&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000014c0)=""/151, 0x97}, {&(0x7f0000001580)=""/6, 0x6}, {&(0x7f00000015c0)}]}, &(0x7f0000001700)="ed64c5f7181a1c95be1cae6e0646629393f7a53123f8603cee3ac4f7e2247d2007bcb6af3c9ab75f383fb490c893545b1d51e104f3fa9a24900c421c3a0708818ec2e32cfe680ff01aa26fe2eff55b91d152cf108592e1093c5e", &(0x7f0000001780)=""/201, 0x7, 0x10000, 0x1, &(0x7f0000001880)}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00'}) [ 3060.181610] FAULT_INJECTION: forcing a failure. [ 3060.181610] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.184406] CPU: 1 PID: 28255 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3060.185929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3060.187754] Call Trace: [ 3060.188322] dump_stack+0x107/0x167 [ 3060.189113] should_fail.cold+0x5/0xa [ 3060.189945] ? create_object.isra.0+0x3a/0xa20 [ 3060.190952] should_failslab+0x5/0x20 [ 3060.191792] kmem_cache_alloc+0x5b/0x310 [ 3060.192678] create_object.isra.0+0x3a/0xa20 [ 3060.193644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3060.194751] kmem_cache_alloc+0x159/0x310 [ 3060.195675] __es_insert_extent+0xed1/0x1370 [ 3060.196664] ext4_es_insert_extent+0x45d/0xf10 [ 3060.197673] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 3060.198614] ? lock_downgrade+0x6d0/0x6d0 [ 3060.199553] ? down_write_killable+0x180/0x180 [ 3060.200564] ext4_map_blocks+0x80b/0x1910 [ 3060.201483] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3060.202469] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3060.203514] ext4_getblk+0x144/0x680 [ 3060.204331] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3060.205419] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3060.206404] ? __brelse+0x84/0xa0 [ 3060.207167] ? __ext4_new_inode+0x148/0x5370 [ 3060.208136] ext4_bread+0x29/0x1f0 [ 3060.208915] ext4_append+0x228/0x4e0 [ 3060.209733] ? ext4_move_extents+0x3050/0x3050 [ 3060.210737] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3060.211816] ext4_init_new_dir+0x25e/0x4d0 [ 3060.212747] ? ext4_init_dot_dotdot+0x610/0x610 [ 3060.213778] ext4_mkdir+0x3c1/0xb10 [ 3060.214572] ? ext4_rmdir+0xf70/0xf70 [ 3060.215421] vfs_mkdir+0x493/0x750 [ 3060.216196] do_mkdirat+0x150/0x2b0 [ 3060.216994] ? user_path_create+0xf0/0xf0 [ 3060.217902] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3060.219051] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3060.220173] do_syscall_64+0x33/0x40 [ 3060.220979] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3060.222104] RIP: 0033:0x7fcc5971bb19 [ 3060.222923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3060.226960] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3060.228624] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3060.230188] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3060.231764] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3060.233329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3060.234884] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x3000000000000000) 20:07:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 26) 20:07:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x3e00000000000000) 20:07:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0x6a, 0xa8, @random="68a2fa4caae1db3133c25ebc4a30152755723e5e1d7cc74b51b602b62f7366bcfaf93e1340cb9d1ec0b310deea831a7201e641a245df6f91c334745ef8b823278873d6307c3b90722cda4fd426ed576f637682f7ded720574fe94f78a3860965c2620ea7f313"}, @DEVLINK_ATTR_PORT_INDEX={0x8}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x800) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x0, 0x200}) 20:07:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read(r0, &(0x7f0000000040)=""/44, 0x2c) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000080)=""/202, 0xca}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/243, 0xf3}, {&(0x7f00000002c0)=""/150, 0x96}], 0x4) 20:07:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x600) 20:07:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3074.841753] FAULT_INJECTION: forcing a failure. [ 3074.841753] name failslab, interval 1, probability 0, space 0, times 0 [ 3074.843034] CPU: 0 PID: 28388 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3074.843686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3074.844456] Call Trace: [ 3074.844707] dump_stack+0x107/0x167 [ 3074.845050] should_fail.cold+0x5/0xa [ 3074.845411] ? __alloc_skb+0x6d/0x5b0 [ 3074.845770] should_failslab+0x5/0x20 [ 3074.846503] kmem_cache_alloc_node+0x55/0x330 [ 3074.847457] __alloc_skb+0x6d/0x5b0 [ 3074.848149] alloc_skb_with_frags+0x92/0x570 [ 3074.848996] sock_alloc_send_pskb+0x7af/0x930 [ 3074.849773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28392 comm=syz-executor.4 [ 3074.849857] ? sk_alloc+0x350/0x350 [ 3074.851853] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3074.852303] ? lock_downgrade+0x6d0/0x6d0 [ 3074.852700] ? do_raw_spin_lock+0x121/0x260 [ 3074.853103] ? wait_for_completion_io+0x270/0x270 [ 3074.853551] ? rwlock_bug.part.0+0x90/0x90 [ 3074.853956] unix_stream_sendpage+0x245/0xcd0 [ 3074.854385] ? unix_dgram_connect+0xae0/0xae0 [ 3074.854806] ? trace_hardirqs_on+0x5b/0x180 [ 3074.855305] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3074.855969] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3074.856634] kernel_sendpage.part.0+0x146/0x290 [ 3074.857127] sock_sendpage+0xe5/0x140 [ 3074.857528] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3074.858030] pipe_to_sendpage+0x2af/0x380 [ 3074.858533] ? propagate_umount+0x1550/0x1550 [ 3074.863133] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3074.863826] __splice_from_pipe+0x43d/0x890 [ 3074.864384] ? propagate_umount+0x1550/0x1550 [ 3074.864961] generic_splice_sendpage+0xd5/0x140 [ 3074.865557] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3074.866105] ? security_file_permission+0xb1/0xe0 [ 3074.866726] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3074.867249] direct_splice_actor+0x10f/0x170 [ 3074.867779] splice_direct_to_actor+0x387/0x980 [ 3074.868310] ? pipe_to_sendpage+0x380/0x380 [ 3074.868817] ? do_splice_to+0x160/0x160 [ 3074.869275] ? security_file_permission+0xb1/0xe0 [ 3074.869844] do_splice_direct+0x1c4/0x290 [ 3074.870323] ? splice_direct_to_actor+0x980/0x980 [ 3074.870879] ? security_file_permission+0xb1/0xe0 [ 3074.871422] do_sendfile+0x553/0x11e0 [ 3074.871865] ? do_pwritev+0x270/0x270 [ 3074.872312] ? wait_for_completion_io+0x270/0x270 [ 3074.872867] ? rcu_read_lock_any_held+0x75/0xa0 [ 3074.873404] ? vfs_write+0x354/0xb10 [ 3074.873833] __x64_sys_sendfile64+0x1d1/0x210 [ 3074.874349] ? __ia32_sys_sendfile+0x220/0x220 [ 3074.874875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3074.875399] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3074.875881] do_syscall_64+0x33/0x40 [ 3074.876227] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3074.876704] RIP: 0033:0x7f19518bbb19 [ 3074.877056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3074.878772] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3074.879516] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3074.880173] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3074.880826] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3074.880845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28392 comm=syz-executor.4 [ 3074.881481] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3074.881489] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:07:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000002640)=""/4099, 0x1003}, {&(0x7f0000000040)=""/86, 0x56}], 0x3) [ 3074.924887] FAULT_INJECTION: forcing a failure. [ 3074.924887] name failslab, interval 1, probability 0, space 0, times 0 [ 3074.926033] CPU: 1 PID: 28385 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3074.926766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3074.927589] Call Trace: [ 3074.927869] dump_stack+0x107/0x167 [ 3074.928250] should_fail.cold+0x5/0xa [ 3074.928660] ? create_object.isra.0+0x3a/0xa20 [ 3074.929137] should_failslab+0x5/0x20 [ 3074.929535] kmem_cache_alloc+0x5b/0x310 [ 3074.929962] create_object.isra.0+0x3a/0xa20 [ 3074.930419] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3074.930954] kmem_cache_alloc+0x159/0x310 [ 3074.931380] __es_insert_extent+0xed1/0x1370 [ 3074.931853] ext4_es_insert_extent+0x45d/0xf10 [ 3074.932337] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 3074.932791] ? lock_downgrade+0x6d0/0x6d0 [ 3074.933243] ? down_write_killable+0x180/0x180 [ 3074.933734] ext4_map_blocks+0x80b/0x1910 [ 3074.934177] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3074.934648] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 3074.935149] ext4_getblk+0x144/0x680 [ 3074.935469] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3074.935891] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3074.936273] ? __brelse+0x84/0xa0 [ 3074.936570] ? __ext4_new_inode+0x148/0x5370 [ 3074.936948] ext4_bread+0x29/0x1f0 [ 3074.937253] ext4_append+0x228/0x4e0 [ 3074.937573] ? ext4_move_extents+0x3050/0x3050 [ 3074.937960] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3074.938377] ext4_init_new_dir+0x25e/0x4d0 [ 3074.938739] ? ext4_init_dot_dotdot+0x610/0x610 [ 3074.939168] ext4_mkdir+0x3c1/0xb10 [ 3074.939554] ? ext4_rmdir+0xf70/0xf70 [ 3074.939957] vfs_mkdir+0x493/0x750 [ 3074.940329] do_mkdirat+0x150/0x2b0 [ 3074.940707] ? user_path_create+0xf0/0xf0 [ 3074.941139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3074.941680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3074.942215] do_syscall_64+0x33/0x40 [ 3074.942604] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3074.943152] RIP: 0033:0x7fcc5971bb19 [ 3074.943545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3074.945461] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3074.946257] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3074.947014] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3074.947692] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3074.948438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3074.949185] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x3f00000000000000) 20:07:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x700) 20:07:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 27) 20:07:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) [ 3075.444447] FAULT_INJECTION: forcing a failure. [ 3075.444447] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.445750] CPU: 1 PID: 28511 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3075.446344] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3075.447095] Call Trace: [ 3075.447341] dump_stack+0x107/0x167 [ 3075.447657] should_fail.cold+0x5/0xa [ 3075.447987] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3075.448448] should_failslab+0x5/0x20 [ 3075.448781] __kmalloc_node+0x76/0x420 [ 3075.449118] ? lock_downgrade+0x6d0/0x6d0 [ 3075.449487] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3075.449927] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3075.450361] ? trace_hardirqs_on+0x5b/0x180 [ 3075.450733] kmem_cache_alloc_node+0x181/0x330 [ 3075.451156] __alloc_skb+0x6d/0x5b0 [ 3075.451485] alloc_skb_with_frags+0x92/0x570 [ 3075.451869] sock_alloc_send_pskb+0x7af/0x930 [ 3075.452274] ? sk_alloc+0x350/0x350 [ 3075.452596] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3075.453007] ? lock_downgrade+0x6d0/0x6d0 [ 3075.453364] ? do_raw_spin_lock+0x121/0x260 [ 3075.453734] ? wait_for_completion_io+0x270/0x270 [ 3075.454153] ? rwlock_bug.part.0+0x90/0x90 [ 3075.454535] unix_stream_sendpage+0x245/0xcd0 [ 3075.454939] ? unix_dgram_connect+0xae0/0xae0 [ 3075.455362] ? unix_dgram_connect+0xae0/0xae0 [ 3075.455761] kernel_sendpage.part.0+0x146/0x290 [ 3075.456167] sock_sendpage+0xe5/0x140 [ 3075.456500] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3075.456944] pipe_to_sendpage+0x2af/0x380 [ 3075.457301] ? propagate_umount+0x1550/0x1550 [ 3075.457688] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3075.458156] __splice_from_pipe+0x43d/0x890 [ 3075.458530] ? propagate_umount+0x1550/0x1550 [ 3075.458935] generic_splice_sendpage+0xd5/0x140 [ 3075.459361] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3075.459750] ? security_file_permission+0xb1/0xe0 [ 3075.460166] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3075.460559] direct_splice_actor+0x10f/0x170 [ 3075.460943] splice_direct_to_actor+0x387/0x980 [ 3075.461353] ? pipe_to_sendpage+0x380/0x380 [ 3075.461730] ? do_splice_to+0x160/0x160 [ 3075.462080] ? security_file_permission+0xb1/0xe0 [ 3075.462506] do_splice_direct+0x1c4/0x290 [ 3075.462867] ? splice_direct_to_actor+0x980/0x980 [ 3075.463311] ? security_file_permission+0xb1/0xe0 [ 3075.463739] do_sendfile+0x553/0x11e0 [ 3075.464075] ? do_pwritev+0x270/0x270 [ 3075.464404] ? wait_for_completion_io+0x270/0x270 [ 3075.464816] ? rcu_read_lock_any_held+0x75/0xa0 [ 3075.465211] ? vfs_write+0x354/0xb10 [ 3075.465537] __x64_sys_sendfile64+0x1d1/0x210 [ 3075.465921] ? __ia32_sys_sendfile+0x220/0x220 [ 3075.466313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3075.466760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3075.467219] do_syscall_64+0x33/0x40 [ 3075.467540] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3075.467973] RIP: 0033:0x7f19518bbb19 [ 3075.468294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3075.469840] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3075.470487] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3075.471110] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3075.471718] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3075.472325] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3075.472935] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3075.480958] FAULT_INJECTION: forcing a failure. [ 3075.480958] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.482181] CPU: 1 PID: 28514 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3075.482777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3075.483518] Call Trace: [ 3075.483747] dump_stack+0x107/0x167 [ 3075.484061] should_fail.cold+0x5/0xa [ 3075.484406] ? create_object.isra.0+0x3a/0xa20 [ 3075.484873] should_failslab+0x5/0x20 [ 3075.485195] kmem_cache_alloc+0x5b/0x310 [ 3075.485556] create_object.isra.0+0x3a/0xa20 [ 3075.485925] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3075.486372] kmem_cache_alloc+0x159/0x310 [ 3075.486745] jbd2_journal_add_journal_head+0x1a3/0x540 [ 3075.487220] jbd2_journal_get_create_access+0x40/0x560 [ 3075.487694] __ext4_journal_get_create_access+0x43/0x90 [ 3075.488171] ext4_getblk+0x318/0x680 [ 3075.488508] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3075.488954] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3075.489357] ? __brelse+0x84/0xa0 [ 3075.489656] ? __ext4_new_inode+0x148/0x5370 [ 3075.490035] ext4_bread+0x29/0x1f0 [ 3075.490350] ext4_append+0x228/0x4e0 [ 3075.490703] ? ext4_move_extents+0x3050/0x3050 [ 3075.491144] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3075.492295] ext4_init_new_dir+0x25e/0x4d0 [ 3075.492680] ? ext4_init_dot_dotdot+0x610/0x610 [ 3075.493095] ext4_mkdir+0x3c1/0xb10 [ 3075.493429] ? ext4_rmdir+0xf70/0xf70 [ 3075.493763] vfs_mkdir+0x493/0x750 [ 3075.494083] do_mkdirat+0x150/0x2b0 [ 3075.494408] ? user_path_create+0xf0/0xf0 [ 3075.494763] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3075.495229] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3075.495690] do_syscall_64+0x33/0x40 [ 3075.496014] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3075.496460] RIP: 0033:0x7fcc5971bb19 [ 3075.496787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3075.498371] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3075.499229] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3075.499840] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3075.500454] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3075.501060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3075.501678] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0xc2, 0x10040) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f0000000200)={0x5, 0x8001, 0xfffffffc, 0x100}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000080)={0xa24, 0x0, 0xff, 0x0, 0x101}) write$binfmt_elf64(r1, &(0x7f0000001640)={{0x7f, 0x45, 0x4c, 0x46, 0x36, 0x17, 0x81, 0x9, 0x9, 0x3, 0x6, 0x0, 0x9, 0x40, 0x216, 0x7, 0x7f, 0x38, 0x1, 0x80, 0xf7e, 0x4f4}, [{0x60000000, 0x7, 0x3f, 0x2, 0x55d1, 0x82b0, 0x7, 0x1c}], "cbac76ef702f8fbacbdcb5c358f9d903f4999d3909ae86e5e6df464ed27ce897b8a9c452624f1bc7bc70d79a7ac33202b6684b6c0b6da63e3dba1ccb45c1b32811f0880d7d6a15713b01928206a1477da058450401b1d44769044682a0e6691109a7ae95de95e9073adad54310791f3ec8f0ea15c82e93c63268d8", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7f3) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3ff, 0x9}}}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x3}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xfffa}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x800) 20:07:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x4000000000000000) 20:07:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/105, 0x69}, {&(0x7f00000000c0)=""/229, 0xe5}], 0x2) 20:07:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 28) 20:07:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 11) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x804) 20:07:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket(0x31, 0x800, 0x7) fallocate(r1, 0x39, 0xef0, 0x8001) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000003c0)) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000080)=""/35, 0x23}, {&(0x7f00000000c0)=""/205, 0xcd}, {&(0x7f00000001c0)=""/239, 0xef}, {&(0x7f00000002c0)=""/90, 0x5a}], 0x5) [ 3092.652868] FAULT_INJECTION: forcing a failure. [ 3092.652868] name failslab, interval 1, probability 0, space 0, times 0 [ 3092.659539] CPU: 0 PID: 28631 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3092.660177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3092.660940] Call Trace: [ 3092.661192] dump_stack+0x107/0x167 [ 3092.661533] should_fail.cold+0x5/0xa [ 3092.661889] ? create_object.isra.0+0x3a/0xa20 [ 3092.662316] should_failslab+0x5/0x20 [ 3092.662672] kmem_cache_alloc+0x5b/0x310 [ 3092.663052] ? create_object.isra.0+0x3ad/0xa20 [ 3092.663503] create_object.isra.0+0x3a/0xa20 [ 3092.663910] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3092.664383] __kmalloc_node+0x1ae/0x420 [ 3092.664758] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3092.665235] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3092.665696] ? trace_hardirqs_on+0x5b/0x180 [ 3092.666106] kmem_cache_alloc_node+0x181/0x330 [ 3092.666536] __alloc_skb+0x6d/0x5b0 [ 3092.666879] alloc_skb_with_frags+0x92/0x570 [ 3092.667306] sock_alloc_send_pskb+0x7af/0x930 [ 3092.667731] ? sk_alloc+0x350/0x350 [ 3092.668070] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3092.668518] ? lock_downgrade+0x6d0/0x6d0 [ 3092.668902] ? do_raw_spin_lock+0x121/0x260 [ 3092.669303] ? wait_for_completion_io+0x270/0x270 [ 3092.669749] ? rwlock_bug.part.0+0x90/0x90 [ 3092.670151] unix_stream_sendpage+0x245/0xcd0 [ 3092.670574] ? unix_dgram_connect+0xae0/0xae0 [ 3092.670993] ? trace_hardirqs_on+0x5b/0x180 [ 3092.671407] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3092.671882] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3092.672362] kernel_sendpage.part.0+0x146/0x290 [ 3092.672795] sock_sendpage+0xe5/0x140 [ 3092.673150] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3092.673612] pipe_to_sendpage+0x2af/0x380 [ 3092.674000] ? propagate_umount+0x1550/0x1550 [ 3092.674417] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3092.674913] __splice_from_pipe+0x43d/0x890 [ 3092.675329] ? propagate_umount+0x1550/0x1550 [ 3092.675753] generic_splice_sendpage+0xd5/0x140 [ 3092.676184] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3092.676602] ? security_file_permission+0xb1/0xe0 [ 3092.677050] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3092.677460] direct_splice_actor+0x10f/0x170 [ 3092.677871] splice_direct_to_actor+0x387/0x980 [ 3092.678307] ? pipe_to_sendpage+0x380/0x380 [ 3092.678708] ? do_splice_to+0x160/0x160 [ 3092.679088] ? security_file_permission+0xb1/0xe0 [ 3092.679546] do_splice_direct+0x1c4/0x290 [ 3092.679931] ? splice_direct_to_actor+0x980/0x980 [ 3092.680383] ? security_file_permission+0xb1/0xe0 [ 3092.680836] do_sendfile+0x553/0x11e0 [ 3092.681203] ? do_pwritev+0x270/0x270 [ 3092.681561] ? wait_for_completion_io+0x270/0x270 [ 3092.682012] ? rcu_read_lock_any_held+0x75/0xa0 [ 3092.682439] ? vfs_write+0x354/0xb10 20:07:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x4002000000000000) [ 3092.682791] __x64_sys_sendfile64+0x1d1/0x210 [ 3092.683221] ? __ia32_sys_sendfile+0x220/0x220 [ 3092.683649] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3092.684134] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3092.684613] do_syscall_64+0x33/0x40 [ 3092.684958] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3092.691564] RIP: 0033:0x7f19518bbb19 [ 3092.691908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3092.693569] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3092.694267] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3092.694914] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3092.695576] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3092.696225] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3092.696874] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:07:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3092.771739] FAULT_INJECTION: forcing a failure. [ 3092.771739] name failslab, interval 1, probability 0, space 0, times 0 [ 3092.772810] CPU: 0 PID: 28637 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3092.773445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3092.774209] Call Trace: [ 3092.774458] dump_stack+0x107/0x167 [ 3092.774801] should_fail.cold+0x5/0xa [ 3092.775182] ? create_object.isra.0+0x3a/0xa20 [ 3092.775612] should_failslab+0x5/0x20 [ 3092.775967] kmem_cache_alloc+0x5b/0x310 [ 3092.776351] create_object.isra.0+0x3a/0xa20 [ 3092.776762] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3092.777237] kmem_cache_alloc+0x159/0x310 [ 3092.777633] jbd2_journal_add_journal_head+0x1a3/0x540 [ 3092.778122] jbd2_journal_get_create_access+0x40/0x560 [ 3092.778617] __ext4_journal_get_create_access+0x43/0x90 [ 3092.779126] ext4_getblk+0x318/0x680 [ 3092.779485] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 3092.779948] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3092.780366] ? __brelse+0x84/0xa0 [ 3092.780691] ? __ext4_new_inode+0x148/0x5370 [ 3092.781106] ext4_bread+0x29/0x1f0 [ 3092.781441] ext4_append+0x228/0x4e0 [ 3092.781792] ? ext4_move_extents+0x3050/0x3050 [ 3092.782219] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 3092.782677] ext4_init_new_dir+0x25e/0x4d0 [ 3092.783074] ? ext4_init_dot_dotdot+0x610/0x610 [ 3092.783551] ext4_mkdir+0x3c1/0xb10 [ 3092.783896] ? ext4_rmdir+0xf70/0xf70 [ 3092.784258] vfs_mkdir+0x493/0x750 [ 3092.784590] do_mkdirat+0x150/0x2b0 [ 3092.784931] ? user_path_create+0xf0/0xf0 [ 3092.785324] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3092.785809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3092.786285] do_syscall_64+0x33/0x40 [ 3092.786630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3092.787136] RIP: 0033:0x7fcc5971bb19 [ 3092.787484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3092.789167] RSP: 002b:00007fcc56c91188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3092.789872] RAX: ffffffffffffffda RBX: 00007fcc5982ef60 RCX: 00007fcc5971bb19 [ 3092.790534] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 3092.791210] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3092.791871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3092.792526] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x90b) 20:07:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 29) 20:07:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_dev$sg(0x0, 0x0, 0x2001) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f00000008c0)={r2, 0x5, 0x80000001}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000040)={r2, 0x2, 0x1, [0x53, 0x3, 0x9, 0x773, 0x2c7], [0x7f, 0x0, 0x3, 0x6, 0x9, 0xe36, 0x5, 0x9, 0x2, 0x1, 0x0, 0x0, 0x8, 0x6, 0x9, 0x0, 0x8, 0x2308, 0x9, 0x1, 0x6, 0x3, 0x4, 0x6, 0x2f9fd6ff, 0x6, 0x100, 0x1, 0xb8, 0x4, 0x0, 0x4, 0x40, 0x0, 0x8001, 0x1, 0x400, 0xfffffffffffffffb, 0x8000, 0x1, 0xfffffffffffffffc, 0x8, 0x20000000, 0x5, 0xfffffffffffffff8, 0x100000000, 0x8, 0x3, 0x0, 0x3f, 0x8, 0xa0, 0x8, 0x6, 0x1ff, 0x8000, 0x8, 0x40, 0x6, 0xcb, 0x3b1, 0x401, 0x4, 0x200, 0x4, 0x3ff, 0x10000, 0x6, 0x56f, 0xfff, 0x5, 0x7fff, 0x8, 0x1, 0x8, 0x1f, 0x4448, 0x0, 0x1, 0x0, 0xa400000000, 0x8, 0x1, 0x2, 0xff, 0x6, 0x1000, 0x9, 0x9, 0x80000000, 0x3, 0x2, 0xb3, 0xfffffffffffffffe, 0x1000, 0x4, 0xffffffffffff363c, 0x2, 0x9, 0xfffffffffffffffa, 0x9, 0x101, 0x91c2, 0xff, 0x87, 0x100, 0x8, 0x8, 0x4, 0x3, 0x8, 0x3, 0x5, 0x0, 0x800, 0x4, 0xe, 0x0, 0x1000, 0x1, 0x100000001]}) 20:07:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) fallocate(r1, 0x4e, 0x7, 0x3) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)={0x3}) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) close(r2) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xe803000000000000) [ 3093.801628] FAULT_INJECTION: forcing a failure. [ 3093.801628] name failslab, interval 1, probability 0, space 0, times 0 [ 3093.802759] CPU: 0 PID: 28757 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3093.807308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3093.808064] Call Trace: [ 3093.808313] dump_stack+0x107/0x167 [ 3093.808651] should_fail.cold+0x5/0xa [ 3093.809005] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3093.809490] should_failslab+0x5/0x20 [ 3093.809842] __kmalloc_node+0x76/0x420 [ 3093.810204] ? lock_downgrade+0x6d0/0x6d0 [ 3093.810590] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3093.811058] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3093.811537] ? trace_hardirqs_on+0x5b/0x180 [ 3093.811938] kmem_cache_alloc_node+0x181/0x330 [ 3093.812364] __alloc_skb+0x6d/0x5b0 [ 3093.812703] alloc_skb_with_frags+0x92/0x570 [ 3093.813116] sock_alloc_send_pskb+0x7af/0x930 [ 3093.813540] ? sk_alloc+0x350/0x350 [ 3093.813877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3093.814317] ? lock_downgrade+0x6d0/0x6d0 [ 3093.814699] ? do_raw_spin_lock+0x121/0x260 [ 3093.815106] ? wait_for_completion_io+0x270/0x270 [ 3093.815553] ? rwlock_bug.part.0+0x90/0x90 [ 3093.815953] unix_stream_sendpage+0x245/0xcd0 [ 3093.816374] ? unix_dgram_connect+0xae0/0xae0 [ 3093.816790] ? trace_hardirqs_on+0x5b/0x180 [ 3093.817187] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3093.817659] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3093.818128] kernel_sendpage.part.0+0x146/0x290 [ 3093.818558] sock_sendpage+0xe5/0x140 [ 3093.818911] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3093.819385] pipe_to_sendpage+0x2af/0x380 [ 3093.819768] ? propagate_umount+0x1550/0x1550 [ 3093.820181] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3093.820673] __splice_from_pipe+0x43d/0x890 [ 3093.821072] ? propagate_umount+0x1550/0x1550 [ 3093.821490] generic_splice_sendpage+0xd5/0x140 [ 3093.821916] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3093.822335] ? security_file_permission+0xb1/0xe0 [ 3093.822781] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3093.823201] direct_splice_actor+0x10f/0x170 [ 3093.823611] splice_direct_to_actor+0x387/0x980 [ 3093.824044] ? pipe_to_sendpage+0x380/0x380 [ 3093.824446] ? do_splice_to+0x160/0x160 [ 3093.824815] ? security_file_permission+0xb1/0xe0 [ 3093.825264] do_splice_direct+0x1c4/0x290 [ 3093.825647] ? splice_direct_to_actor+0x980/0x980 [ 3093.826096] ? security_file_permission+0xb1/0xe0 [ 3093.826547] do_sendfile+0x553/0x11e0 [ 3093.826905] ? do_pwritev+0x270/0x270 [ 3093.827284] ? wait_for_completion_io+0x270/0x270 [ 3093.827735] ? rcu_read_lock_any_held+0x75/0xa0 [ 3093.828165] ? vfs_write+0x354/0xb10 [ 3093.828521] __x64_sys_sendfile64+0x1d1/0x210 [ 3093.828940] ? __ia32_sys_sendfile+0x220/0x220 [ 3093.829368] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3093.829852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3093.830331] do_syscall_64+0x33/0x40 [ 3093.830677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3093.831165] RIP: 0033:0x7f19518bbb19 [ 3093.831512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3093.833197] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3093.833902] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3093.834559] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3093.835232] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3093.835889] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3093.836548] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 [ 3093.909420] FAULT_INJECTION: forcing a failure. [ 3093.909420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3093.910770] CPU: 0 PID: 28761 Comm: syz-executor.3 Not tainted 5.10.226 #1 [ 3093.911418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3093.912174] Call Trace: [ 3093.912421] dump_stack+0x107/0x167 [ 3093.919439] should_fail.cold+0x5/0xa [ 3093.919795] _copy_from_user+0x2e/0x1b0 [ 3093.920167] kstrtouint_from_user+0xbd/0x220 [ 3093.920572] ? kstrtou8_from_user+0x210/0x210 [ 3093.920989] ? lock_acquire+0x197/0x470 [ 3093.921355] ? ksys_write+0x12d/0x260 [ 3093.921716] proc_fail_nth_write+0x78/0x220 [ 3093.922113] ? proc_task_getattr+0x1f0/0x1f0 [ 3093.922525] ? proc_task_getattr+0x1f0/0x1f0 [ 3093.922928] vfs_write+0x29a/0xb10 [ 3093.923275] ksys_write+0x12d/0x260 [ 3093.923611] ? __ia32_sys_read+0xb0/0xb0 [ 3093.923989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3093.924471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3093.924946] do_syscall_64+0x33/0x40 [ 3093.925289] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3093.925756] RIP: 0033:0x7fcc596ce5ff [ 3093.926098] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 3093.927790] RSP: 002b:00007fcc56c91170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 3093.928488] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcc596ce5ff [ 3093.929143] RDX: 0000000000000001 RSI: 00007fcc56c911e0 RDI: 0000000000000004 [ 3093.929795] RBP: 00007fcc56c911d0 R08: 0000000000000000 R09: 0000000000000000 [ 3093.930446] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3093.931104] R13: 00007ffcf279409f R14: 00007fcc56c91300 R15: 0000000000022000 20:07:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xeffdffff00000000) 20:07:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="b1a92dbd7000ffdbdf2521000000050020000000000005002000000000000c00050000000000000000000500200001000000"], 0x38}}, 0x2000) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 13) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) 20:07:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) socketpair(0x2, 0x80000, 0xfffffff7, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000080)) 20:07:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x90c) [ 3108.419896] FAULT_INJECTION: forcing a failure. [ 3108.419896] name failslab, interval 1, probability 0, space 0, times 0 [ 3108.420990] CPU: 0 PID: 28883 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3108.421624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3108.422384] Call Trace: [ 3108.422638] dump_stack+0x107/0x167 [ 3108.422983] should_fail.cold+0x5/0xa [ 3108.423355] ? create_object.isra.0+0x3a/0xa20 [ 3108.423784] should_failslab+0x5/0x20 [ 3108.424150] kmem_cache_alloc+0x5b/0x310 [ 3108.424537] create_object.isra.0+0x3a/0xa20 [ 3108.424948] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3108.425423] __kmalloc_node+0x1ae/0x420 [ 3108.425792] ? kfree+0xd7/0x340 [ 3108.426109] kvmalloc_node+0xc0/0x170 [ 3108.426467] seq_read_iter+0x443/0x12b0 [ 3108.426853] proc_reg_read_iter+0x20a/0x2e0 [ 3108.427268] generic_file_splice_read+0x455/0x6d0 [ 3108.427720] ? pipe_to_user+0x170/0x170 [ 3108.428100] ? fsnotify_perm.part.0+0x22d/0x620 [ 3108.428540] ? security_file_permission+0xb1/0xe0 [ 3108.428994] ? pipe_to_user+0x170/0x170 [ 3108.429370] do_splice_to+0x10e/0x160 [ 3108.429729] splice_direct_to_actor+0x2fe/0x980 [ 3108.430166] ? pipe_to_sendpage+0x380/0x380 [ 3108.430574] ? do_splice_to+0x160/0x160 [ 3108.430949] ? security_file_permission+0xb1/0xe0 [ 3108.431418] do_splice_direct+0x1c4/0x290 [ 3108.431807] ? splice_direct_to_actor+0x980/0x980 [ 3108.432265] ? security_file_permission+0xb1/0xe0 [ 3108.432723] do_sendfile+0x553/0x11e0 [ 3108.433089] ? do_pwritev+0x270/0x270 [ 3108.433452] ? wait_for_completion_io+0x270/0x270 [ 3108.433904] ? rcu_read_lock_any_held+0x75/0xa0 [ 3108.434335] ? vfs_write+0x354/0xb10 [ 3108.434689] __x64_sys_sendfile64+0x1d1/0x210 [ 3108.435113] ? __ia32_sys_sendfile+0x220/0x220 [ 3108.435562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3108.436045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3108.436526] do_syscall_64+0x33/0x40 [ 3108.436878] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3108.437355] RIP: 0033:0x7f19518bbb19 [ 3108.437704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3108.439414] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3108.440123] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3108.440787] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3108.441444] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3108.442099] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3108.442761] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:07:54 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x303) clone3(&(0x7f0000001280)={0x0, &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100), {0x2e}, &(0x7f0000001140)=""/113, 0x71, &(0x7f00000011c0)=""/116, &(0x7f0000001240)=[0x0], 0x1, {r1}}, 0x58) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x0, &(0x7f0000000040), 0x1000, &(0x7f0000001080)=ANY=[]) r3 = getpgrp(0x0) ptrace(0x10, r3) kcmp(0x0, r3, 0x1, r0, r2) fcntl$setown(0xffffffffffffffff, 0x8, r3) waitid(0x0, r3, 0x0, 0x8, 0x0) r4 = syz_open_procfs(r3, &(0x7f00000014c0)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f0000002680)=""/4102, 0x1006}], 0x1) 20:07:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r1) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:07:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x2) 20:07:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xf401000000000000) 20:07:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:07:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:07:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x90d) [ 3109.026038] FAULT_INJECTION: forcing a failure. [ 3109.026038] name failslab, interval 1, probability 0, space 0, times 0 [ 3109.027395] CPU: 0 PID: 29006 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3109.028075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3109.028875] Call Trace: [ 3109.029157] dump_stack+0x107/0x167 [ 3109.029533] should_fail.cold+0x5/0xa [ 3109.029922] ? kvmalloc_node+0xc0/0x170 [ 3109.030332] ? kvmalloc_node+0xc0/0x170 [ 3109.030743] should_failslab+0x5/0x20 [ 3109.031136] __kmalloc_node+0x76/0x420 [ 3109.031548] ? kfree+0xd7/0x340 [ 3109.031903] kvmalloc_node+0xc0/0x170 [ 3109.032291] seq_read_iter+0x443/0x12b0 [ 3109.032724] proc_reg_read_iter+0x20a/0x2e0 [ 3109.033167] generic_file_splice_read+0x455/0x6d0 [ 3109.033651] ? pipe_to_user+0x170/0x170 [ 3109.034071] ? fsnotify_perm.part.0+0x22d/0x620 [ 3109.034548] ? security_file_permission+0xb1/0xe0 [ 3109.035046] ? pipe_to_user+0x170/0x170 [ 3109.035473] do_splice_to+0x10e/0x160 [ 3109.035869] splice_direct_to_actor+0x2fe/0x980 [ 3109.036346] ? pipe_to_sendpage+0x380/0x380 [ 3109.036783] ? do_splice_to+0x160/0x160 [ 3109.037195] ? security_file_permission+0xb1/0xe0 [ 3109.037691] do_splice_direct+0x1c4/0x290 [ 3109.038109] ? splice_direct_to_actor+0x980/0x980 [ 3109.038610] ? security_file_permission+0xb1/0xe0 [ 3109.039107] do_sendfile+0x553/0x11e0 [ 3109.039530] ? do_pwritev+0x270/0x270 [ 3109.039936] ? wait_for_completion_io+0x270/0x270 [ 3109.040431] ? rcu_read_lock_any_held+0x75/0xa0 [ 3109.040891] ? vfs_write+0x354/0xb10 [ 3109.041284] __x64_sys_sendfile64+0x1d1/0x210 [ 3109.041745] ? __ia32_sys_sendfile+0x220/0x220 [ 3109.042216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3109.042744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3109.043278] do_syscall_64+0x33/0x40 [ 3109.043664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3109.044174] RIP: 0033:0x7f19518bbb19 [ 3109.044567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3109.046318] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3109.047066] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3109.047765] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3109.050670] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3109.051487] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3109.052236] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:07:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x3) 20:07:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/sockcreate\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) dup3(r1, r0, 0x80000) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xaec373b6bac03a2c) lseek(r2, 0x8000, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$FICLONE(r3, 0x40049409, r5) 20:07:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x90e) 20:07:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfdffffff00000000) 20:07:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:07:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x4) 20:08:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, 'mounts\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @remote}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x810) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600), 0x1) 20:08:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x5) 20:08:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xfeffffff00000000) 20:08:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x90f) 20:08:10 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000480)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = timerfd_create(0x4, 0x800) timerfd_settime(r0, 0x1, &(0x7f0000001540)={{0x0, 0x3938700}, {0x0, 0x989680}}, &(0x7f0000001580)) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x80, 0xd9bf, 0x2, 0x3e, 0x8, 0xa0, 0x40, 0x33d, 0x1f, 0x7f, 0x38, 0x2, 0xa6, 0x81, 0x5}, [{0x6474e551, 0x9, 0x3, 0x2, 0xb38, 0x4, 0x100000000, 0x5}, {0x59352458495c9768, 0x4, 0xc30, 0x2, 0x0, 0x1, 0x2, 0x1}], "3a4155b664b7ead4742a9fb53f5a3ab09b389195214768b6655c489d69f9898f70b06c3570ac3d0000004a68acff07f8667e4bc28f1b2bb2aeb70038a19a0611fcf644f7a0dd98f88f4d07a575f206000000000000", ['\x00', '\x00', '\x00']}, 0x405) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001640)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="2eef49f35cc4595def77826e99241464cf1485ba4c002f85e209b7d0effbe0ac8e082942f2d52839e6"], 0x28}}, 0x0) bind(r3, &(0x7f00000014c0)=@in6={0xa, 0x4e20, 0xff, @private0, 0xfffffff8}, 0x80) r4 = open_tree(r0, &(0x7f00000015c0)='./file0\x00', 0x8000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f00000016c0)=0x6, 0x4) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 3124.506221] FAULT_INJECTION: forcing a failure. [ 3124.506221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3124.511683] CPU: 0 PID: 29258 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3124.515841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3124.516605] Call Trace: [ 3124.516853] dump_stack+0x107/0x167 [ 3124.517192] should_fail.cold+0x5/0xa [ 3124.517569] __alloc_pages_nodemask+0x182/0x600 [ 3124.518025] ? __lock_acquire+0xbb1/0x5b00 [ 3124.518420] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3124.518986] ? perf_trace_lock+0xac/0x490 [ 3124.523416] alloc_pages_current+0x187/0x280 [ 3124.523829] ? __lockdep_reset_lock+0x180/0x180 [ 3124.524261] push_pipe+0x2b5/0x6d0 [ 3124.524601] _copy_to_iter+0x509/0x12d0 [ 3124.524974] ? __virt_addr_valid+0x346/0x5d0 [ 3124.525388] ? lock_downgrade+0x6d0/0x6d0 [ 3124.525773] ? timer_list_start+0x2e0/0x2e0 [ 3124.526182] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3124.526647] ? __check_object_size+0x319/0x440 [ 3124.527075] seq_read_iter+0xdcb/0x12b0 [ 3124.527498] proc_reg_read_iter+0x20a/0x2e0 [ 3124.527902] generic_file_splice_read+0x455/0x6d0 [ 3124.528354] ? pipe_to_user+0x170/0x170 [ 3124.528731] ? fsnotify_perm.part.0+0x22d/0x620 [ 3124.529166] ? security_file_permission+0xb1/0xe0 [ 3124.529613] ? pipe_to_user+0x170/0x170 [ 3124.529989] do_splice_to+0x10e/0x160 [ 3124.530346] splice_direct_to_actor+0x2fe/0x980 [ 3124.530779] ? pipe_to_sendpage+0x380/0x380 [ 3124.531181] ? do_splice_to+0x160/0x160 [ 3124.531589] ? security_file_permission+0xb1/0xe0 [ 3124.532043] do_splice_direct+0x1c4/0x290 [ 3124.532428] ? splice_direct_to_actor+0x980/0x980 [ 3124.532881] ? security_file_permission+0xb1/0xe0 [ 3124.533340] do_sendfile+0x553/0x11e0 [ 3124.533702] ? do_pwritev+0x270/0x270 [ 3124.534060] ? wait_for_completion_io+0x270/0x270 [ 3124.534509] ? rcu_read_lock_any_held+0x75/0xa0 [ 3124.534937] ? vfs_write+0x354/0xb10 [ 3124.535321] __x64_sys_sendfile64+0x1d1/0x210 [ 3124.535740] ? __ia32_sys_sendfile+0x220/0x220 [ 3124.536170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3124.536653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3124.537131] do_syscall_64+0x33/0x40 [ 3124.537477] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3124.537948] RIP: 0033:0x7f19518bbb19 [ 3124.538293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3124.540001] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3124.540702] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3124.541356] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3124.542008] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3124.542660] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3124.543342] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:08:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/connector\x00') r1 = syz_io_uring_setup(0xe57, &(0x7f0000000100)={0x0, 0x8c94, 0x8, 0x0, 0x32f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$int_in(r1, 0x5421, &(0x7f0000000200)=0x40) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/6, 0x6}], 0x1) r2 = open_tree(r0, &(0x7f00000000c0)='./file0\x00', 0x8100) lseek(r2, 0x1, 0x0) ioctl$CDROM_SELECT_DISK(r2, 0x5322, 0x4) 20:08:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x6) 20:08:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x910) 20:08:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 16) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:25 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x19, 0x1d}, 0x80000001) syz_io_uring_setup(0x3a75, &(0x7f0000000300), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r7, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) syz_io_uring_submit(r2, r6, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r0, &(0x7f00000001c0)=0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0, 0x800, 0x1}, 0x245) r8 = creat(&(0x7f0000000200)='./file0\x00', 0x3c) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) r10 = socket(0x8, 0x6, 0x6) ioctl$sock_FIOGETOWN(r10, 0x8903, &(0x7f0000000180)) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r9, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r9, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r9, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8811) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r11, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:08:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xffff000000000000) [ 3139.447714] FAULT_INJECTION: forcing a failure. [ 3139.447714] name failslab, interval 1, probability 0, space 0, times 0 [ 3139.449008] CPU: 0 PID: 29378 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3139.449695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3139.450470] Call Trace: [ 3139.450722] dump_stack+0x107/0x167 [ 3139.451061] should_fail.cold+0x5/0xa [ 3139.451437] ? kvmalloc_node+0xc0/0x170 [ 3139.451806] should_failslab+0x5/0x20 [ 3139.452161] __kmalloc_node+0x76/0x420 [ 3139.452520] ? kfree+0xd7/0x340 [ 3139.452830] kvmalloc_node+0xc0/0x170 [ 3139.453184] seq_read_iter+0x443/0x12b0 [ 3139.453565] proc_reg_read_iter+0x20a/0x2e0 [ 3139.453965] generic_file_splice_read+0x455/0x6d0 [ 3139.454415] ? pipe_to_user+0x170/0x170 [ 3139.454789] ? fsnotify_perm.part.0+0x22d/0x620 [ 3139.455221] ? security_file_permission+0xb1/0xe0 [ 3139.455712] ? pipe_to_user+0x170/0x170 [ 3139.456096] do_splice_to+0x10e/0x160 [ 3139.456451] splice_direct_to_actor+0x2fe/0x980 [ 3139.456882] ? pipe_to_sendpage+0x380/0x380 [ 3139.457281] ? do_splice_to+0x160/0x160 [ 3139.457650] ? security_file_permission+0xb1/0xe0 [ 3139.458097] do_splice_direct+0x1c4/0x290 [ 3139.458479] ? splice_direct_to_actor+0x980/0x980 [ 3139.458929] ? security_file_permission+0xb1/0xe0 [ 3139.459413] do_sendfile+0x553/0x11e0 [ 3139.459776] ? do_pwritev+0x270/0x270 [ 3139.460133] ? wait_for_completion_io+0x270/0x270 [ 3139.460585] ? rcu_read_lock_any_held+0x75/0xa0 [ 3139.461013] ? vfs_write+0x354/0xb10 [ 3139.461363] __x64_sys_sendfile64+0x1d1/0x210 [ 3139.461778] ? __ia32_sys_sendfile+0x220/0x220 [ 3139.462202] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3139.462684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3139.463161] do_syscall_64+0x33/0x40 [ 3139.463538] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3139.464010] RIP: 0033:0x7f19518bbb19 [ 3139.464356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3139.466034] RSP: 002b:00007f194ee31188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3139.466730] RAX: ffffffffffffffda RBX: 00007f19519cef60 RCX: 00007f19518bbb19 [ 3139.471417] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3139.472074] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3139.472726] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3139.473383] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:08:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) 20:08:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xffffff7f00000000) 20:08:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x911) [ 3139.591643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29385 comm=syz-executor.0 20:08:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 17) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x7) [ 3139.649535] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29497 comm=syz-executor.0 20:08:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001800210800000000000000000200000008000200000000000c00098008000000335934139345a537ffc18364a1421bcacab64b068da28946f1847670614c3bb17c6676bb556381eaf47ab10d8ae41cff3b75d2ed72e567fb7fff0328f9aaffac1a6cdacf693ac172c38e19e3dfb1d61c28bc828991e97403a8063885a02579cd604a2749ee9d2926227d7ed7c8a59b14dd24e0a541b7a83f35d83414ce2552707e59f44ddf62afd1208dad819900cac378d0d2b74422eec8d249747d6600d23b5dd981a6b83d3dad5ddb7660ab4805ecea805446acb30bf71351dab68b1c5924d9a20741208393354abd7ed315f8bc0c024f163e", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) signalfd4(r1, &(0x7f0000000040)={[0x2]}, 0x8, 0x80800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r4, 0x301, 0x0, 0x0, {{0x15}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r4, 0x200, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x96, 0x54}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r9, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) syz_io_uring_submit(0x0, r8, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x5, 0x0, @fd=r0, 0x80000001, {0x0, r5}, 0xea3, 0xc, 0x0, {0x0, 0x0, r5}}, 0x8) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r10, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 3140.802927] FAULT_INJECTION: forcing a failure. [ 3140.802927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3140.808673] CPU: 0 PID: 29561 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 3140.809453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3140.810213] Call Trace: [ 3140.810468] dump_stack+0x107/0x167 [ 3140.810810] should_fail.cold+0x5/0xa [ 3140.811177] _copy_from_user+0x2e/0x1b0 [ 3140.811572] kstrtouint_from_user+0xbd/0x220 [ 3140.811983] ? kstrtou8_from_user+0x210/0x210 [ 3140.812406] ? lock_acquire+0x197/0x470 [ 3140.812776] ? ksys_write+0x12d/0x260 [ 3140.813141] proc_fail_nth_write+0x78/0x220 [ 3140.813545] ? proc_task_getattr+0x1f0/0x1f0 [ 3140.813960] ? proc_task_getattr+0x1f0/0x1f0 [ 3140.814368] vfs_write+0x29a/0xb10 [ 3140.814706] ksys_write+0x12d/0x260 [ 3140.815044] ? __ia32_sys_read+0xb0/0xb0 [ 3140.815453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3140.815942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3140.816424] do_syscall_64+0x33/0x40 [ 3140.816772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3140.817246] RIP: 0033:0x7f195186e5ff [ 3140.817594] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 3140.819283] RSP: 002b:00007f194ee31170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 3140.820007] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f195186e5ff [ 3140.820667] RDX: 0000000000000001 RSI: 00007f194ee311e0 RDI: 0000000000000007 [ 3140.821326] RBP: 00007f194ee311d0 R08: 0000000000000000 R09: 0000000000000000 [ 3140.821985] R10: 000000000000ffff R11: 0000000000000293 R12: 0000000000000002 [ 3140.822645] R13: 00007ffc9685c29f R14: 00007f194ee31300 R15: 0000000000022000 20:08:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') write$binfmt_elf64(r0, &(0x7f0000001640)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0xb9, 0x0, 0x3f, 0xfff, 0x3, 0x3e, 0x2, 0x2a7, 0x40, 0x1be, 0x2b8, 0x9, 0x38, 0x1, 0x5cb, 0x0, 0x7}, [{0x3, 0x4, 0x0, 0x8, 0x7fffffff, 0xffffffffffffff81, 0x1, 0xfc}], "acfefbade35ea8a41d231866a08ddde799f71938dae930a5f37514813759dae838fd85e36bbd50454022438a9c49ea4df91c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xaaa) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x3ff, 0x1, [0x2, 0x7, 0x6de, 0x41]}) 20:08:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x8) 20:08:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0xffffffff00000000) 20:08:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x912) 20:08:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000000c0), &(0x7f0000000100)={'L-', 0x2}, 0x16, 0x3) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x18, 0xc21, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) r3 = getpgid(0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x404000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001640)={0x13d4, 0x14, 0x400, 0x70bd2d, 0x25dfdbff, {0x12}, [@typed={0x8, 0x33, 0x0, 0x0, @pid=r3}, @typed={0xc, 0x68, 0x0, 0x0, @u64=0x3f77}, @generic="f91c62beddb6abd20c8bc52bdf4144136be99e67a0c74c4f930546af14927c05f812e371682582f16ef230e37b43a5bb60465719323c5dbbe97e5bd1f034e72567a013", @nested={0x190, 0x62, 0x0, 0x1, [@generic="403a4a123f1c481c6d173423f4ab5d1e31e1edf61de03c19e30642d0d3138b1a98ce14d9c76b60772754271ae74dee49ee13d363a8c3a03fb186b5d0d238d3f639d8daca85bfffa5b27f956c314ceeab5fa3c1fc3512d0ac8317540636faea2aa9eea6d3b3599c7079b3d2fbb60cad49b3da82554233b696895957cd94e181bf7fcc14f0c219519d9ac289d00ab622e4c5d04709f3c23dd409d7e0f202664664c5148a1fa625ce81391fa18f5a9df20ac7646cd021f2ebd45e58f4e8a2de9ee393ea3004590e3987d60f5e42cd78a1940a29a3801bcc885f118ebaacde1982b4a5902da285c19ae86fe1bfdfedb07f95", @generic="843bebcfc5edb54c0efc2044a686246b1c44ed50d99157c320ee2c0126b08fa551fb04bee8d3e339e6e76e2beba462d5b70aaa61b41a8d89847341d50b5ac1004ab29bd175b7e18bdad1c9ce45bb8eba951bdcff9801604e52ad4b7ae7d301128515ac3dbf71bd283834f48b02142bbb1c15e84647295f3afc76aef11f8ddcb02b7c9a734ddd153936571ea103f3416f066f59d7", @typed={0x8, 0x19, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x11c7, 0x6, 0x0, 0x1, [@typed={0x4, 0x63}, @typed={0x8, 0x3, 0x0, 0x0, @fd=r4}, @generic="0d1592efcb6b2c686e928bc78a2ae0733a9f3bbecf758279ac8de266b52afe1af7a8", @generic="554e913634b35f3ad824cecd0df85c8efe698eba62643dc3e9e348d2efc05d645683a362323f6d104ef64518475351ee19934e79637324fd87d43edd8c9bd0a74b7005c719fd3551b1da33870f56bbf412b27c0eb9ef35e5ce8129cf8e42a394bcd5e7eb1c3cba211e1452a25ec9aad7a6e01ce39213bce30221d8fc52012a4d6b300e1001c88aeda2b67897dd119aa1042f208345678f16c7a418c9109888cfa56c3eff9784013138b5f2c1d7097606e034c5ccb5e4e4ba5996739edd1a6ffe901a19736f", @generic="99155abce25711a0c303d9e69450589f55dc721c84cf70f40d312a9c08af75d2c3690f3c5eb22db2543c371f90765197d134d43577734596b06885dff2f1a77b4049a53fc52926fd67e4a82e283e7ac4a6a946c0b8e157b483e70c6d5945f728f3ee3d570b77966cc298511b03c74a96b4ce1211a0a665dfa9c67267fb1818b52b2a59ff77750bb2662a5db647af574ee635161e56d544714021af9c525f755a51ebc6171f67d3fb57ddc314ec43ec4ac76f0f5660479c8e108cc88b0f7db71eb9b92b825e071cb7d7efa450e50d234b", @generic="146952c87b2ddf01ea518b221dd05cbff4c9a89ae81ef7198a797e580244bdcb9fff967b332e1969b958b7f90f7575ac5ce52443ce398c90c7658e1a1181c592f42f2f3426d9f95bf7879843990f5c4cccf3cdbf0b61d3f5b863610d6140c5417200e5fdf546d40370a4a70eebd55d4142215eaf597929ece86bd4e5e921a38e8cd7b21a2d2141ccb0d3ee1201f48f777fa75396bc493d6dfc6360f4707516fb52eafb4202992b07e3a7ca5175772709b14d5f76da622272ff4961ce42b3452201eb553b6000f8619269a6e92f73b4032417b26442dacfdb120090225f3d99beb6d77dcb297efa40f65459533b410c8857aab135b5225e052cfe337a3ff2f897b81e2fae6728dcb7bd4d1b5fd4262173786b2547db2ea9eebad98770f19ff92b4e376c3c56be06e235c633a0761697602a68aa6d21144bfcfccc149bfb314d72ff5e0f72aefe479d9290ef7cbcc7fa5c6f06cad03956fa7ca05f17ae0a3e27265c647b9d65779fd28c3d649345163287187c76ecde2a0ba1b8548961688249fc1f5c905d4073939c5c75a0a57efe7b6071e4e853dd31fa2861002c8d68de67abfb4f1748a3ee73d976acd933b8d984525a0517ae963ed14b975af86223a94b5c802593f62742e70264f1f1dc0e8b5984e72b1153a244a8278ad0e36b90d8b974bb056f67e729e63c3557f8b9164d7af1c92d6ee98ec2cf1643bd9ef00709531e29fe1091df7c94c6004416e8a56a4cf70e2d29e115928592fe6ca46a450a3d40c94eaf9687fcdd45401a4fe1c1dc65104bb50a679434811acf78b37e67e625eec07105387eaddcd60c79843354b55dd0d0067ac7499da298829fb43a6ba8300ec6c2cf45fe1957e4ce2c81347f67fd1cef05fe64bb5d90294c0b9667d803e2d286aff7aa1af794c5f96f4d98d7dd2fa5e1449f5e96cc045b01eb8fb22744917090a0190f2dd68cf2aff944c69cc42b339ec90f23a977e32c3dd8b93a737e1bf65240030df46b4241ef3f69e43881eb8d7edfd5ec70512fd06e39d6dafeb21ae65b9a463f74e41058fb78e2e55f1f4f381b0f9c2bb02597e39f954c682e2c48cddbc56f7083bac9b3bd0e0f13672f12056b8975ebf401ee930f6212599ceb8c4ee364688ae10ef317fca556d4ddf90d61577cb2f17056d8f046d13dae1e5b9a1be8c88034e68e74786e29cceebf746f7d9872a7bb5bddb208d53ff4c4264c4c16efffb5e1f0265560e59dfe88618c1ba979eb09aa74a70712be559c73d379934b535c425522c240c6f080ab0d7d6f630c3b301d18be66f490920e0b49ca254f2e04f1b64e5ddd6a96ecf1674c7a21a101765a71536528532d51c6a84e04c4eb87981a66749a494a706aa26bff50a6053472c92ce137000dfa9678a1d166827d0aea0e3c156003ee8b450ede55d979128bca44ed23706f0c715928064bc4c7ca4b883358401924fe0e9078c80542b27ea3d2f37406af5405610eb67132bcb28c932afe7f9c2ddc045385003f21e5f670747af5b70bce8a357de8e010e6ac966ec966c7e39a1b57920d473e8a53fb994d644856b20ff6b5a5b8360c1ad4f81292987ba8048637efa3b34dec289a2f73445b4418e1ca7476b953cd8a0743929ecce5f7288191a652ed482c0d365e503889df015ec4d68aa3dc103fa3fe13f3a35d247e40689bc69b3d000a174260fe28f520357fb900ec0076ec36a02cd3f4aa2f67c345a06f6cbd0c2159d3fb27b602e1da8d977e22d12b73967b0009430333788be36a7447d9ccc6066ae31178af96285e4e8a6dd3e2645ef077d5c1059a6aeaa32ce3531bfafc62bc6b9deea20feffb6914975602b7fd513ce649b23c835da8d1e3d6006972f196f5a0779aa9b3a7400a73ffebefee5dac728c5bdb3dd4ffdccc0ec0352befdfe331f6cbc56f05fccf8ad903f294bfb23b32a394a7b8804366282ab8c736c9c06962c6452081030a17fe21f094f8882583b2166045c585bcc128bfada2c2d8678db5f8245ee53d9fff2462aa1af2e77e42331969bb55baeb5472a88292aa65fe1c4b390b92bd876220f69625fbc47879a41240fedc69ad4b3ee420ea60a92741615b8a34288d5f1053a853cdf0141774cfcb76f647cfa0494e3537cfeda0e411f16316270d87b36740b3bb018333adcd5d5815752cdc9dffc42c4f05d8cbb14cfb4ae1de213b263b6b60fd9d37b9434e2ab48313ecf367fa7693847a0bf14c026dbcde524903e288921b9a0fb838697fec2c6e4149012c31b22a18b0144bf3dce9f2816bb1b5b7e78ba610fce4a59bfc513d59fc168937d04758bd31430cb8bec0cbab6b99e96affe7391b9ebe778bcf2177193778dc348f9e42fda18dc1d58c7908b356822abbf5303b1d76b8714d0ee57695080a0a7cab6966eb4544354a7a8c8a72a4bdb7ee07509dc85b91895f0ab7525853df8ad01afb9b9f9bac33b31c2cf1fe69980bdcf1a682fd01b5d41fe0942ee59278bb2c2cf64bd1d45e966604bcfcd8ad5597082a294f93fba67744c0223107153a012a118bbef4249c49ceebce676f57d52b04931ffaab0805c4cb273831ea0db216e656a32fa69e0ca376506f83877e3aa3f648d5042b029cdd1dbf98e8bde7964c375a1375860f5791043086571080baf997548f00b48683f7af51cc60c742704b20a28ab78a6317dea2fdb8bcda489e2678323a5bef1434fb090afba7155ea71c4713d0ca0f1b08316922c4c2efb3e12c84749a1242e8907b1f81ff05648f94562a98c13ffc52a2a850313fdb415b7810064b364269ded904e885ad2f1e195d3efb55307a5590915b4ac86d7d9878d5e395e8181c8c3394345937cf4352432f1ec79e19652fa0c48d3cad968d534377b65b2b5158f5ecc74615a938d66694020f825c9cd1d126a50b76600c5b3c99d2c2644a0722e4f0e815c272fd0f664bc1827643783fe50cb22d062d82c366139a11273afff6fd96b22317461be679cf4ddaed447d0dd318a381ef0f22af0fcb6e49b3770ece760942045f62889bcc3d5c57f85c80df058d513443aa9cad3fe87e97878b028854c11d5b2dccb13bcfc73b0621efc6bfd6fb0580fd77c6d9f95e628aa4d92f6bdac85472b0554f330439b40d5d379eb2c3573384570973817016444b3eb53ed23be0f83da4a16e98d758e5afe14ea3f374acea92c3a951589bb802c73de28f4c1914071d2a6c4086b511550973342b16bd19f569c1d2408399d46eeb13f7da37dbe811119b22232c955d4ef362c4923c9e392211c0a133aa7a244bf117d2f9652d63b004162db364af1c23a3dc5fe6a7bd90239c31ef64fc79ff579d741cc575419ae1d20d9b5c6856decec73e1d85d0ca5c2d1928d442f394ce665505169411087990e74211402ac44acc995b3f3503f3135210ef2ecaf8f3a26960ea18562ce80b511d5c7cdb87baf1fe64ed2abba926616593ab9c4f39ba0a6a314ff7f3f1c273d9223f965f84c190aa99e5b84fb57a315959a236ac5fb3be324c62ed375338464ee3d523693ac4e16165eec86cc93653bf9b3b5d5e49e0767e5ee21ca99307a8a7f49dbe5166b742d44adb0eac9f682145703fef2e2f39973dda7d0d466dfe4e9515ebc1d7a4122d2b9883d537d68a7d916243dafd65870e6e553f9807fc1a783e0a976dd151c3d7624647484d4ff5bebefacd83ab4cdd85ffb88cf57c73db51c57dd30132b640a81d1e3c8e81f51505281e7fa428afabce9429f38f767abd92a243c360aaa98897dee9b2a1e86637ad8506484e6d7cc3970c31e4636119f3db291583ed3d3144b425dfa363583b389a38584ade3f419a5503259eed20b83fd9857cdac683c90808e55776cc04c70965f4c83162456f4f30da5e11f387c6bfbc36b8bb2ad2799d0f162ba8e3cc3de08a7b918d72d1a9234278e9f1f051c18a53aeed67ec992e101b7d9f4ea8db808e0d28a56b64984bc51acd79230a798667bc93f6c58e233368eea49b111cc009c432d2ed1e5e4248bb5779694ec2a872b783bb3604b173d5bd6dbe50a3e38b7ba9050b01b4e9c66c09c69fa028d6946663fcdce9660d09605d328e72ecb70b3a8dd0bb874f1384cb8aae94311616c65cde2717c440a3d0be0cf9c2f6ed85cc14b3dfa462e4f60b25cdd389f6bbab0615cae8b29b34fcb31d98e73be990cb0a1faa17785b04e7eab6309b529afb69d899d61a6c46f3a6469520691c414323beeb156df3ae511cba18986f5dea6d0bde0c40994d36da718c0aba1bca359d47f77ada12cd26e78623c51c06700143fe0fb44932a7d80d69fa8c9a22a66613ac9a7723efe75a89b72653387a4dcc9641999df36830683bcbe85adb70b4b23173c0f4b7c015352d72eed6f19b3b0789496ff9501215a811889906291dbc6731bb8bdec6771ef69362fa534c3ccba06c4d77932451faa8c0054f7dafde107aaed575fc88a96d1cd9953d43f79b0c0c8033240a8922e6a64827b896f8b54718074eed51da6f895a9e3d0958cc7b4f018ef581e68cf2e93bd0b548cefd2f1ad03e08fafcd488e2801edf4890a298a0c7df0d3ee5716f944b5c369e2a5f4eba8e297d5fee9efe38eceb1b55f263b59210d1b99d7b7db7b0b60efbc643af7658108c557116bac6a0968548ee50a2c74cae98ff60eb560327511324b7677a42e514649b3a484f828af1b64dab94e19d4845533365da51a86cc1210d812e5c1dd1c4999b09a303e73161ca813b378bb5cec5a6b83a80b1ee79d160ffeb8ce608c6e3ea55864f83cca3a31be231bd49a206ad58837c1631756485e22c900a6fc9dc194848cd06a14cf6650d595015977c573485285cdcb91c9f32aafcc9a5329c371e28403de83c5c0f04058b6f74ee711f95daafc1a5d495a58d0c1213c7c58acbf2e51a702aec97f49d25962252959cd043a7d26f5ef8b072498d2840a5c2310b8d7eea48cbb62cf6e45fe00229d9f480d1a5efda3d15b6c27890bbd962ec25ac80959dce515a211995ad19209316386c13bb926b3bfe6c61d59238658737ddb0dd79a21e0b02ce5e2c39fddbe803ccdce17e3c351062bcc87d97fde2ccfdfedf8b69111f7a474557bddddb26199eba073fcf77a74a3d501e0bd3578cf55355ea6b0c9d3314927f14605883c50892570909e2f90acf822aa4b10d156ecbdff008195af2faa00518cfee3d0980c985bd95735be2e6c06ed1b53131f5b42b854c2e89a8461d149dcf51cca599d3bb406da3c06798398dfb5105208c9f929891aad95050658d871cf28b39f007655f03912a38405cae947be640b5a37414d131a6177e181ccff80865cc4cdfca6c3841cf3d8bc0a2f5d1ee9dd33f0b1876fadf200c871f9240b4ac9f1161b69914a6dd3b273b7517845a44445de94bf6e81ec33109aa1cb68f3fc4e1ed80b5dac80720d8a48febb888907b971aba62d7283b36be5b065fdd2bd40f9ba8b499edef4681900eb045068d9c31f7fb65b9a41ed58ff6ca9395418d6210dee7a353c2a72ebca004836b6d888917bad027850feb3f4a786b6da51c425a520c1c5bfeb8aa506927355c4dc0cc4c4972d9f0fcbe38dde657812e0e6485e9a89f337fb36c2d3fe15311d442e2c7ce0217a0b2cc9125b9c306518d15ede8bd5a9ff42003bd5cdb3a975831d3cd7cbffd81786e658111d528dfab73800d624fe1724c4d0ef38aac4d89da9da674f98914a8987748a8709fd478ed66ccfd8b312dfda1d8ca7a8c656cfeb6e637e138144a522d1d73c960d930a92e0d56e64270f238e282806d487eba9374b07d8c1587ef372b7ba9f5808a392b65227a33843f"]}, @nested={0x10, 0x2c, 0x0, 0x1, [@typed={0xc, 0x7, 0x0, 0x0, @u64=0x8001}]}]}, 0x13d4}, 0x1, 0x0, 0x0, 0x20000084}, 0x4) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, &(0x7f0000000040)={0x9, 0x4ff4, 0x0, 0x0, 0x0, [0x20, 0x4, 0x8, 0x9]}) 20:08:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:42 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYRES16=r2, @ANYRES64]) r4 = getpgrp(0x0) ptrace(0x10, r4) kcmp(0x0, r4, 0x1, r0, r3) fcntl$setown(0xffffffffffffffff, 0x8, r4) waitid(0x0, r4, 0x0, 0x8, 0x0) r5 = syz_open_procfs(r4, &(0x7f00000014c0)='net/stat\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:08:42 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x3f, &(0x7f00000004c0)=[0xffffffffffffffff, r2, r2, 0xffffffffffffffff], 0x4, 0x0, 0x0, {0x0, r3}}, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1, {0x0, r3}}, 0x1) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:08:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xc) 20:08:42 executing program 6: sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d00000000108010800000000000000000000000005000300210000004400048008000140c364000008000140fffffff9080001400000000008000140000000010800014000000020080001400000007f080001400000000708000140000000d1050003002f000000050003003a00000006000240001800004c00048008000340000006a508000140fffffb200800024000000000080008408000000108000240000000000800044000000006080006400000007f080001400000bbf808000240000001000900010073797a3100000000"], 0xd0}, 0x1, 0x0, 0x0, 0x4080}, 0x80) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r0, 0x1, &(0x7f0000000480)="778cebc25744fbd8fd690232eff63b79de0c82a20c33eec7910ceff6e30e34c2adf7b7ede1c1067a10ce837aaf604b7d389a637e2128f4c7827a08cee9fc124fb43592a9ed0b5cbc6e61df6e0927c67b6789ac249d44936fb361310d56af65efb4189235f45b5d9f7a6cc903fc16ffd919cccf28637c91be7fe5", 0x7a, 0x1, 0x1, {0x0, r5}}, 0x1) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r2, 0x301, 0x0, 0x0, {{0x15}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000440)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="62de738e4427f1820d875f018e5c191bf3f4860000020069fbd4e758019e69", @ANYRES16=r2, @ANYRESHEX=0x0], 0x40}, 0x1, 0x0, 0x0, 0x4040841}, 0x6004c014) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) getsockname(r0, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000340)=0x80) 20:08:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x913) 20:08:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x50) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) 20:08:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xf29) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:08:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x914) 20:08:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000005e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="0100464c9affb2b1c1bc324ce045554b712d2dac172b0b5a2e24a05a33b0aafe44fe08ac3c9f351ada567643307938c6579aaa5f014504f48fdb", 0x3a, 0x2}], 0x420, &(0x7f0000000400)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d30780965108d3065ff3030303030303086ea0092303030392c75a368532eae741c71528c77ae3c250b5a69", @ANYRESDEC=0x0, @ANYBLOB="2c736c61636b66736465663dffff3300138fda0b21cb429c68696a871f56327c5273af9890ab8396922f0c890574da03000000000000006d0fd701a07f966df641ab86fe2d7b247439bbdff10fe20b08a2aee14b174af58da45043582da244"]) accept$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, &(0x7f00000002c0)=0x1c) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x100010, r1, 0x6cdd000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x4000, 0x1d0) 20:08:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x224003, 0x0) fallocate(r1, 0x2, 0x6, 0xb05) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) fadvise64(r0, 0x7, 0x61d, 0x1) 20:08:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:08:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xd) 20:08:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:08:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/149, 0x95}, {&(0x7f0000000100)=""/66, 0x42}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000001c0)=""/250, 0xfa}, {&(0x7f00000002c0)=""/185, 0xb9}], 0x5) r1 = syz_open_dev$mouse(&(0x7f0000000400), 0x7, 0x0) sendfile(r1, r0, 0x0, 0x4) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r3, @ANYRES16=r4, @ANYRES64]) r6 = getpgrp(0x0) ptrace(0x10, r6) kcmp(0x0, r6, 0x1, r2, r5) fcntl$setown(0xffffffffffffffff, 0x8, r6) waitid(0x0, r6, 0x0, 0x8, 0x0) r7 = syz_open_dev$vcsa(&(0x7f00000004c0), 0x4, 0x10001) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x4, 0x6b, 0x6, 0x0, 0x0, 0xfffffffffffffffd, 0x82, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x9000, 0x0, 0x4b, 0x5, 0x9, 0x8000, 0x6, 0x0, 0x9, 0x0, 0x3}, r6, 0xb, r7, 0x2) 20:08:59 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$CDROMPAUSE(r0, 0x5301) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001540)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/if_inet6\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:08:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x10) 20:08:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x290f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:09:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000040)={0x1, 0x101}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000017c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000003180)={'ip6_vti0\x00', &(0x7f0000003100)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x81, 0x7, 0x38, @mcast2, @loopback, 0x1, 0x80, 0x9, 0x3}}) sendmmsg$inet6(r0, &(0x7f0000003280)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000100)="e55222f81a0dfc8004ec08a4b0a66043b21e06a85b7cf1718c93e5d381b5ecc0c14f73805e6ca7e50ddd5d0d91f53fa90f628e86a01ff03fc6fdbf832882de218e20db3144f5b3d9c24abb2ebf8f747b366924420dd6ad5139f38ae01356be741630cf9ba7f1008d2dba3ce19c91993f9937d64c7015fc6b93dfe9fb8254dc224f0c3c414143", 0x86}, {&(0x7f0000000280)="2f48da48b9056fcc177e077289972ff6bf5b07ea9703ea3fcecbb6d1b445bbe513c0b483fbfa997454a1deacf2e266f88be3bf3a18a9699245c8d86a8b0cd45bd755d74c678bb13b951862", 0x4b}, {&(0x7f0000000300)="824bd379a8357729ebd6e15fca71f8fc3f41c0444d8a763aaabd49b8d284c25a92d2a2c08434dc8265e5d091545c245a15db7532402f6d847aaf54526d145fd5c9a2215515570911835dc223c1a21c678a1511a6fa4b3297b2cdb7f576d1ca02e1ffb38103a9f631e103625cc25e57780c47c6507dd96c0b61ad5f8f5e0dd999dda9d6fe8f60ff0241cb6be46441a3894270055b7c67eaa9c9a77cebdd1a2cee2883eddee2f4e66e73acec88d6e091e3209eaac1fbdea19b66437fcb74bfebc2d8dfcafc7bf1ba22b3", 0xc9}], 0x4}}, {{&(0x7f0000000400)={0xa, 0x4e20, 0x47, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}, 0x1c, &(0x7f00000017c0)=[{&(0x7f0000000440)="665c4823799a9f5a57701bc586d638c07af8b4d0c1d8920a3e99e74223ecef03e9dbbaa721820f98663480c20082ccb5c62c600d4584d588baef1238263a91d39e6da916ed33eccb85362cedcafbfe0b67a65717ac730074640c0957c67ae5b24fddc6c2b86317212e9e556d2e6d32420a37346bf41829ec5e8054640367352dd0ea499c24ac40d5b25cbfc4c203", 0x8e}, {&(0x7f0000001580)="3e0480253a60266af2f1b3cf57a96c095a9ecab27aae36c042b45fd21440e0321416d555d8dc3153aa6a191afc4a4ac212fc06e0fb70d7348f7ed53a7329f6d1d1aa1d5d2e", 0x45}, {&(0x7f0000001e00)="c22a861eb0106973c584239af8bc0a6536591cb43644ad7c82bb1f8e4629daa627023cb622a2c1c23c202c9d51b17c03ea56b05dadfb168bd2ef280c751df4367abf2801c7177b08bb43e3199b204b10ae66fec12a5f799a19d27a03296ca69b50734e8db65381fa811174cdfa07d083536466d905e684b6046635faad6e0574efc972b5a3658a173b012e6c84c067ff15489e6f28688e7bd228993b60998f4b1a7437ccf8de2b3e4a79f4af42a3a026093e9e1cd6ebf78763bceb5da9e01c5717418f55175f3e045b1979b3666acdabe4a246063d6c0841d3fdbf1fc7d2b84743a0768393b75c47bd2a277c4f240fc90678210e90ce144ca411af87e4a466091593e032fdd1806edd19706eda0856891d6f89157dbeea03516e5a212a58bb0da601c5011978e737bef2c17a0aad138470cf7f28933dcfafeac00d0a7f4697eb77974339348e8df9ab709ae90753be8f9cbd3ff47687033de19a0ee0948cda6dc33f5a3598f98ffbc61d389087112092a837fb495d7802736ce28289b864b28efcdac5f1db944de0fe27dfd09907c57690b44f48ee63e082cb0cc207fe8ffe01e7586b8b5f2b516a367a4a1c4bf9ffc4ccdc75b999ada4579e58bf7985ca5d8f384264d8adaa89653179aa1f4a75665284050c8a5422c7e45c73c6edb3dbced9b53b68c0ebefbce50895b62337e900569db1cee4b5d5c2947c291f40a53b83901d6a7c8943be9ffe9640365cc7b957c2c8da56e44ba716be735e3eabce0172497ad13fe1bfe9c844a21b21d5d06019fec106d4da41faabfc4d94479a573c01beef89e97c72ddffe1abf1a1097a577a26694cd1b6622a605ea3c9cec9d3850f81ba22dcf004dffbc8c20434079d9ef211c7e0f49179467512b6e5ab7fb962b84895e5ee1eec1f3a3f939880d33a35689de4ad3773edf1201fd0263454ed8d3d4035b9b616606a6c9bc6ae255e274aa0ad67e51995ead9c66b3db17d7388f29550381b6a2b0c1ba826691326b981564eb1f39e1c6abf32608ecb6773578d4fea551bf6baaff0de3903e68bdf4aad1bdbe42153ab9028796b8e0ea1d116bcc7351bcbd47ec6c2e1130c0e71d861e345628dcebc8653743b4502ba829edf3de3116f0458306d4489ac72d8ec12a5159cad57ebc0d77d4ec72b9b42623be8a788a75d9e388968919e426827751097be6706083711977a4b862aa4f25b7985ade16090ba4a7ecf87e3993d771438a9d12a0e2df1443859aeeee34c371d255f6058ac99138de10d09617d3404775fb62ccde62817140e815bbcce2500a1a30019d120df3428e66b027aebcc906a103ba8ab1dd9fd75ad2c9e63a84d36d58fb9eb02b863ecc21bb18e7ad48c8875410485a9853d883365c8a40f8e1409eb9cde1e34e44a8bb990f7fe0c125fb6aa370d5e53c57a096a3ea912d161040fa992dedaac1cc23c8ddf0bbc7ae4a20858bd1d10bc8b01f7418d17736739b264cdea5e2b41d59bcf339434fdfea0777c65a1e855a336957410e3848f0b6e08e59ed9c580e47562925381c26c0aac3331f88572d2a8de440e6c1c3f3d5333bf9246b5b6d342f72472b39adb38ea85c1e428b7413f05a3296a102eca779ea20c9cb6bf07aa447389fe3025f7437633856858f2f5bf79576d9fe7672308b45ecbc84c11b6f32e8cd6b20091805f5b9d7a16a2aa1e5794f8892c06de489662d98f955e34e4c1b82cd8fcda65b10c992c6a526bdc2c58dd137f44e05395f8048c8a7133f4fa663df11a23765151e7de4f22ac8abfd61487d1c9f8c32c7de91e2ce286eaff249b9c93fb34bf819e137f6c28b33408b9287a5984a85523cae482e6215385cc460fa50cc41c626c9a321b8ea2c58a876cb579f2c83aeb9d53665e8c6cdef0bc2e383ff8518b2fbfd363c80e5593c5e987e15bc897b63ee4aa3cd899bbd5020f413a07c3aa188c33df20516041306aa798fb35cfc6e0f9060e167eed40438308f5255074a7819b7d725423117af9ae5cd4a3579b5f4ad5ad74bf6e1275e8a3419a7d67d7f6a6284ff9c14a1d8540d8e4d01df936c3e7497adc0789ff90d68f2858ffb824b2d4abd6662b2fa051a3ce07060ecfe51d1c353413a0efe6648777ca3c850476260c25ee5cf776389102d0ea21c74d66082f31f8ad0db60350c3508ad9a8346706f1de2f2ff8d4eabd4d9626a7d0b9769171e1ec2002bbcda2fd42eef3bbe0de4646c307b145b80f6e97958a51ef94e395f7812b11a9c130978e6269a5a09ac47e81cae39b6079bd431616fe1b82feba02bccad9d2a4c4cd1efe25a3c333fe1e05259549a024207aa114931f1ffec609bbeba6a4a6475904c40f1bc9d3d9d1d09ff9742d040db7f569a5e56b5e985be6e9b8641f0d7ec22bf718d274dcb819b92eb3cc981a7e6ba1436d6d1614435cace563c3688d4df409afccf58fb712141da9768125b3c68d4be4b98dd0675da3e28fc302754d05cd3b3c0762d5b24a8259e34e422c778ad3754ebc7a6d8ab6dc72160e7448f711554101de1487dd5053241809c1b25809ab311af26e6ee26da0be930dd027c591d264801b827ae75ffc91726bd693f8b92f261f0dd96e46d1cf6022269a5800b6d24380a28b8ff18fe1af070c49d313eff9e3dd214d387d2d7163bc41ae47ccba8d5c432d163a99b715faeec23e69ec5111ed815206dfcc3e8c82c65b48602d230a42ce27e0d92fc50b8a251e5840d7c2d5fcc94f96877f4dcc990b8b97c894629a23d4596214a49d91ad7219783883d68d17bfbc0259553881b16f6d9776d4f3172776467daf501b0607c57296a288dead363a1a738d8aede2dbfea27d903b31b4cd8e68c283f5b8d24b632a4175ca70164835eb6437780ae6e2a4b9fcb6ebe59c485df2fe15ebf18dd2183e5e6d0a412fdb81dac2e4a4d686170b61849dbae2093c07aa1ac76d9b9253923ee33653f53223084e228889b7451aaea79fea33e7a093ae97d816f34b48f66d4715f74f76ef6445518cad573ff5eadf3804f7e1caf349a72dac27e1b19478559b70de40a1a44aa9d954be0a532da76bd0ae5f6ba81fb4eac341fa9aac1cd2c98962f9a6e53279d963b132c9c4a8a082a74a69ea98f26c8a2cb83c2719124a1bd56e32290d1fdd3aea577e96a258946a3cf24add48a3ab16e460c68d545686d605b6379bf56eb93b09669dad1624c2f26b163deae2e2714555e447675bbe81d473d0829df2271d7373d4201b519ebc03c84a4ef38c9c0e61076041f092c41595705116355787e0b6cb081258489e7235dca6ebbafe4bdea7766979f7b9f4308e8d873764472deef5957b8125107d211695b4303c21316f2b6b24d5d30c112969f1d41774075dee50290462ccd0bd5e04e1900c08a5b7f0425ad96afdab630df3a0eb5c018dfb0e3b169b8e948170278525c2366f120625662b543c1e07e4a0134164a7199bcf3ec2c43288cb6a0d3ff963e262b07829b31c65f3a3c2aa73b0accc7a5d59e37bd08ed8653669997dcf8bca1d3bedb669620b5025f136ac9c4656a9a6df9cef3525fe1dc42d041ad61de21e66e45aa6383ce01ce39562b9a14ae04baced00bfdeacc1dbdd639533f5c90c6b3b64e43716fb77d68778bdadfe11d67b01cd2580a45bcb6361b679724334822ce6260a4c7efd26337b592e5e4f63e5cb7f2fca673586f91b04f466d994f2d30b1dc2691815bb56b818713af75be14c580a7fa15369665a8fa29ddfb9eeb5e265a8c0fc1050bbe04f3ef0545aa3d69c624e9a4e388039ca043e7d4084c26e6f783ea53e0ac903b855dd092a27d40266695c152ba2350e7388b4ddf363229348b22b978fb92f7dd59adb26d313607a870f5a32d99fdc6e04a9124be2b89453e8b1c35c274c2c23fd3aff46e8fd11d26afca85ddd9101133c5f0e2f446453081705081287bba320e83f175eda21ed9fa644180cc98d1f11a0924fad590b5923f22ab49686f32c69d87917047da77d119e7b9e6471041550e5cf541e1b1641684ec8c6de15c82cbb402b29ef0ad0f91a393964821b7806ba078dd02970532142cffb096912acd97adcdd626c50245b6965a38dbbb59036892f2ad834c2d8b45fa996a6fe0c3e61ca6dbbd0932fa3ce8325347cdd1784f00686e9619638f2ccd8b2434e09999a1627af337d363735b451fcf6afa2ed6bf8bf9833d70219a748eb981b9999365c116179985d87e9048c8b841cca9f9feca87fa7dafda8f69171655b171c63d7908f1ec9dd1310f745c588f3d40ec5e9235a673998c994c7582497f82d321870e3b7673e909b2c37290466497bac21ad56fa65e41bc7e2c9e761e70389a7c885f3403c7694351157cdbb06ef6d880d7902c3bb413eb0809efa7609dbbbb68b1bda6620a00ac18bcab75c9811f4a862cd4bed2ad804592e09e1eedb38a01dbf2853b5e6d6eb2233e2119e018e7be90929f0599a56b940f79f45ed67d5a10772f3cb8cad5fb7a296e1c0ea8adaaa64cb7fb09a2c2dcf714a0573d751b00c5a862a9681173a02428ff58856b2a431731871cf201043b427e40fcc27875c19b919bb02274e77b1a411fa75889443a39a3beca0c26cf01c353d40d8b96ef12dddc6b0efa789cee5cb510299680ec8aab26a9b58c95923075b5394bab43500317a4ccfb32613bd17a1f3bb9c5b8b0055425ebaa5f12beff36e8f905abd4c1975133bdadcd4d000c0419bf62961e8f65ebb8068626145e589e018c9ec20a4b7b3c9af5aa525c0f64184987dafcde1058419941d1ceda37faf3a05ef1dc0739e1a06301e706bd669ef633350f681952051ade64c4865557925987c3e3b35902c43126ffc555a32146dbebd9e1d568ce373057976081b727db4d5bdac23293853a0887a94ab6cdb5857be7c1bfe8d118a148e76fe305089a40b2bb2e316cb26aead9b85c54b49fceda52078086a368d2bead56fa9f18b567950e567eaafd4322beaa1a6794d6a3027c0af64e00f5bdfa26d0af44aa1f62e72307c0444cf721a5216b44c05b280798da03e9388490bb12cb0d467b8c873bf46951abb9b0487f3a69aee79bacb066bc34d7a57941ce64269e315b228835c7babfd68382c688ebd0012c19311f7812a23f899d75e8f751478c578b3d2b50d5f59c0d64bf0a247c60e389c8977d4832c331bdc722ff3840aef4b3bb38718d650f131d22d1ab1dd841ec71932d98c84dceaaf37f04afa4225fdb4518b71bf119b70c5ee5cb81527324899ff2153dd28bc7d3e3f9f7509bb3b2cfc0356c582d544e0b186c85d09d9c5b1a7d4b6c9b3172775c73e0dc4811859a297b7c4761fe69fb62e9dc0bdf6d20b2e325cc83b359eeb0e1be6c727d43aaedc8fb62157137a9800990bb5d7b7610cebfdf4348bccb83030b5c0728c9b81174cc52f251b26c2c32eb5844d60b0d168cae5c98f69e017eb70eba615302498cb9641d5db197d37f787f88abb2f4d8bd76f46aac6a2d00c2b61764e6ad194765668b37d5debdb51a4327f4c2e9113c47546f2124866f9c8ca77fab391e84b2e471c5096562f69ff7320a2aa6cccec409d7f028716905be9d61033ccc9567c99d3e2da4881943bd26a66cac800dc6b9efad9c763ab31977f07ddf45d6c0c85f62cb6612d1d3d4180a86bb7442ebd357d5a56322c21c731593f3443e5d6bede9ef9165e8e20fe2f09914d0d447d49f911449cb407b31ad051fb0d74ec3cde1482b57f34abd3d056a81b9fe3d993ea510c8e4f65094bccc3efd3efbf1526b364c9eb217973f365dc565c3c5c68a38858c12fc5e74af5706523b0694e2d8db8963dfc52", 0x1000}, {&(0x7f0000001600)="80f537903b565291c40456c4b537e84f2984ae5fb8375c6bcb8b2c2e45793bf56798fe7f5bdd7a933944afc96d1cff82106c55df457012d5779cc4f0251a5acb11d9b80e5f91b64f956f3fd5e10aca512236d4c2c19af93e88b22eaa8195b4af99ecd794d4796bf931e53a99e6a46d5a7916", 0x72}, {&(0x7f0000001680)="ffa12690517f17c0527a36603ef7d8c7b3404e0e534c046552eba5f1c16eb4c3472a7322413f6ca591e6b33a9d814b710770ff889b63bcc1309168ad830bf34084fd8e788c1f0ff8ee4079722b6cc2c0fbd1a5510547ca4f7f55ffb0f913255adf824f", 0x63}, {&(0x7f0000001700)="398a53bbcfcea208cf84768773308d2a7b92f52f3da67c03cb247b692c24a1b263c77cabc1145604d9df060feb838ba26b2eaf6890a81fe045ac221d7a65ffb333536c583f63a41caef8c3ec34232c98182b3aaec7c21fc82f341b4f072eba5bfc8e9d421ba9d32f8394cabe738648048fd6efaac4ab29c429fa06a6e6732e3bd516b7e6e4cf5a2d5cbb4c5629", 0x8d}], 0x6}}, {{&(0x7f0000000500)={0xa, 0x4e23, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa7}, 0x1c, &(0x7f0000001a00)=[{&(0x7f0000001840)="74af2e333a54c7c50ad29ae03028096ed37b44289a3c9b6855fca91a0ef1348e566eb3f76062dfbf6e2ca8770f2374927e3ed0c77c226f45970ab226a47fed71bd0885dafa1786f8d65c997111f23249b61d67dd2b4832fd2b7d9c924130a17edd9e0d40851a00e36cb675830027e23c13694d4552ce8741da21162e6cb00d51d968f9b32636e54f17cf30c5916651124ecc42ed000640229f", 0x99}, {&(0x7f0000001900)="e7503b802886b508cc728d03985db7250352770c6d0eea9f99ec18b9919e2d13a3187c058b9cbfd85fefea21e3d992b381cc8398d2c25777", 0x38}, {&(0x7f0000001940)="572f2b622ab9e2b900804c976bebcaf2f10dfe060f687db9e59317b721b5b942d0172c21c3ef7e24731685b61d813e71a9bf4ce712c58baaff0a8785a5d0fe45ede0649eac", 0x45}, {&(0x7f00000019c0)="69ff89cbda98d9117c73204ecc50e3b4f52950ad3ca98f0c615523dc4164e6b8480be93801acb7bc56ea04642b3c0b7450715f2f152c7a", 0x37}], 0x4, &(0x7f0000003380)=ANY=[@ANYBLOB="24000000000000002900000032000000fe8000000000000000000000000000aa", @ANYRES32=r3, @ANYBLOB="00000086334059aa01ae007e4185ff013e3296a1428fe71f32f9917988206a16b63f54c5d0f5b38b5fa6ff49b0c8be56607905011c99adb628f632c1ff1b0f5e307eec5d953f7603207578ed6d1186d210f6360b2fcae5a48d7c4696112c51b6448a75467bd9c53cee5e0af8c06311a20c893c8a28c7e9dd6f4ff575278ef718417a2e34e4f9fe2eb33fca6288546dfdeb6f0896e5bc6eeea6f29be951b65fb299b92bb526c8335e7ec582eeeff41efd0de39ca551"], 0x28}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000001a80)="0036afd0fb2d5aae3d6dd272e3a1cb0a835674f3ba908b8b8e2a3c528d3b9d098b7c1046888aac19fbaf45745f0b31eb5d4aa4baee4d92282533cbe9b1c1f27eed0561efbd790fa34e68b76d0524652d1d7461b839763292ed7037e2f5412300094a769b34cd61310f32a853f5", 0x6d}, {&(0x7f0000001b00)="0e678456085cc3addca378920c795e357eece175ff7b4167a70059781ff0c6b983bdcf28c5b85407cb79c5741335c131cd776a70879677db4c5cda99f509a83630679f214f01bfb751c18df1a2c0837529d26d95240237e7ccaad5a8db90470b7450791e31a844435d12bc5b7911ff13cd8e4d394fa287a95d1dcd51877391bc5e3bca3790c64af913dbe5b0a470653fd7a6bc5a044f25769d1e523b924084d41effb64967d07bf3f90ff3c015f73cb65d8088668be57a61d94ee4376bf60918beabd275f81b25caab89e7166af39ad0957e85523480bf2d5f0094a13e60f2373987c84b903ca2cc80522f4929afd416d094f008", 0xf4}, {&(0x7f0000001c00)="97c89deb02640a4cff4f3cd321df75c822c6998ad24486750ce1718b310b2099a32b7490a1082930b19fdcbe8b1dc9f4ff16225768e1a3442f81adaceaa536276d179f0acc5be1b10ddd62dd5ce9500f299da49d1237a29d4392bfe3ab3a3552a51d17d861305b9a7ce9f0900fcf5c99ceafa8e2c933e185bf428ab8f7bf2853f264d29ed7c5f6e21fe16b9d710e70e058a0794df20030261a63e923f19810c745733dce958f96", 0xa7}, {&(0x7f0000001cc0)="964560b487315a8699f6d7f1c8dc6ff750f1139212839a8d0ba826ab473e1d371d6258021fd2c132acd2aaba2e638c037251851db947188c2b7f20770f5ac97e13e71e21f87a60f60518769a3dcdf36de957c478eaebdf3952c413eaf4ba586d4488ab9978be36c104ef793e0114d87b5f825cab8c8fc4d10b0de9dd7671d357862b7a7f9d49bfd7f75e4262faa71db601cb7b042d6c4267cd8f", 0x9a}, {&(0x7f0000002e00)="d162a4e265e661d8c915dd4e81000d7ee2ba5853fe112a4a821e5c45f893164297acaa1715eb07fee22f4995a9e5da8e911968cb668f8b10c340cf092001b9f99b087d11b37e", 0x46}, {&(0x7f0000002e80)="1f6b2946b20c8627b0974bdc2407864c2cb47b1342fca8675682030b72f357c71807012f7156130b0df1072c6962eb", 0x2f}, {&(0x7f0000002ec0)="5b42d168", 0x4}, {&(0x7f0000002f00)="bf706e22bcd756e0ad49662137ab5b0cab8457b2fb89c92fdffffd5a1e4beac1c8cda9e14b68b25bf372db2391dd4e316f3b6eec6e466f187f4840aab71e11ecf22432bf94f4dde4ef2d13da0b26ab17", 0x50}, {&(0x7f0000002f80)="139113d99784a63b5b704719d3844ed57a77d1563a4db92178dd78460651dcd95ffa3ecaa8bf6b989ca25431e1a47f4c5bb8a6f9ed949716b90b625ca1f695eb5218087091b2c951e50a5a7d31f62b74dd87f26d48b8e6183d1a8c4f791d3649210ca1a20ea3da37b20e0a3f31f5275683587f10d963267102a5fd291db529fc58b4d78047be76f6a193be94051374a8c57417afe9d1528d4ae599ecfa1666ae46a846fde52fe0625fcdf0", 0xab}], 0x9, &(0x7f00000031c0)=[@hopopts={{0x30, 0x29, 0x36, {0xd0, 0x2, '\x00', [@enc_lim={0x4, 0x1, 0x3}, @calipso={0x7, 0x10, {0x2, 0x2, 0x0, 0x8001, [0x80000000000]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private2={0xfc, 0x2, '\x00', 0x1}, r4}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x21, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x20}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x3c, 0x0, '\x00', [@padn={0x1, 0x1, [0x0]}]}}}], 0xb0}}], 0x4, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x5000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:09:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x12) 20:09:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x915) 20:09:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x8010, r1, 0xd29d2000) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x47) 20:09:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:09:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800001e0d00210c000000000000000002002f744426b1cc96f2896f58f4c4fbf9000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x40000, 0x28) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:09:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001300)=[{&(0x7f0000001340)=""/4108, 0x100c}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open_tree(0xffffffffffffffff, &(0x7f00000012c0)='./file0/file0\x00', 0x1900) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000023c0), r1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r4, &(0x7f0000002500)={&(0x7f0000002380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002400)={0xac, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r6 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f00000002c0)={{r6}, "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"}) r7 = getuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r7, 0xee00}}, './file0\x00'}) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/204, 0xcc}, {&(0x7f0000000140)=""/213, 0xd5}], 0x2, 0x3, 0x1) 20:09:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) io_uring_enter(r1, 0x1f7c, 0x2b5f, 0x1, &(0x7f0000000080)={[0x100000000]}, 0x8) 20:09:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x24) 20:09:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) sendmsg$inet6(r2, &(0x7f0000000500)={&(0x7f0000000040)={0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)="a66c13338acdc5673a611c31c8167ffd8df81c1b1fdfc788b9", 0x19}, {&(0x7f0000000100)="5b9ba4ab08f51b83731025d807756d920c8e6bc0cccb6ff5df91595c8fa1fa701873f98fa179e282c63de396c04588f67145c02a3e785ebcf7fdb47b95621c4507f9ad3a349cf0820f07322d8b73639a29c732dbf06537c36e4c0ff30b2523215d652846b917a881baa334eb8e7b8e4e014aeaaeade79c7bbea23fadf9", 0x7d}, {&(0x7f0000000180)="c140874b5b64b0eb6af57e936d656812216ba16c9dc9", 0x16}, {&(0x7f0000000280)="9484e848332b755182dbf3d55b7a9137811d2389cb48f157a5ad1865f74426e06a19fd9a066390de09f1e768eb7ed11df75bddf362aab09b49a304a988a30266822294e051c57b2ca400fba9cdd341ab552f9357177b6a1d12e4e66f3983390d766dc0ab2aa81f5314dbf9d3b6fe6638b98294a7da29576ce3118400dd05f16ce7d513f1214271e41d75da489a9ed54a3063ccffaa25f9340c8e0d7155552dd5545fa5081e966fc861075ea35ef7c962451e69c5e44da50f2d7a", 0xba}, {&(0x7f0000000340)="89903a979904714c4b695d7addceb3d961e0f361b4f3572d5e796a44b071a19bbd231379204da95e07dbb3326718512ce9201ae7664b211d95e78d4a72ce64f8d2b8539565f74bdca16d0a40412c47dd61749ca0b3ab736160f2077c45e18ddbffc2cd9564b724b786ba3bef6ca1a3b77d74fecc99064df1aea1234384b0d9e2c812c07745af791fc6153b7d0d9f78fca8eeb4430ee4dfe856fb56e84546ad586313f6a374468348ee30a08980a3b14aea6a5f8257a60c89a46fac6ca1fd26dd99cc0ea654bf7aa59d918f45143c", 0xce}, {&(0x7f0000000440)="0c5b34ed3313dd557418296431c5626f056d7bc6ac71b9e21882c52635798489dffa9abc9a0725505e85475f9457c07a16a829cdd7e2e362a940b4d9826fb751fda05f70a079dfdf58f8c83baa9923cf40714cbe4495529e76ed63d451eb841d8361f610e19331557821735ca591b0e9e11dcf62fcae3e639ce03b85a66b557ae1bf85c2f16aaf76ca353c1b32917fa1cfc1ab93bed19783bd582fc3fff8355cba660281f233b2068704259e19894032", 0xb0}, {&(0x7f00000001c0)="7a93fb1f086fe2aa8fe0158ace33073f0bb315e232e781ddeaaa6828a86283382c56180b5da77e32dc1aa127ea9b9514c6fe11cb3945d54da1e59bf670", 0x3d}], 0x7, &(0x7f0000000600)=[@dstopts_2292={{0x168, 0x29, 0x4, {0x0, 0x29, '\x00', [@calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x3, [0x528, 0x7fffffff, 0x2, 0x0, 0x0, 0x6]}}, @ra={0x5, 0x2, 0x3}, @jumbo={0xc2, 0x4, 0x3f}, @jumbo={0xc2, 0x4, 0x3}, @generic={0x3, 0xb2, "d02bbd74b10b3acf8c5138d96074a9bee4767261c2bc50c3756da3834438f81971d519beefba4bd2837b7145a741b1f2d7c09c18ff2aa01eda29d2000488794b263b3827e1fce373c95ab42274f4e5b5795989343eb519d345120acf0cf25f9531769febec2f10ed0208a1649ab6596f3486502a513b8eb9ba6b3ef04672604d247e889bb1910795ba5479f4d8e74321c96d36578fb64f3c28c3093288c99c450236e4a0b878fe6524c31369f5a1eab831f9"}, @jumbo={0xc2, 0x4, 0x4b86}, @calipso={0x7, 0x48, {0x2, 0x10, 0x7, 0x1, [0x5, 0xd0, 0x83a, 0x51b8, 0x4, 0x9fc, 0x6, 0x80000000]}}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0xba, 0xa, 0x3, 0x5, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @loopback, @remote, @private1={0xfc, 0x1, '\x00', 0x1}]}}}, @rthdrdstopts={{0x130, 0x29, 0x37, {0x2, 0x22, '\x00', [@calipso={0x7, 0x30, {0x2, 0xa, 0x5, 0xc2f2, [0x3ff, 0xecf, 0x8868, 0x0, 0x8]}}, @calipso={0x7, 0x20, {0x0, 0x6, 0x9, 0x874, [0x3, 0x12c000000000, 0x3ff]}}, @pad1, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0xc0}, @pad1, @ra={0x5, 0x2, 0xc9f}, @hao={0xc9, 0x10, @remote}, @generic={0x9, 0x99, "5ef196f5b6383c365694e7c20c9f515c50bab2ebff9dbb20899bd45a7885cf5683ab12027bedeccaf3e855de63b8bbe6beae3abd2fe099cebc6ea0933aea63d0bf0d88f47ab4148352e2467801f952fe42af84cef55d9ff8f2112a91a55351253c9799a0bbd80ceb998e631e470bbe9ce6a0dc6c0b5c708778fc5d5f532f16281081bc9f2f5e98984a8211e89f038acf9802a45446779bd2ff"}, @jumbo={0xc2, 0x4, 0x60}]}}}, @rthdr={{0x88, 0x29, 0x39, {0x87, 0xe, 0x0, 0x0, 0x0, [@mcast2, @local, @loopback, @remote, @loopback, @dev={0xfe, 0x80, '\x00', 0x14}, @dev={0xfe, 0x80, '\x00', 0x2d}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x88, 0x5, '\x00', [@enc_lim, @pad1, @calipso={0x7, 0x20, {0x0, 0x6, 0xe9, 0x20, [0x6, 0x4, 0x45]}}]}}}], 0x3c8}, 0x20000010) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x916) 20:09:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) r5 = openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080), 0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r6 = dup2(r4, r5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r6, &(0x7f00000002c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x883) unshare(0x48020200) 20:09:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x783) unshare(0x48020200) 20:09:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0x1}, {r0, 0x4000}, {r1, 0x104c}, {0xffffffffffffffff, 0x8}, {r2, 0x3021}, {r0, 0x200}, {r3, 0x415110142d1622eb}, {r5, 0x2102}], 0x8, &(0x7f0000000140)={r6, r7+10000000}, &(0x7f0000000180)={[0x5]}, 0x8) 20:09:22 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) readv(r0, &(0x7f0000001380)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/179, 0xb3}, {&(0x7f0000001100)=""/151, 0x97}, {&(0x7f00000011c0)}, {&(0x7f0000001200)=""/135, 0x87}, {&(0x7f00000012c0)=""/36, 0x24}, {&(0x7f0000001300)=""/13, 0xd}, {&(0x7f0000001340)=""/23, 0x17}], 0x8) 20:09:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x4, 0x8, 0x0, 0xfb, 0x0, 0x9, 0x2008, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x10001, 0x7fff, 0x9, 0xffffffff, 0x75, 0x99, 0x0, 0x401, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x2) 20:09:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) 20:09:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xb09) 20:09:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = openat$cgroup_devices(r1, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) readv(r3, &(0x7f0000000300), 0x12) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f00000000c0)={0x1, 'tunl0\x00'}) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:09:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004885) 20:09:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x1000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) sendmsg$unix(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="225fed2fb0cf090491f849c5e0869d2ae1f21357d2814c3b9cd63a35313fad940ebf26c1f34fc115c84c998268e2c3f81cf68db17419cf9034150b22687bc47f3eafe6e8dfa1fd266c3bfb5cf24e17ca859a6624644f6ed7b1aed812b0fe466a9e27dc598226ff023b6fb1beb3e732ce9bce5ccec1e7f7", 0x77}, {&(0x7f0000000100)="eb8c26f00d2870a2325427aa4397cf8963c1cbf805a9e8ba5c05b47e5773107f8b23050e29650dd950b252f29b70c0f13212071529f463ab1505ed87141ddc8d8da4391a5e128a099847af0ee6514556d788d707bbb276756fab7eb8480f15f067ede85a45a17ebd3087bfef841e1b8b81d9c8c7e374577fd27bbdb33ee7711330eda6b3154b6552ceab3308c40db59cf44f70f289d74cb832ff1f3d7bf9c1176b2bba2a187427edab799ce36a14260d2ddf4bd47fb728b03be014db384474362e74f999f5f981d7b7abc6", 0xcb}, {&(0x7f0000000200)="7a4acddb2b33a540e2c09772ff5449f076865cc8c4270a4e136e3b7265879bbb43d252e5c3554aa3555fa5004a8b2aecbd222df4d2f965b9ee411b41a44a871db95a352177281205cc16bbccbc94da", 0x4f}, {&(0x7f0000000280)="081378597ed9d1ddf4eff2683a6cc3ffa90c87d3867a87032e6cdf522e64f67fa9fba9594d5c8c2a7f429d64050dd06ecf3e51a9864f79c9c9b889f49f606d5bcda18540a4ee5bbd068a99bf889ac6d3d7206d35f9f12b934125a8000491fc30aff174205f27f741a48d641600aa9b455522c0a3448725514221ee54513c5d86ceeadbf58fc819520ef0af712d20b15d35edfcefc006a5fa6e09f0ea2b404f7f5239", 0xa2}, {&(0x7f0000000340)="cbe725847ab49ad64c3e7ee0c1222bdaff909ba2158476015b2a84dcd11ddfabc89fd0ef47410858dae9bf4c3c4e6251eb4126c50ef3b1c237917d07832471e958627b2099500ca0f23857a595d696f281af7cf2905b74dbbb32c47d9d9c3ca850b5b3fe9b6ebabb4629b2fffb618f2303743701593e6040ec1a9b115a0bce3e24a1635cb193de546ad3a73d5ce2db28e92be8f8412995b8efd8bcfaf62e5fd1f7f2ac1df062cc8c6eead11c98998aea8ca9b7", 0xb3}, {&(0x7f0000000400)="f132991951f7dd2e", 0x8}], 0x6, &(0x7f00000014c0)=[@rights={{0x20, 0x1, 0x1, [r0, r3, r4, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r5, 0xee00}}}], 0x40, 0x1}, 0x40000) 20:09:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x64) 20:09:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) 20:09:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x8, &(0x7f00000007c0)=[{&(0x7f00000002c0)="97532ff0fcdfad72fd2c0ef7cc27cd4fd06d0379667cfd6df0f9f4f25881b206dca5d28c329f608e733204508c0d15f5b8aeb44ff0ce507d8e80e3e102a48837485035f5d67e5949a54e6c12b7ef952879fd630ac2495f4c8a4e70d4240af1085d62757385e5f1b03b05f62d5568acd235dafe8d5ab0e19c0572df81bf194d730e09ab5b81436e6b580cfd4bbfb422bd4bae746fed8592a6abdc89b44d32c8478f28a59774bae8098024d962563676f6bb6ce4c00669e611e9a0fcd0dc6f9643c96ccac391d88a724eecbd044790fa18cf5300ffa8877ef65a60257eb3eadebc680e316b", 0xe4, 0x2}, {&(0x7f00000003c0)="05433ec413c6b5b932e25e9cf52b56b4e4e4d5d4596dc967117444ccbd58f9c2f0184a3e8f5f7b9d82ba49e7d4d7ac671be069d3d160b7939c04d68f", 0x3c, 0x4}, {&(0x7f0000000400)="09fb39c6b98cb613997c719310c1220b8da9120489228e28f325dad908fed589b57e6aa763f01bb58baea9ce4d2d3d7313bdeacb340b32271f8bfe0bac9b87475ba167b51bf78d1797142489ecc339bf060c97633258fe3f210cf30ccfcc33f7cab04e73bbd194e2aa3c4907f7d37450e047cb7381ce15f54cd35ff9fc5ce096d157dfaf97e96bd064ddf5e0dbc568f00b2253776fcea683d1c08753716cd4edf3ae074f42517dfdc7455dd3d9cd2e4a2e46c9972adc1ef90f70c4607450dd24e3ad85254f3061c60983746d2fb2b5302e", 0xd1, 0xffffffffffffffc0}, {&(0x7f0000000500)="cde0c6380b1dff7a7569b321686d24f0d22e802b2fe893d819d59b5e005eceb4485630d852951ce439e4f1306fbe628bbf285877b30de28677f2", 0x3a, 0xc9c7}, {&(0x7f0000000540)="de7f06983eab5f5efa53a32976b9ecec6d4dd199985fd0c82888dab7c619550bc3e32bed449a8830940f84f3fe041c3a4d37473a424d97eea50b4628da78d04fb5bebb4bb323274ebdaf8cd7edd271bc2f12008468924fed2c508ab61aaec309785a442f7d43187541d621d0cd2167d29f2eb955231ccf5d819fe2ec0d302e15c240fd5205c97f8720d73266d53185226002b7b3abc495eb69", 0x99, 0x40}, {&(0x7f0000000600)="f53e071862b0a0bb4d4d14c283a56c73d62abcc3ea49d089a84dd086e82b26eadcc661c3d866455074369ebd35ce4fe76b4539fa8cacdabc11aed676102548b7e6d9187d23dcf6b92ed9c70a1bb70efd2a15a4e1f3871785eac8c56c973bc6d4973faad401b3e716008eac65608bf24b496da9b2f02c1c534d66", 0x7a, 0x1}, {&(0x7f0000000680)="6f1c52a9b79d003442d2a68228dc239bbe8a4871174cd287bb6390d6253587fe00c6f860316a169f57eafc845ef9c8c2446d424b1b74988995d6c25c263a99ba64748448da9bd51ed8e45822d7c76325783bb06b370040e1cd6b5569c27406e4d54cb0346671a529cfaf47f034215aa42fab0309a09413e30233082850d3af7673843fa74028b327492e93e96298d3ed760d1d0dae8300b44aaaf55854fc4b226d1427934f27c66983133976f44e7a624c940747a926cda4e6a273aa297d5736ad96b7f853f2388f", 0xc8, 0x1}, {&(0x7f0000000780)="4f11b63676334dbb19a32aa42efe6494227a", 0x12, 0x1}], 0x1002010, &(0x7f0000000880)={[{@journal_async_commit}, {@jqfmt_vfsold}, {@nobarrier}, {@noauto_da_alloc}, {@bsdgroups}, {}, {@dioread_lock}, {@mblk_io_submit}, {@nobh}, {@stripe={'stripe', 0x3d, 0x8001}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x62, 0x38, 0x30, 0x66, 0x63, 0x63, 0x66], 0x2d, [0x66, 0x56, 0x31, 0x62], 0x2d, [0x0, 0x30, 0x66, 0x36], 0x2d, [0x33, 0x31, 0x38, 0x32], 0x2d, [0x32, 0x34, 0x28, 0x31, 0x32, 0x62, 0x66, 0x32]}}}, {@uid_lt={'uid<', 0xee01}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, '[#'}}, {@smackfsfloor}, {@hash}]}) readv(r0, &(0x7f0000000200)=[{0xfffffffffffffffd}, {&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f0000000240)=""/32, 0x20}, {&(0x7f0000000140)=""/135, 0x27}], 0x4) rename(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00') 20:09:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x4, @dev, 0x3}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3d, &(0x7f00000000c0)=""/52, &(0x7f0000000100)=0x34) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x7fffffff, 0x4000) setsockopt$inet6_udp_int(r3, 0x11, 0x3, &(0x7f0000000080)=0x400, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xf0) 20:09:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x8, 0x1f, 0x87, 0x6, 0x0, 0x0, 0xc01, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x6}, 0x3040, 0x8, 0x2, 0x3, 0x4, 0x42, 0xbf3c, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x0) 20:09:52 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x27) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/tracepoint', 0x181000, 0x40) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x5}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2c, 0x18, 0xc21, 0x70bd28, 0x0, {0x2}, [@typed={0xc, 0x602, 0x0, 0x0, @u64=0x2}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x2c}}, 0x0) ioctl$FIONCLEX(r4, 0x5450) ioctl$AUTOFS_IOC_SETTIMEOUT(r2, 0x80049367, &(0x7f00000000c0)=0xff) 20:09:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xc00) 20:09:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xd8f, 0xec44}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x0, 0x0, 0x1ff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) r5 = openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) readv(r5, &(0x7f00000000c0)=[{0xfffffffffffffffe}], 0x1) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002700)=ANY=[@ANYBLOB="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"/2256], 0x883) unshare(0x48020200) 20:09:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4093, 0xffd}], 0x1) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000080)={0xa0b, 0x5, 0xf1}) [ 3226.862380] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3226.887503] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 20:09:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') r1 = openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)={0x0, @aes128, 0x0, @desc3}) readv(r0, &(0x7f0000001300)=[{&(0x7f0000001400)=""/202}, {&(0x7f0000000100)=""/218}, {&(0x7f0000002500)=""/4109}, {&(0x7f0000001200)=""/205}], 0x100000000000021a) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_vs_stats_percpu\x00') 20:09:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000003580)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f00000000c0)=@phonet, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1}, 0x5}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/88, 0x58}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000280)=""/165, 0xa5}], 0x3}, 0xfffffff8}, {{&(0x7f0000000380)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000000400)=""/223, 0xdf}, {&(0x7f0000001580)=""/225, 0xe1}, {&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000000500)=""/41, 0x29}, {&(0x7f0000001780)=""/55, 0x37}, {&(0x7f00000017c0)=""/88, 0x58}], 0x6, &(0x7f00000018c0)=""/164, 0xa4}, 0x8}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001980)=""/89, 0x59}, {&(0x7f0000001a00)=""/237, 0xed}, {&(0x7f0000001b00)=""/186, 0xba}, {&(0x7f0000001bc0)=""/120, 0x78}, {&(0x7f0000001c40)=""/251, 0xfb}], 0x5, &(0x7f0000001e80)=""/4096, 0x1000}, 0xec4b}, {{&(0x7f0000002e80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000001d40)=""/20, 0x14}, {&(0x7f0000002f00)=""/122, 0x7a}], 0x2, &(0x7f0000002fc0)=""/122, 0x7a}, 0x100}, {{&(0x7f0000003040)=@alg, 0x80, &(0x7f0000003100)=[{&(0x7f00000030c0)=""/12, 0xc}], 0x1, &(0x7f0000003140)=""/75, 0x4b}, 0x10001}, {{&(0x7f00000031c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000003240)=""/14, 0xe}, {&(0x7f0000003280)=""/173, 0xad}], 0x2, &(0x7f0000003380)=""/36, 0x24}, 0x9}], 0x7, 0x10000, &(0x7f00000035c0)={r1, r2+10000000}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:09:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x49, 0x17, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4014001}, 0xc000) r1 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='net/stat\x00') r2 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0xcb) 20:09:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x112) 20:09:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:09:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xc09) 20:09:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:09:53 executing program 0: ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000001640)=""/4096) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x1) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/238) lseek(0xffffffffffffffff, 0x5, 0x0) 20:10:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2009025, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@fscache}], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt}, {@permit_directio}, {@seclabel}, {@hash}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000040)=0x30000000, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:10:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) listen(r0, 0x3cef7a94) readv(r1, &(0x7f0000001600), 0x0) 20:10:08 executing program 4: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='keyring\x00', r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000005040), &(0x7f0000005080)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r0, 0x1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) getpgid(0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r2, @ANYRES16=r3, @ANYRES64]) r5 = getpgrp(0x0) ptrace(0x10, r5) kcmp(0x0, r5, 0x1, r1, r4) fcntl$setown(0xffffffffffffffff, 0x8, r5) waitid(0x0, r5, 0x0, 0x8, 0x0) syz_open_procfs(r5, &(0x7f0000001100)='task\x00') 20:10:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x281) 20:10:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xd09) 20:10:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '\x17\xf9G\xd6\xe0\xb1<\x86\x04\x98\x12\xa0'}}, {@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @mcast1, 0x7}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000000c0)="fa983a5a3893ff8b98050d53cd3949eb3946fe86f801d7727444eebef98c5e6c37b48d20fec3e2518c8b5ffc1442b53d2bdbd6bb1f9c55938cd6fb30c718ebbfa624ba4f2c29687484a7a7b9af2a8dd9a3d9633a6bc27ca7bab15f9fb0fa4c199b519a2300df5c06ac2b40de8261dd211c7cbeaa7e0fd7087ec43d93332be259534a7883e879a57656b4bc082ed65dd5", 0x90}, {&(0x7f0000000280)="9e4b2185e12a601026b46357888233c59ac9c029d190f1d62f5e81f50a9fe49a278d8df3b660b45d67f199a4aca9e4668b8b8252f0e11598d82610115ffd61f741331ca9a98004ad4337d58500f332072bd7b283b5ef08118a98f72e0e27689752d33e524225aa6028f20a3ab27baf5204a8a828b60c1725d7ed977af9ca272e709e", 0x82}, {&(0x7f0000000180)="0c3c0eda34fbbe5fc8cc79d8e453a52b5483367c5c3a006f436183926dc419c2cc050dba21e32d60b548fc03289e55df82f4302d3bf232ae2b9735eaa30f425b527d78fe20027f15563ce130a60919fbb247cdf8d0a2cf4e9aa06d8e7014e9faab", 0x61}, {&(0x7f0000000340)="85da63e466d1b5649c44c32efe45804c19dcf3333632b676645eda71b996dec067664b2b2e817d5c427004b8530bbc69a8afbd1c9b6f2d7355abd3a1aa9eecee6b729195286e242c0b3f6846489235636714c6f2c1ecf3e0f8f606cd1625feb970ca4bae4272ed9d5dcadcb5b66aaef9f74db82a2a6a73df2be316", 0x7b}, {&(0x7f00000003c0)="1a1fdbc9a59c161d8d0f5b41acc3f11c20a3ffdd74450dd7c47c0d", 0x1b}, {&(0x7f0000000400)="82710e958832af543f4b56f3e294d6b6ee9b27f148fcddabc29feebebf1868e2f166bf54ad3a887feed053a042921263b8cf36bf395932f907405e03a34006e1716843e26e5f822d4665f16e7ea39bda605fd145386aedb85b55c3da327d7c8e3fa005c6852f0f060227c06c52526575850bb062be3b178ec03c8dd500f1d74f05fa754864059c9957f181e39fcdd35f18614f8eebf540ef0592bbe81ebe18be69b2ab6d64f5c8586d36922d52b1b280cdeb7c6f504993ae12e719a33ce347e60b8526698e4a6e193d396fdc5a9d6c5d81d32d2d8fcda0a22ec51038bee2ab0616c790625c4ed53a5def053d9f", 0xed}, {&(0x7f0000000580)="53bc4a78a0d1d34580b0441a9c4ef80d774f84123da48a1e2a746250fe5fafb2021b4935a59a92adb5378d8a0f8b3e56bb9cde5ec7cefcd1ddcacbc57142cd57eb02f0574cdc48b0e8862227df94d5380d18f829c9740caea85a4507accbf712f99740307ae8584c5475d6902d6704a8176f390541f6cab685d52da72ed8a9d012761c6101859f536885b92e316b15327b93c5d245eb9ccdd6bc40b57356d159433527b03a97", 0xa6}], 0x7, &(0x7f0000000500)=[@flowinfo={{0x14, 0x29, 0xb, 0xfffff000}}], 0x18}}], 0x1, 0x40) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:10:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) 20:10:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x2, 0x4) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:10:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x300) 20:10:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xe09) 20:10:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000200)) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r6, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r6, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r5, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) [ 3242.920011] FAULT_INJECTION: forcing a failure. [ 3242.920011] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.921315] CPU: 0 PID: 30817 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3242.921998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.922762] Call Trace: [ 3242.923085] dump_stack+0x107/0x167 [ 3242.923427] should_fail.cold+0x5/0xa [ 3242.923785] ? alloc_pipe_info+0x10a/0x590 [ 3242.924238] should_failslab+0x5/0x20 [ 3242.924595] kmem_cache_alloc_trace+0x55/0x320 [ 3242.925064] ? avc_has_perm+0x108/0x1b0 [ 3242.925438] alloc_pipe_info+0x10a/0x590 [ 3242.925823] splice_direct_to_actor+0x774/0x980 [ 3242.926304] ? _cond_resched+0x12/0x80 [ 3242.926666] ? pipe_to_sendpage+0x380/0x380 [ 3242.927137] ? selinux_file_permission+0x92/0x520 [ 3242.927585] ? do_splice_to+0x160/0x160 [ 3242.928020] ? security_file_permission+0xb1/0xe0 [ 3242.928473] do_splice_direct+0x1c4/0x290 [ 3242.928858] ? splice_direct_to_actor+0x980/0x980 [ 3242.929370] ? security_file_permission+0xb1/0xe0 [ 3242.929823] do_sendfile+0x553/0x11e0 [ 3242.930228] ? do_pwritev+0x270/0x270 [ 3242.930584] ? wait_for_completion_io+0x270/0x270 [ 3242.931102] ? rcu_read_lock_any_held+0x75/0xa0 [ 3242.931531] ? vfs_write+0x354/0xb10 [ 3242.931887] __x64_sys_sendfile64+0x1d1/0x210 [ 3242.932354] ? __ia32_sys_sendfile+0x220/0x220 [ 3242.932783] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3242.933312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3242.933788] do_syscall_64+0x33/0x40 [ 3242.934182] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3242.934655] RIP: 0033:0x7fab3943fb19 [ 3242.935071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.936789] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3242.937532] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3242.938232] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3242.938888] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3242.939614] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3242.940327] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:10:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x321) 20:10:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 20:10:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x9, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:10:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4104, 0x1008}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000680)=[{&(0x7f00000000c0)="528649565fe53033a843e832eb9f38e04838e216cfa452db67c918da01db61a5458cfded036c19a9395056a646baf5f538732759c5906f2e41aeb8bdabc99c554b3dcab3db47d2bda765222859a9ecf5cafaf2155f6356e1396664ca08e55f8984758903d10962393dece59437f21bfca73d9998173e1d63a550ef8534ba9789d937ae75888eb6a1fe16359feb84", 0x8e}, {&(0x7f0000000180)="b7ad280f2f345627c9b5613a1dd3706280e3a227a4005f574c5d5a528fb7f30f4fa1ffd7908aa7d1e2d3b6c4eed611d61b1af93b691a02607cee65855fafdca228d47564807cefef4f484db6872266029d90f06e226bae0a888230ecbdc6ba2f4c29a5fca25ed0c700a9a41be3fa400f37dd40da0ba792ab462bf26a63ece7cf5eb619fd29fb510cb2704e64e27796c6489b9885601a3c855bab7b2ad744fc039c6cb6517da69b455355fdca5e757bce625a1069cf7e6b64a690306352829d4974faf5347830552159084e3718a7ed2a83cfb05f6c86a803b31594be870bf0477f661a64572ad3eff2bc93aa", 0xec}, {&(0x7f0000000300)}, {&(0x7f0000000340)="412903824fe1c7ca5b9389383a2d61e58add7bb443f5bf6e66b57cea09359c2e143a5b78a0cfa6b78dc277e2559c53da50cf422fdd1473751ee41e329ef10da2e047641c2e4ad1d982462d694e5e07f4f54b6ed923529f5b338538abb822dc999cef3c6dc1aa9205c8b1e421269e30f5040b21bea2242dfee39bef30cd827938e550f7cc49c7a4199ded3a44ba6dda723f541df3bd130e525876b7be68be412075c74e756ecf8aec834cb584a8e164cae156", 0xb2}, {&(0x7f0000000400)="8ec56f17a0e6c8bae40bbde8d584faf712c6a49027f04e3685d7e02dcc9cebb95f7dab8113f3e0d42492ca5adb65abd8980a8cf3ee70f8ef250c9a9f54b147ed711c8d16701f2c517c456d6a87", 0x4d}, {&(0x7f0000000480)="234699024d9fd23dd1b7b478d19831c4fe9a85752430df8477f714c0d2af395ba817e7c810a171b40327b18d78913db2073371c072220166cb2656ab59317c6ccafa07ac10001bdadb8ba6b91f65c8c27f3a560e3cdeb743860c7c7d84010fd839873e", 0x63}, {&(0x7f0000000500)="1d986fcf04a8cb2492948b5ff43fe5845584a682d31ca80c8016ef8188517252e33f1d24780f76db9f9d2b9a5ade8cc44c1ad588d3ada96f1f543a0173d8b72593619192b685f6433e64be17d7a30b6e1c864572553803c26153d511f55bd467a0f7060eb1b98a3354c2f7bb6ac07421305e6d6218ba39742e97008b6f16e4ffdaaf33daabc783d6b6b88b0958f0d56507bf37c1a420006fedcd491c98b8edb51c2fede9fcbee82d1946b778436461", 0xaf}, {&(0x7f00000005c0)="a02cc71d475004956a8fcae8c8a6cd28f872ed493902045ab5b0661fe0b78f9b38d3d711f9ff3941651dc82f477e1248e63241bb0384056b5f868db289155dab348ecdcfbda2b4aa894995ea987518e4a46b975af838450497a7eef4c3a1b952349de43e0443c4613b42ecb7b6c8daf1d781d2a25fd7ea958a649f6c70a5f0d54dbf04c074930aea6f051da10bf513aa22ca7d1f1c829372f39534f91062ddb53e", 0xa1}], 0x8) r3 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x2, 0xdb, 0x3, 0x6, 0x0, 0x0, 0x10008, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff, 0x3}, 0x10, 0x5, 0x4, 0x5, 0x9, 0x2b1313da, 0x3ff, 0x0, 0x5, 0x0, 0x4000000000000000}, 0x0, 0xffffffffffffffff, r3, 0x9) pwritev2(r0, &(0x7f0000000880)=[{&(0x7f0000000700)="3b76605ac2648581d4f4904b053523713ff401b1577d1c66105958fab8dc9e38dfa26dd82d3241a552e3e5cda36899f153507216f9458642788da5a6590ee82402a2fbd249bc7c92b834399eb66f003babd2d243e3242c0d5c096a54b0f9a079805994b9330964121510dedba87bf1bac2ccc8aee5db9d6541a45490d9a6b5a8d2732cc341ecab5ef333394f74d08f8e539dc83804e728b1f989db525c522e62e8069f68ee66b3440ebeb91b77f98fdcb92c69093194", 0xb6}, {&(0x7f00000007c0)="6ffe953455bc7ae62b5dcf42f5cc95ac025fd9b82fa5182d2d2cd4dc44b48f9111b06c8b7fcc60f47924253c558924c6135a7fc23899b79e4701212b5accf932dceca92efa4d8542d4facb54f88f48ec02c50edcb03c3c89581e6ddad85306092667e22e455247ea4e6adc51f5a8b7c1efe51c47d3b2260b8d4bddf7816c43", 0x7f}, {&(0x7f0000000300)}, {&(0x7f0000000840)="fa2ca8d947", 0x5}], 0x4, 0x2, 0x7, 0x10) 20:10:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x408) 20:10:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x480) 20:10:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @private1, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x2, 0x6000, @fd_index=0x2, 0x5, &(0x7f0000000180)=[{&(0x7f00000000c0)="4b0b1e555b46052dc5d701d4bafff049d520a2d4ea54eb41f4c06995d5ac7ff8273b50aaf6a988a4b3720522cc21f1785ecd75957d688c58c6552ebcf7063eba1a856dd652c57db87984082cc8632a3c9898ab68b924041df3433e6182021fa18d557393ecc096bb9a36d1cbca9b8a058d23bb26fcc144cfcd02b253ff2c77e5a30d35c0e4f6793842c286189510bdc4fa2e22fc59c8", 0x96}, {&(0x7f0000000280)="85afd798da7e2266ebeec1f5df6dc7f96b0bfe30ab1f3a468ab9481755a8b13269e57d243e6142ee360d9e4ca7c04f1740a0d33645e31bd596ced64fa10e94288743ee7e8ad4cbfe60df944012c18104b2bd40952eda71d8a73cb8b50c9af4c34bc1affb007de079e2cc481a34a0eba0c5c6174136951dd4847bfaaff9b363ae98042f64889f93779a", 0x89}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000340)="f50cab11f88535ca5de4281d516ba18eaee905b9393e7dbc7db77acc8d5aa7e6a0c87a6151d9740122b4a0bae2fb721a31a89ba32ca0ceb616cb2fe560e4d061137bd0d4016846075cbfc065a7a7fee82083ae93e3f79821b824f6285be68509932bde5554ee3b9dcdeb428a527822f6cf8b448719c849f92dc9743a46700c700b9b70515839ae21a95cfbaacb9a65a3fa785288030549f86bf1e31feb1d38b5fb8c68ba1aa9e817510acaf9f95edd98df511a857506a773c8690ab7f99ab332203c345de693c725ee09ee52123cfc77c95df7d8a7c776b12e884dbbe9cb55767ee6f62bd63eababed775c566f5034850ded8ea92d6f19", 0xf7}], 0x4, 0x1d, 0x1, {0x2}}, 0x5) 20:10:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xf09) 20:10:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = epoll_create(0x7ffd) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000007c0)=""/168, 0xa8}, {&(0x7f00000000c0)=""/26, 0x1a}], 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000001c0)=r2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000001640)={{r0}, r2, 0x8, @inherit={0x78, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000000000006568ddf080036a32e596c69db178e4b7140b3e66eca00000000000001000000010000000900000000000000220000000000000003000000000000000300000000000000080000000000000056cadd657a00000000000000010000000000000014000000030000007f0000000000000003000000"]}, @name="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"}) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) pread64(r3, &(0x7f0000000040)=""/182, 0xb6, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000140)={0x30000009}) fcntl$dupfd(r4, 0x0, r4) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r3, &(0x7f0000000100)={r0, r4, 0x1f}) 20:10:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) syz_open_procfs(r2, &(0x7f00000000c0)='net/sockstat\x00') bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x883) unshare(0x48020200) 20:10:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = syz_open_dev$mouse(&(0x7f0000000080), 0x3220, 0x80800) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f00000001c0)={'TPROXY\x00'}, &(0x7f0000000200)=0x1e) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34f30d17", @ANYRES16=r1, @ANYBLOB="000402000000fedbdf25060000000800020000000000080002000600000004000180040001800800020001000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x40012) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r6, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 3257.549653] audit: type=1400 audit(1727899823.710:82): avc: denied { block_suspend } for pid=30947 comm="syz-executor.0" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 3257.582801] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:10:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x7495, &(0x7f00000000c0)={0x0, 0x76e5, 0x0, 0x2, 0x3e1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x8) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 3257.589694] FAULT_INJECTION: forcing a failure. [ 3257.589694] name failslab, interval 1, probability 0, space 0, times 0 [ 3257.590924] CPU: 0 PID: 30961 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3257.591571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3257.592346] Call Trace: [ 3257.592597] dump_stack+0x107/0x167 [ 3257.592940] should_fail.cold+0x5/0xa [ 3257.593298] ? create_object.isra.0+0x3a/0xa20 [ 3257.593727] should_failslab+0x5/0x20 [ 3257.594085] kmem_cache_alloc+0x5b/0x310 [ 3257.594468] create_object.isra.0+0x3a/0xa20 [ 3257.594878] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3257.595356] kmem_cache_alloc_trace+0x151/0x320 [ 3257.595790] ? avc_has_perm+0x108/0x1b0 [ 3257.596185] alloc_pipe_info+0x10a/0x590 [ 3257.596569] splice_direct_to_actor+0x774/0x980 [ 3257.597005] ? _cond_resched+0x12/0x80 [ 3257.597370] ? pipe_to_sendpage+0x380/0x380 [ 3257.597773] ? selinux_file_permission+0x92/0x520 [ 3257.598222] ? do_splice_to+0x160/0x160 [ 3257.598596] ? security_file_permission+0xb1/0xe0 [ 3257.599050] do_splice_direct+0x1c4/0x290 [ 3257.599439] ? splice_direct_to_actor+0x980/0x980 [ 3257.599893] ? security_file_permission+0xb1/0xe0 [ 3257.600362] do_sendfile+0x553/0x11e0 [ 3257.600728] ? do_pwritev+0x270/0x270 [ 3257.601085] ? wait_for_completion_io+0x270/0x270 [ 3257.601537] ? rcu_read_lock_any_held+0x75/0xa0 [ 3257.601968] ? vfs_write+0x354/0xb10 [ 3257.602321] __x64_sys_sendfile64+0x1d1/0x210 [ 3257.602741] ? __ia32_sys_sendfile+0x220/0x220 [ 3257.603171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3257.603660] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3257.604154] do_syscall_64+0x33/0x40 [ 3257.604501] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3257.604978] RIP: 0033:0x7fab3943fb19 [ 3257.605327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3257.607017] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3257.607722] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3257.608396] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3257.609053] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3257.609709] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3257.610367] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 [ 3257.634256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:10:37 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') socket$nl_generic(0x10, 0x3, 0x10) 20:10:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x400100, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000080)) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4104, 0x2f4}], 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x288000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000100)) 20:10:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:37 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000340)=[{&(0x7f00000000c0)="8afff31a029217ade3a84851640019b2b5644d97b2280a8b2be4aa54c626f69e1fc583b316cc168ae8e2f47d175fe5f219396cf3a4ec6530d2bb8489dd4d173162ba2c95f35d8d017164b8e31711e056623855936433104650b6f4d6288483ec6032263be411cf011be7e58577afccb79f0e823aa8324619c3f518c036e1c4b660701f332a146ea05fba28ac282422", 0x8f}, {&(0x7f0000000180)="ff9811f5d715c3899df5dbf37de5fb3819041dafaca7518aa6d08262f566990ad007bdd84d772ba461eb2338d95da98880ef6644f0f799ceb463d31eddb5aa503f9d112241dd3e8b8e682d418655d3dcdcf7d48a9caa6d4f73f4e7b338b3765243136a61f95d", 0x66}, {&(0x7f0000000280)="c1d2974970957f27c742b82a1dc851d4b1e5b9b0ac226df78b3cbbb60dd53f8ecd5af72cf7080a53883580144d157e5dcd4b95b23b26388dccac43958bc42e5301ed22fa554472721b144e4961db9d55e92dd7c669ba65c0768e5e4e71205d82f098139e49107ce23eaab53dda3f4a14d16e08d69d71d638cdaead7ad9b8148199b797eb011586a14a60963b356cd6", 0x8f}], 0x3}, 0x40040000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r1 = syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x8, 0x2, &(0x7f0000000500)=[{&(0x7f0000000580)="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", 0x1000, 0x3f}, {&(0x7f0000000440)="3553e1a8eeea0a68497b479dbd994fc31bffd8b72e14b64b13d29a0c0744a7538992a5c0facd4cc0a0e7b35b21ac0a5f244d8979a8ce0a3f95de0410669e10bd8171b612fd9b32abf60111ea75324785a974e79e877f7dd918d775d12b99870794295576199aab4fc4fa45635529e7123340efbc66f72a59d97ca4ad9cf30a478f365ce8796851baa4db5fe30e87bf0c697549b6178685d762f4a484abb5ea7c5f45c64115468d63891823e5f08ef7aafac9c5", 0xb3, 0x7}], 0x1000000, &(0x7f0000001580)={[{@nocompress}, {@map_off}, {@overriderock}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x66, 0x37, 0x34, 0x37, 0x32, 0x39, 0x37], 0x2d, [0x37, 0x35, 0x63, 0x38], 0x2d, [0x35, 0x66, 0x37, 0x34], 0x2d, [0x66, 0x36, 0x61, 0x31], 0x2d, [0x38, 0x31, 0x32, 0x62, 0x65, 0x36, 0x64, 0x65]}}}, {@obj_type={'obj_type', 0x3d, '\xff\xff'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x38, 0x39, 0x32, 0x34, 0x0, 0x62, 0x39], 0x2d, [0x37, 0x35, 0x34], 0x2d, [0x35, 0x61, 0x0, 0x31], 0x2d, [0x36, 0x66, 0x62, 0x62], 0x2d, [0x30, 0x62, 0x63, 0x62, 0x35, 0x61, 0x66, 0x64]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@dont_measure}, {@uid_lt}, {@seclabel}]}) lseek(r1, 0x7, 0x2) 20:10:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) r5 = accept4$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f00000002c0)=0x10, 0x80000) lseek(r5, 0xe735, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x500) 20:10:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1009) 20:10:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) [ 3272.001059] FAULT_INJECTION: forcing a failure. [ 3272.001059] name failslab, interval 1, probability 0, space 0, times 0 [ 3272.003139] CPU: 1 PID: 31093 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3272.003830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3272.004662] Call Trace: [ 3272.004951] dump_stack+0x107/0x167 [ 3272.005327] should_fail.cold+0x5/0xa [ 3272.005708] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3272.006229] should_failslab+0x5/0x20 [ 3272.006619] __kmalloc_node+0x76/0x420 [ 3272.007029] ? lock_downgrade+0x6d0/0x6d0 [ 3272.007448] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3272.007963] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3272.008477] ? trace_hardirqs_on+0x5b/0x180 [ 3272.008922] kmem_cache_alloc_trace+0x169/0x320 [ 3272.009409] ? avc_has_perm+0x108/0x1b0 [ 3272.009822] alloc_pipe_info+0x10a/0x590 20:10:38 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 3272.010711] splice_direct_to_actor+0x774/0x980 [ 3272.013493] ? _cond_resched+0x12/0x80 [ 3272.013871] ? pipe_to_sendpage+0x380/0x380 [ 3272.014289] ? selinux_file_permission+0x92/0x520 [ 3272.014754] ? do_splice_to+0x160/0x160 [ 3272.015141] ? security_file_permission+0xb1/0xe0 [ 3272.015607] do_splice_direct+0x1c4/0x290 [ 3272.016006] ? splice_direct_to_actor+0x980/0x980 [ 3272.016438] ? security_file_permission+0xb1/0xe0 [ 3272.016856] do_sendfile+0x553/0x11e0 [ 3272.017188] ? do_pwritev+0x270/0x270 [ 3272.017514] ? wait_for_completion_io+0x270/0x270 [ 3272.017925] ? rcu_read_lock_any_held+0x75/0xa0 [ 3272.018319] ? vfs_write+0x354/0xb10 [ 3272.018641] __x64_sys_sendfile64+0x1d1/0x210 [ 3272.019024] ? __ia32_sys_sendfile+0x220/0x220 [ 3272.019415] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3272.019858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3272.020603] do_syscall_64+0x33/0x40 [ 3272.020952] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3272.021629] RIP: 0033:0x7fab3943fb19 [ 3272.021995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3272.024228] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3272.025119] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3272.026005] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3272.026873] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3272.027607] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3272.028485] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:10:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x111800, 0x41) readv(r0, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000100)=""/73, 0x49}, {&(0x7f0000000180)=""/116, 0x74}], 0x4) getsockopt$netlink(r3, 0x10e, 0x5, &(0x7f0000000300)=""/120, &(0x7f0000000380)=0x78) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000240)={0x2, {0x2, 0x1, 0x6, 0x9, 0x5, 0x3}}) 20:10:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x555) 20:10:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1109) 20:10:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4a8280, 0x2) 20:10:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f0000003000)=""/4096, 0xffffffffffffffe1}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x883) unshare(0x48020200) 20:10:38 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 20:10:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/201, 0xc9}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000140)=""/242, 0xf2}, {&(0x7f0000000240)=""/203, 0xcb}, {&(0x7f0000000340)=""/62, 0x3e}], 0x5) 20:10:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3272.428680] FAULT_INJECTION: forcing a failure. [ 3272.428680] name failslab, interval 1, probability 0, space 0, times 0 [ 3272.429943] CPU: 0 PID: 31242 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3272.430583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3272.431345] Call Trace: [ 3272.431599] dump_stack+0x107/0x167 [ 3272.431943] should_fail.cold+0x5/0xa [ 3272.435985] ? create_object.isra.0+0x3a/0xa20 [ 3272.436441] should_failslab+0x5/0x20 [ 3272.436799] kmem_cache_alloc+0x5b/0x310 [ 3272.437182] create_object.isra.0+0x3a/0xa20 [ 3272.437592] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3272.438065] __kmalloc+0x16e/0x390 [ 3272.438406] alloc_pipe_info+0x1e5/0x590 [ 3272.438788] splice_direct_to_actor+0x774/0x980 [ 3272.439223] ? _cond_resched+0x12/0x80 [ 3272.439586] ? pipe_to_sendpage+0x380/0x380 [ 3272.439989] ? selinux_file_permission+0x92/0x520 [ 3272.440448] ? do_splice_to+0x160/0x160 [ 3272.440821] ? security_file_permission+0xb1/0xe0 [ 3272.441273] do_splice_direct+0x1c4/0x290 [ 3272.441656] ? splice_direct_to_actor+0x980/0x980 [ 3272.442109] ? security_file_permission+0xb1/0xe0 [ 3272.442561] do_sendfile+0x553/0x11e0 [ 3272.442923] ? do_pwritev+0x270/0x270 [ 3272.443284] ? wait_for_completion_io+0x270/0x270 [ 3272.443735] ? rcu_read_lock_any_held+0x75/0xa0 [ 3272.444181] ? vfs_write+0x354/0xb10 [ 3272.444536] __x64_sys_sendfile64+0x1d1/0x210 [ 3272.444954] ? __ia32_sys_sendfile+0x220/0x220 [ 3272.445383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3272.445869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3272.446349] do_syscall_64+0x33/0x40 [ 3272.446696] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3272.447171] RIP: 0033:0x7fab3943fb19 [ 3272.447519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3272.449236] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3272.449936] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3272.450587] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3272.451241] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3272.451893] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3272.452580] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:10:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x600) 20:10:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f0000000040)) 20:10:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:10:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1209) 20:10:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4106, 0x100a}], 0x1) syz_io_uring_setup(0x59c4, &(0x7f0000000080)={0x0, 0x8cec, 0x8, 0x1, 0x121, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x4, 0x2000, @fd=r0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000180)="93068503614f0db0df84b16d119f", 0xe}], 0x1, 0x13, 0x1, {0x3, r2}}, 0x13) 20:10:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:10:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:10:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x200, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x883) unshare(0x48020200) [ 3287.302059] FAULT_INJECTION: forcing a failure. [ 3287.302059] name failslab, interval 1, probability 0, space 0, times 0 [ 3287.303337] CPU: 1 PID: 31346 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3287.303997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3287.304811] Call Trace: [ 3287.305041] dump_stack+0x107/0x167 [ 3287.305355] should_fail.cold+0x5/0xa [ 3287.305786] ? alloc_pipe_info+0x1e5/0x590 [ 3287.306150] should_failslab+0x5/0x20 [ 3287.306472] __kmalloc+0x72/0x390 [ 3287.306888] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3287.307324] alloc_pipe_info+0x1e5/0x590 [ 3287.307671] splice_direct_to_actor+0x774/0x980 [ 3287.308267] ? _cond_resched+0x12/0x80 [ 3287.308599] ? pipe_to_sendpage+0x380/0x380 [ 3287.309068] ? selinux_file_permission+0x92/0x520 [ 3287.309517] ? do_splice_to+0x160/0x160 [ 3287.309873] ? security_file_permission+0xb1/0xe0 [ 3287.310436] do_splice_direct+0x1c4/0x290 [ 3287.310787] ? splice_direct_to_actor+0x980/0x980 [ 3287.311411] ? security_file_permission+0xb1/0xe0 [ 3287.311823] do_sendfile+0x553/0x11e0 [ 3287.312368] ? do_pwritev+0x270/0x270 [ 3287.312693] ? wait_for_completion_io+0x270/0x270 [ 3287.313274] ? rcu_read_lock_any_held+0x75/0xa0 [ 3287.313759] ? vfs_write+0x354/0xb10 [ 3287.314081] __x64_sys_sendfile64+0x1d1/0x210 [ 3287.324795] ? __ia32_sys_sendfile+0x220/0x220 [ 3287.325183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3287.325621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3287.327145] do_syscall_64+0x33/0x40 [ 3287.327462] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3287.328977] RIP: 0033:0x7fab3943fb19 [ 3287.329294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3287.331895] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3287.333623] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3287.335300] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3287.335898] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3287.337596] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3287.338190] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:10:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000080)={0x5}) 20:10:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x700) 20:10:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) pidfd_getfd(r0, r1, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x4c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32=0xfffffffd}, @nested={0x2e, 0x9, 0x0, 0x1, [@generic="0f252d8685f0c914ee76ca0592ac9acf12aeea7223f8beb2d1f6b129e51f9411f1e7fd66940d5d7ad17e"]}]}, 0x4c}}, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r3, 0x70c79000) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) readv(r4, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000140)=""/190, 0xbe}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000200)=""/89, 0x59}], 0x4) 20:10:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='schedstat\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000001640)=""/4095, 0xef, 0x304) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) readv(r3, &(0x7f0000000200)=[{&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/128, 0x80}, {&(0x7f0000000300)=""/159, 0x9f}, {&(0x7f00000003c0)=""/211, 0xd3}], 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x2, 0x0, &(0x7f0000000040), 0x2, &(0x7f00000000c0)=ANY=[]) r5 = getpgrp(0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r7) ptrace(0x10, r5) kcmp(0x0, r5, 0x1, r1, r4) fcntl$setown(0xffffffffffffffff, 0x8, r5) waitid(0x0, r5, 0x0, 0x8, 0x0) syz_open_procfs(r5, &(0x7f0000000080)='net/tcp6\x00') 20:11:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) pwrite64(r0, &(0x7f0000001640)="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", 0x1000, 0x6) 20:11:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x804) 20:11:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1309) 20:11:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x74) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r5 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) read(r5, &(0x7f00000014c0)=""/253, 0xfd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x73) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) syz_io_uring_setup(0x3a65, &(0x7f0000000080)={0x0, 0xf106, 0x10, 0x3, 0x20210}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000340)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) r4 = getpgrp(0x0) ptrace(0x10, r4) kcmp(0x0, r4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r4) waitid(0x0, r4, 0x0, 0x8, 0x0) syz_open_procfs(r4, &(0x7f0000000300)='net/nf_conntrack_expect\x00') syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_READV=@pass_iovec={0x1, 0x5, 0x4000, @fd_index=0x1, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/254, 0xfe}, {&(0x7f0000000040)=""/1, 0x1}], 0x2, 0x1}, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xf, 0x80, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x8}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 3302.937063] FAULT_INJECTION: forcing a failure. [ 3302.937063] name failslab, interval 1, probability 0, space 0, times 0 [ 3302.940006] CPU: 0 PID: 31494 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3302.941687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3302.943666] Call Trace: [ 3302.944372] dump_stack+0x107/0x167 [ 3302.945258] should_fail.cold+0x5/0xa [ 3302.946166] ? create_object.isra.0+0x3a/0xa20 [ 3302.947309] should_failslab+0x5/0x20 [ 3302.948170] kmem_cache_alloc+0x5b/0x310 [ 3302.949103] create_object.isra.0+0x3a/0xa20 [ 3302.950097] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3302.951325] __kmalloc+0x16e/0x390 [ 3302.952200] alloc_pipe_info+0x1e5/0x590 [ 3302.953188] splice_direct_to_actor+0x774/0x980 [ 3302.954306] ? _cond_resched+0x12/0x80 [ 3302.955215] ? pipe_to_sendpage+0x380/0x380 [ 3302.956263] ? selinux_file_permission+0x92/0x520 [ 3302.957501] ? do_splice_to+0x160/0x160 [ 3302.958522] ? security_file_permission+0xb1/0xe0 [ 3302.959777] do_splice_direct+0x1c4/0x290 [ 3302.960853] ? splice_direct_to_actor+0x980/0x980 [ 3302.962099] ? security_file_permission+0xb1/0xe0 [ 3302.963365] do_sendfile+0x553/0x11e0 [ 3302.964363] ? do_pwritev+0x270/0x270 [ 3302.965364] ? wait_for_completion_io+0x270/0x270 [ 3302.966608] ? rcu_read_lock_any_held+0x75/0xa0 [ 3302.967821] ? vfs_write+0x354/0xb10 [ 3302.968791] __x64_sys_sendfile64+0x1d1/0x210 [ 3302.969946] ? __ia32_sys_sendfile+0x220/0x220 [ 3302.971052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3302.972230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3302.973401] do_syscall_64+0x33/0x40 [ 3302.974241] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3302.975389] RIP: 0033:0x7fab3943fb19 [ 3302.976233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3302.980780] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3302.982630] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3302.984224] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3302.985834] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3302.987446] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3302.989196] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='wchan\x00') syslog(0x9, 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/33}, {&(0x7f0000000080)}], 0x0) 20:11:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xc00) 20:11:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0xd7, 0x6a, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000380)={'vlan0\x00', &(0x7f00000001c0)=@ethtool_rxfh={0x47, 0x0, 0x5, 0x9, 0x1, '0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) r6 = signalfd(r1, &(0x7f00000002c0)={[0x100000001]}, 0x8) dup2(0xffffffffffffffff, r6) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1409) 20:11:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:09 executing program 4: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) getsockopt(r0, 0x10001, 0x2, &(0x7f00000000c0)=""/247, &(0x7f00000001c0)=0xf7) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') r2 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000008000)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000007e00)=[{{&(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000e00)=""/25, 0x19}, {&(0x7f0000000e00)}, {&(0x7f0000000e40)=""/32, 0x20}, {&(0x7f0000000e80)=""/204, 0xcc}], 0x4, &(0x7f0000008200)=""/102400, 0x3}, 0x4}, {{&(0x7f0000001000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001080)=""/210, 0xd2}, {&(0x7f0000001180)=""/160, 0xa0}, {&(0x7f0000001240)}, {&(0x7f0000001280)=""/240, 0xf0}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x5, &(0x7f0000008140)=""/177, 0xb1}, 0x80000001}, {{&(0x7f00000024c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000004700)=[{&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/14, 0xe}, {&(0x7f00000080c0)=""/90, 0x5a}, {&(0x7f0000003600)=""/23, 0x17}, {&(0x7f0000003640)=""/96, 0x60}, {&(0x7f00000036c0)=""/4096, 0x1000}, {&(0x7f00000046c0)}], 0x7, &(0x7f0000004780)=""/158, 0x9e}, 0xffff0000}, {{&(0x7f0000004840)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000004bc0)=[{&(0x7f00000048c0)=""/154, 0x9a}, {&(0x7f0000004980)=""/164, 0xa4}, {&(0x7f0000004a40)=""/94, 0x5e}, {&(0x7f0000004ac0)=""/194, 0xc2}], 0x4}, 0x3}, {{0x0, 0x0, &(0x7f0000005dc0), 0x4, &(0x7f0000005e00)=""/114, 0x72}, 0x28}, {{&(0x7f0000005e80)=@qipcrtr, 0x80, &(0x7f0000006180)=[{&(0x7f0000005f00)=""/227, 0xe3}, {&(0x7f0000006000)=""/88, 0x58}, {&(0x7f0000006080)=""/201, 0xc9}], 0x3, &(0x7f00000061c0)=""/82, 0x52}, 0x6}, {{&(0x7f0000006240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006780)=[{&(0x7f00000062c0)=""/156, 0xffffffffffffffdf}, {&(0x7f0000006380)=""/106, 0x6a}, {&(0x7f0000006400)=""/192, 0xc0}, {&(0x7f00000064c0)=""/137, 0x89}, {&(0x7f0000006580)=""/221, 0xdd}, {&(0x7f0000006680)=""/58, 0x3a}, {&(0x7f0000002400)=""/145, 0x8f}], 0x7, &(0x7f0000006800)=""/4096, 0x1000}, 0xc177}, {{&(0x7f0000007800)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000007d40)=[{&(0x7f0000007880)=""/160, 0xa0}, {&(0x7f0000007940)=""/119, 0x77}, {&(0x7f00000079c0)=""/143, 0x8f}, {&(0x7f0000007a80)=""/199, 0xc7}, {&(0x7f0000007b80)=""/57, 0x39}, {&(0x7f0000007bc0)=""/202, 0xca}, {&(0x7f0000007cc0)=""/93, 0x5d}], 0x7, &(0x7f0000007dc0)=""/44, 0x2c}, 0x5}], 0x8, 0x0, &(0x7f0000008040)={r3, r4+60000000}) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) sendmmsg$inet(r7, &(0x7f00000046c0)=[{{&(0x7f0000000dc0)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000003580)=[{&(0x7f0000000fc0)="cd8771abb486906ed84c2baf7827a535b3570c034fc7f0c660fc6c0c544228b75f4acb4513f2bf585e520d022296010a36796a1d12", 0x35}, {&(0x7f0000004c00)="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", 0x1000}, {&(0x7f0000005c00)="e3f36cf861117300e81f59ad9393a29e3d023854b610ee8b1b6217c93efb287056a164d235d81ffb5f6daf7ff4fbac8afb55a3ecdc1dfebf3aae0ef2cbeefb93134b55bebbe464fec6f056d9789ffe2351de79fef35ca579a26ce0691c112e277b24dc863b5f4e6136e08c01731cceab64a44571888fad412b2f205536c3ae44ce192465726a42e8eb099cf35eb5bd0328e5dcb3125dd9aff64896c78aa6dd5046439e5cefe79750a863e30926e3d4e79fb10c94", 0xb4}, {&(0x7f0000005cc0)="1814eeb59d74f9216fe73aedf861e35fa6ded93d7f8ab188e3ff2d294cc7e78feba2095c68cf68aba3b8c6af2d98160a1dfcbe4fdf0698a4326a071df37e4c52c9ace7c02bab832c0a6eda5cbad070ea72de8442b69fca06ca90aa504b78dede411b27ad7e3d55ef2ca31f1b8b09339c9a87a0e019dd675603e8ff0dde0ef6b56d085bc882388c8d681b27c2b7551d75f59920d38543c15e7298f03a6bbae8e13b5c0486f2692bb8ed936536024e05da479055743743c67b604b3de97412b0c5344dc766e1cbc589036e446bc103a7a0933754a1f811adde9e69e015", 0xdc}, {&(0x7f0000001240)="76f689ebdae3fb4e9cc7e584e51f1a9104d58e857671c6e9eee2c3d75b213f5922d3bfe578d9083f", 0x28}], 0x5, &(0x7f0000021200)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_retopts={{0x70, 0x0, 0x7, {[@generic={0x86, 0x2}, @cipso={0x86, 0x19, 0x3, [{0x0, 0x9, "a1ba055140443e"}, {0x0, 0xa, "7af74ee28e3daa49"}]}, @cipso={0x86, 0x38, 0x3, [{0x2, 0xa, "a01f236070897286"}, {0x2, 0x9, "9573c260252904"}, {0x7, 0xb, "c028717179efd587b6"}, {0x2, 0x8, "6c341efa682d"}, {0x7, 0xc, "20219bbf318b827462ae"}]}, @lsrr={0x83, 0xb, 0x81, [@broadcast, @local]}]}}}, @ip_retopts={{0x44, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0x1c, 0x48, 0x3, 0xf, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x81}, {@remote}]}, @ssrr={0x89, 0x13, 0xf0, [@rand_addr=0x64010102, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}, @end]}}}], 0xd0}}], 0x1, 0x20008004) ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f0000008080)) fcntl$dupfd(r2, 0x0, r2) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000c80), &(0x7f0000000d00)=0x68) r8 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/2681], 0xa79) readv(r1, &(0x7f0000001600), 0x0) [ 3303.488584] FAULT_INJECTION: forcing a failure. [ 3303.488584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3303.491720] CPU: 1 PID: 31622 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3303.493388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3303.495369] Call Trace: [ 3303.495989] dump_stack+0x107/0x167 [ 3303.496834] should_fail.cold+0x5/0xa [ 3303.497666] __alloc_pages_nodemask+0x182/0x600 [ 3303.498684] ? __lock_acquire+0xbb1/0x5b00 [ 3303.499601] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3303.500945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3303.502085] alloc_pages_current+0x187/0x280 [ 3303.503035] push_pipe+0x2b5/0x6d0 [ 3303.503807] _copy_to_iter+0x509/0x12d0 [ 3303.504707] ? __virt_addr_valid+0x346/0x5d0 [ 3303.505669] ? lock_downgrade+0x6d0/0x6d0 [ 3303.506557] ? SEQ_printf+0xca/0x120 [ 3303.507369] ? timer_list_start+0x2e0/0x2e0 [ 3303.508323] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3303.509425] ? __check_object_size+0x319/0x440 [ 3303.510415] seq_read_iter+0xdcb/0x12b0 [ 3303.511292] proc_reg_read_iter+0x20a/0x2e0 [ 3303.512222] generic_file_splice_read+0x455/0x6d0 [ 3303.513307] ? pipe_to_user+0x170/0x170 [ 3303.514168] ? fsnotify_perm.part.0+0x22d/0x620 [ 3303.515197] ? security_file_permission+0xb1/0xe0 [ 3303.516235] ? pipe_to_user+0x170/0x170 [ 3303.517128] do_splice_to+0x10e/0x160 [ 3303.517947] splice_direct_to_actor+0x2fe/0x980 [ 3303.518958] ? pipe_to_sendpage+0x380/0x380 [ 3303.519884] ? do_splice_to+0x160/0x160 [ 3303.520779] ? security_file_permission+0xb1/0xe0 [ 3303.521821] do_splice_direct+0x1c4/0x290 [ 3303.522720] ? splice_direct_to_actor+0x980/0x980 [ 3303.523759] ? security_file_permission+0xb1/0xe0 [ 3303.524849] do_sendfile+0x553/0x11e0 [ 3303.525673] ? do_pwritev+0x270/0x270 [ 3303.526503] ? wait_for_completion_io+0x270/0x270 [ 3303.527542] ? rcu_read_lock_any_held+0x75/0xa0 [ 3303.528578] ? vfs_write+0x354/0xb10 [ 3303.529383] __x64_sys_sendfile64+0x1d1/0x210 [ 3303.530359] ? __ia32_sys_sendfile+0x220/0x220 [ 3303.531351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3303.532548] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3303.533670] do_syscall_64+0x33/0x40 [ 3303.534490] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3303.535593] RIP: 0033:0x7fab3943fb19 [ 3303.536437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3303.540529] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3303.542183] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3303.543742] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3303.545333] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3303.546876] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3303.548455] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:11:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001580)='/proc/vmstat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000001640)=ANY=[@ANYBLOB="67204ca4880d654eaeed0abd96e25df9e8c379310c6bf83ccc1c4dc64fed791f453b69f9392fdd8c5950132f6964d208f0d7de5890d5b1f82e728036146b6de14071b5bc152c2bdffd1e273fc341a9b86e42693a091ac4614e2507b33c1c4398ca805db7ffa9563b7f2d4c4e72adc64f64480aad2a1e9d1dd7a506e338380557bd881dcb54", @ANYRES16=0x0, @ANYBLOB="010001000000ffdbdf251400000008001500ff070000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4044) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000001500)=""/4, &(0x7f0000001540)=0x4) unshare(0x48020200) 20:11:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1509) 20:11:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xd00) 20:11:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:24 executing program 6: ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f0000000580)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) r6 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x6fa3, 0x0, 0x4, 0x0, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r9, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0xfffffff7, 0x3, &(0x7f0000000300)="3bb97b96c6978d520071c6912daa5b6169a1a8eab62532d0f652684e807006dc57fffbd03fcb774f203712b50512fbc4e6cde85574c26cc7e6123fbaa727030ec57d9023b57c212c970f7f729adea826e5f03020130dcd1851848ad704a27a6af83de3c9b2aa4c3f2df46318155f553a70c228a77f73afb9b5f96fbde4b8dd321905e80ee36ca901e0959ca1d2c815175524713a5974c6c9ac75bd672cee", 0x43c, 0x0, 0x0, {0x0, r10}}, 0x80000001) syz_io_uring_submit(r3, r8, &(0x7f00000000c0)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x51) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:11:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002740)=ANY=[@ANYBLOB="280000001800210c0000000000000000020800"/36, @ANYRES32, @ANYBLOB="2a3ffa335f265c95abe877364b065ed0689fad44ad61ad0c6e198c97fc744a40c11ee77c2fe2fcaddeee9eda865f6abad92720e20f73b9eb0c92c935749d73e96f4007374239eca33ee1eb8ea0ca754f902738d04416475dcdea823ae900eebf24e9d0"], 0x28}}, 0x0) readv(r2, &(0x7f0000002640)=[{&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/170, 0xaa}, {&(0x7f00000014c0)=""/92, 0x5c}, {&(0x7f0000001540)=""/117, 0x75}, {&(0x7f00000015c0)=""/45, 0x2d}], 0x5) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000000240)=[{&(0x7f00000000c0)="f6d7eb1eccdf2047d69d41f81ccc9ec25bcfe36aade3bafcfdcb425b5ffde64dd685129a8697b8639d1dee66159fce23a693ca3e9280eb2c91e057243743661ea4f81ef53d6f7b87390079847727242014a905800e598dd4a6bfcb08de1b6082ac5a0e60ed51bd38617ec129bf53fb7440b90d913281ac054a281765eb50ecf3901d1ab8283f8f3d7ede4b204a6f413264d8a4a6f66bf16a32ce86659f82bdb5d0662206ecb550617b5b6f03f20833ef6f75386d140b57c31fafd719968ac0fc1a896e1ed10f8e1e15029fb4806a7e80e76ae06bac1bc9866555f700fb15cb8a2e457fd9e2242a58b85588", 0xeb}, {&(0x7f00000001c0)="e80552db61d1de56079afcb5a73159fe555ba6ef136f4646c108201a2db2b180db5a6237a124ef7631784cbdc5b070396e4c4bc271a32474c1cc47", 0x3b, 0x8}, {&(0x7f0000001640)="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", 0x1000, 0x50}, {&(0x7f0000000200)="efdb54105c754c96e449bcdc932cae08bca58430f1579a7db4f4586473ff5d8e233807d16776ca5301a495af448e7b309c0f6721afc108", 0x37, 0x8}], 0x41000, &(0x7f00000002c0)={[{@init_itable}, {@min_batch_time={'min_batch_time', 0x3d, 0xb4}}, {@noquota}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\\J()'}}, {@hash}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r3 = openat2(0xffffffffffffffff, &(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x200040, 0x2, 0x8}, 0x18) close_range(r1, r3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000002800), &(0x7f0000002840)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 20:11:24 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/bus/input/devices\x00', 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) recvmsg(r3, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/239, 0xef}, {&(0x7f00000001c0)=""/89, 0x59}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000300)=""/188, 0xbc}], 0x4}, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r5 = socket$netlink(0x10, 0x3, 0x14) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)={0x2b0, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@nested={0x290, 0x8d, 0x0, 0x1, [@generic="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", @generic="37f1d970f52494d3f4a23845ad2857852a42c22c09840ba7dffc87baacfb292aa01ffd23aaa9e5e9a7eafbe296cffbdd6cc3d1051eeb7169eeea2f0754c5d2d06575c63b0e8531ed03581c111e3f9815ada085ad90a4942560313716bcb09f6bd5d185ff6eccd4dd1811c6d65156e1a12f97e2ac038575df4c4d45eae569b3b10507f1527fe64886317c925e5a4059e0d43dccc1a0ac5d20dda8e9dbee7ff269ebfd", @generic="10d8a798b35e9a8322ade500974c32b66326fa6714777ac3940a207fae49c8755a807f6a2252b1883df094c8b60d566febe572462974daa7733b0a57320f32304cc098f4b5be01678576d31781bec97ca2b0ed28724adc71cdcbf9f7", @typed={0x8, 0x90, 0x0, 0x0, @ipv4=@private=0xa010102}, @generic="090a9a2975bcdf0bcd4945bdf5562747663020a69da8dd34ed014b1f1352b214a9b42d6759c01f4b8e2952576c22d1d13a7c66dc1aa1ee284e13f8a34ab2bdd13a8f97069be5e6c75311d61894e7d92d3995916503a590cda90f6be067a9f2be903a4684a10ad326d88979c842bd85a09ecbe9b99f243a5b6614eef58def02a44444115c"]}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x2b0}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r7, 0x0, r7) pwrite64(r7, &(0x7f0000001740)="443fb22b5bed37811b8a634bb07a67f29d6f9399b36bca1fd3a7c3d7897361683106d40952e88ee476c734d3849a5ea5f2c092b294fa3ee12579c6a0202387f1d7207ef4548f6affcf44bf6ec43cb4bf2d75eaa951ccb34e0afdee3072e7d48840273ed4ec81c2b55da90342c9d4a81478c16af3612b9d94016b04d16e7910f970ff0b9523f24fc366696c9044fdd481a7d898abdad99d19", 0x98, 0x80000000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r6, 0xc0189374, &(0x7f00000016c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="2af0ffff120000002e2f66696c65300031ffe10936c3dd69846795eab135be6d912d319a9cbd8a531e1effacf637ff1fc64f05928ecc8922"]) openat$vcsa(0xffffffffffffff9c, &(0x7f0000001540), 0x280000, 0x0) io_uring_setup(0x237c, &(0x7f0000001580)={0x0, 0x9a85, 0x1, 0x0, 0x2db, 0x0, r8}) [ 3318.482593] FAULT_INJECTION: forcing a failure. [ 3318.482593] name failslab, interval 1, probability 0, space 0, times 0 [ 3318.483856] CPU: 0 PID: 31749 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3318.484514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3318.485283] Call Trace: [ 3318.485537] dump_stack+0x107/0x167 [ 3318.485884] should_fail.cold+0x5/0xa [ 3318.486245] ? create_object.isra.0+0x3a/0xa20 [ 3318.486675] should_failslab+0x5/0x20 [ 3318.487039] kmem_cache_alloc+0x5b/0x310 [ 3318.487429] create_object.isra.0+0x3a/0xa20 [ 3318.487839] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3318.488329] __kmalloc_node+0x1ae/0x420 [ 3318.488722] kvmalloc_node+0x119/0x170 [ 3318.489100] seq_read_iter+0x81c/0x12b0 [ 3318.489478] ? perf_trace_lock+0xac/0x490 [ 3318.489887] proc_reg_read_iter+0x20a/0x2e0 [ 3318.490304] generic_file_splice_read+0x455/0x6d0 [ 3318.490764] ? pipe_to_user+0x170/0x170 [ 3318.491156] ? fsnotify_perm.part.0+0x22d/0x620 [ 3318.491596] ? security_file_permission+0xb1/0xe0 [ 3318.492049] ? pipe_to_user+0x170/0x170 [ 3318.492458] do_splice_to+0x10e/0x160 [ 3318.492815] splice_direct_to_actor+0x2fe/0x980 [ 3318.493281] ? pipe_to_sendpage+0x380/0x380 [ 3318.493686] ? do_splice_to+0x160/0x160 [ 3318.494059] ? security_file_permission+0xb1/0xe0 [ 3318.494930] do_splice_direct+0x1c4/0x290 [ 3318.495341] ? splice_direct_to_actor+0x980/0x980 [ 3318.496450] ? security_file_permission+0xb1/0xe0 [ 3318.497311] do_sendfile+0x553/0x11e0 [ 3318.498178] ? do_pwritev+0x270/0x270 [ 3318.499090] ? wait_for_completion_io+0x270/0x270 [ 3318.499545] ? rcu_read_lock_any_held+0x75/0xa0 [ 3318.499978] ? vfs_write+0x354/0xb10 [ 3318.500334] __x64_sys_sendfile64+0x1d1/0x210 [ 3318.500817] ? __ia32_sys_sendfile+0x220/0x220 [ 3318.501245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3318.501801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3318.502281] do_syscall_64+0x33/0x40 [ 3318.502628] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3318.503712] RIP: 0033:0x7fab3943fb19 [ 3318.504068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3318.505767] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3318.506475] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3318.507138] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3318.507794] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3318.508465] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3318.509128] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 [ 3318.522739] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:11:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x1200) 20:11:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1609) 20:11:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000100)={&(0x7f0000000040)=""/165, 0xa5}) 20:11:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:24 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000003440)=ANY=[@ANYBLOB="0100000001000000180000004a3123487da1becc0a7ddc9f486289faf3c068aac339c93117fbd251496481e1ae1714ac7fae1ed661b06302c76d228c2b591a9528f4b437f93df273d058f0341ac9d80c4a88027f8c623ad448b63a1e93c78d5b1b0537bf562523e4be21c3943ec1b1", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002e2f66696c653000cd228fd8020583d5b7cd1edd43ca76cc3aab33ea2e5b71f892baf858eafa871c969908d2e20a47113c9fa8f0249595"]) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000003240)='./binderfs/binder-control\x00', 0x800, 0x0) sendfile(r0, r2, 0x0, 0x2) sendmsg$inet6(r1, &(0x7f0000003080)={&(0x7f0000002e00)={0xa, 0x4e23, 0x8, @loopback, 0x1}, 0x1c, &(0x7f0000003000)=[{&(0x7f0000002e40)="e52a1857ec7fd3453c700aac2a18c4e59903f5d9a7fa36d65b9358a57559157ebcca47bdbeac420e28e55efa23c6c275fadb818e98c304a86a1bfaceb277b26dcb5cf5c2afafad1bae76a3a03a24d7393ff34587590f93887b4a379270bce57a19bcdeb9bad732d752cead38028f891c0cc4b6ba89610e685724586904cef7534cd0c4cd5df0721ea8392588a3247a63e2f3572b849c56f6fc9917b2e89947be1e80d7b2b741006db78bf9ac1d22ccd62fccd5d1dccd9a1394fe21742a59fcadff7f60e220167f8033", 0xc9}, {&(0x7f0000002f40)="5f06ba0f21aceebdbb55803f8128bbc4fd0a7b883d75255deb4bb5db3dcdf2127da35768751ee3c1ede92dbbb4e4c6ab820f1f4098b421062464c09dbbb27e9033937dc1700c2e271d6910f6fab99136443997367f78ac1bbe972a57ea686170f7fae3ed835f44b1b6fb900bc0d2329d27172ada8a5931bcfe5aebac28decbb383ace66f52843928dbb497bbfe1b20a481d0c1790b08085cdc7d80cde1ef11013fe5794da707237491de567534acff7bc17887d9b7f3", 0xb6}], 0x2, &(0x7f00000032c0)=ANY=[@ANYRES64=r2], 0x30}, 0x8000040) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0xf1b, &(0x7f00000030c0)={0x0, 0x9dca, 0x10, 0x0, 0x28f}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000003140)=0x0, &(0x7f0000003180)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003380)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="cccc540f2d4655f099554c46ad7fd545d813d0e0b02edcce842ddb6104ac9a8384c7ff36d3b77bd949d9aa95558dd81c501e54805da3d208376f01420a45d95b41bbd68114f1ec50eae46439ba02457a6c3860bea78baa35b3836f4b"], 0x28}}, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000003200)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, r6, 0x0, &(0x7f00000031c0)='./file0/file0\x00', 0x10c, 0x4e0440, 0x12345}, 0x9) sendmmsg$inet6(r0, &(0x7f0000005ec0)=[{{&(0x7f0000001a40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f0000004580)=[{&(0x7f0000003500)="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", 0x1000}, {&(0x7f0000003040)="a4bbe4f625386e0156f3c1477511d30d81a5a8dc34f2cf7e0995fcdc74b430f3b05fb6358ed6d808c01e98e2727c8b7be4d044184e0487", 0x37}, {&(0x7f0000003300)='o1', 0x2}, {&(0x7f0000003340)="75e4e3cfd8a592d9ef5064b3afefe735ffa1d78481afda109c2e26cfb2418a58a4fd21599c2ef1", 0x27}, {&(0x7f0000004500)="35f450553e72e73f746214bfceb49ee1bc70205b088bf31d6218ab47392030eed8ff8f0bc4f379d75f1853e164d15df7feab7493690032e8cceb04233ba4df413d3d0e6097e16e6b5b2b68121392addbdb3c2ac72413146cfbf8b36aca58a1c67b3158a14b75d09a13", 0x69}], 0x5, &(0x7f0000005f40)=[@dstopts={{0x1c0, 0x29, 0x37, {0x3b, 0x35, '\x00', [@generic={0x5, 0xfe, "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"}, @jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x9b82}, @calipso={0x7, 0x20, {0x0, 0x6, 0x5, 0x9, [0x0, 0x2, 0x1]}}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x7f}, @calipso={0x7, 0x30, {0x3, 0xa, 0x9, 0xd459, [0x3f, 0x5, 0x10001, 0x3, 0x5]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x5, [0x2, 0x0, 0x9, 0x9, 0x4a1]}}, @enc_lim={0x4, 0x1, 0x1}]}}}, @dstopts={{0x20, 0x29, 0x37, {0x0, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x7f}]}}}, @dstopts_2292={{0xe0, 0x29, 0x4, {0x6c, 0x18, '\x00', [@generic={0x2, 0xba, "faff3667f2d7382c300288ef894577edefcd3dc6f218a11b1c845dc2216b858e29611044fa1ee77c083a1f236e6d1c920c80f478cc3932ee90c99c40e7ba6e178b94649b3ed399831e8c4000cfa7d00dabc1a8865409373c3f4e8e2740aa3e50e780c869421fb2d959efb39d1ebb1fbea394cf8b4d9d5843dc274665bb2f69222c51b8828e1d66f3cb35bcc1599706b29ef6126875cd95d82843edc2939805b685ed12eed08bd10ebc32e2950b78c50452ba008eda9d259cb491"}, @jumbo]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xffffffe1}}], 0x2d8}}, {{&(0x7f0000004840)={0xa, 0x4e22, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, 0x1c, &(0x7f0000005dc0)=[{&(0x7f0000004880)="e275755c5bd178369f0c95cf03f94d40f727febad05c5151fcedbdb842c2128fc931a26152727319ea2d3b23d6fb20703a99b2e93f68ae3fc4731a269d279a3cc5368cd7b5a2b9d41c8cef82b993db3824727ea3943c0a33f1b3b13dba7caba860629f898abaee471e5bc89fc31d44e3de9783", 0x73}, {&(0x7f0000004900)="6c67373aefb43c8b6ccf4e2974ab24120d60baecc2fbd2b0282c34f3a031e0ccf1077260a7eca58a9e8354c2beb89a1d7b4570836494230058908ee8c1022a151bb29863a32800f95a4b142575b89ae1b22f6044c957d50b4c99c53661d2c2c852fa40d7a3f960f7164b6e2dadf61cd6a40e56ac18d795cd4566cc10357d9ed18e7e3549a1384f8e42d490b2d3871e3ef480a4b1e94123bfb733d1", 0x9b}, {&(0x7f00000049c0)="77f9328bf6a6b93aa3e70cabf55d464cea1685e2a73e8298adf913c03ae2662d4f", 0x21}, {&(0x7f0000004a00)="55ff2d9d6efe69174bc274c852010704c729edeec537fa7384fbc2ab0f61e9206dca364ca1085012cca84e8a9fa6c60fb2359360907b913e690445f1a19c192866df191878fb37ada8efd85d601a6d66aafebfc36d147f45632734a2d1902e676770ba51b3cf30bb689b49ceda7cdc374e53eebb853b59534803104edfbd27c3a1144ecf6e3d85", 0x87}, {&(0x7f0000004ac0)="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", 0x1000}, {&(0x7f0000005ac0)="86098989063108bcd02f58842b6c76eed3b24f1cc86f2ed09fcfe1bf01f4f7a8e91b7fede3bcdc494dcee30f9684215a0c72d76e5c65e586fec5ccd07dedc9ac36f733ae49f351d77d8989ee66c94aa91331d9bd5f32d4e8fb214f63e5208b2f2a2b6c68773792a9c58bd7cf998b3f20c5fb9fce247f33b5597ad46ef2", 0x7d}, {&(0x7f0000005b40)="dfebd73d162249f88988968d943079b686186c29c7ddab56927b2d0facd1754e6041d8b5fc442d867e070dcbf46a0bfc35ebee4308625e7115d774f44fbe78b40896d4c1b477abe6e94a91fbe99644a444e2c63136d7f9d0d0bf70b90fb182a7f743da02cf94ab0d77369ef9c829f8fcf5b149a63790b60919e7c6d0d6e7ad2f52115f19c56eca9795bfff866f3525e699172a3b44d81ad2e58e08bb240a35635505ac5f01ce478b2a5751e0ba6bf9c2729a40cad415a8084a96be611cb56d3bd2fff9e63b9e6e6712efad77a0da34707d895fda7a8620e53ee45079189b46a63dd5e50011619e229df9ff97c4e2b8af8d9be9baaf538092", 0xf8}, {&(0x7f0000004600)="662b55295359e111a588ca955e2a1e8d703a811d5389861bf3df1f05ebf27cb8e5981d0ceb00005f726b85", 0x2b}, {&(0x7f0000005c80)="f482c73661aa4c100d6d1b67be8bc7a928b9dd69e8d263e55974bdaf8717ba1ae541a4a2b4bbfb91553297b4020d5697b84ab9224e4ef0c8195927ce9ef813d9ca9bfdf7cb3f660fd0bc54107c57f5429bdb12a7460552a5d5b9e7627d092f006b160b26fa8a6bc9ff2de568f5420cbaf94a613553be6f4df37db13078165c4522b9b3d8a8088564723ecfe76db4ab806acf37fc217d5c879077df9365d0daa52541a805138627a59cf57eb9963521d9e09ab7319209e4c336ede4c2d18d749bb1e7a613cd4eb407623a071fdb8d2e480a", 0xd1}, {&(0x7f0000005d80)="d8bb38d6a857ba7a0712660c8243f01597697be58f8a19598cf1", 0x1a}], 0xa, &(0x7f0000005e80)=[@tclass={{0x14, 0x29, 0x43, 0xffffffff}}, @dstopts_2292={{0x28, 0x29, 0x4, {0xc, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @jumbo={0xc2, 0x4, 0xff}, @enc_lim={0x4, 0x1, 0x6}, @enc_lim={0x4, 0x1, 0x80}]}}}], 0x40}}], 0x2, 0x80) recvmmsg(r3, &(0x7f0000001c80)=[{{&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/95, 0x5f}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000040), 0xfffffffffffffed9}, {&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000280)=""/246, 0xf6}], 0x5, &(0x7f0000000400)=""/65, 0x41}, 0x8527}, {{&(0x7f0000000480)=@ax25={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @bcast, @netrom, @rose, @default]}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001580)=""/215, 0xd7}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000001680)=""/229, 0xe5}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001880)=""/176, 0xb0}], 0x6}, 0x10000}, {{&(0x7f00000019c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000003280)=""/10, 0xa}], 0x1, 0x0, 0x4c}, 0x5}, {{&(0x7f0000001ac0)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/8, 0x8}, {&(0x7f0000001b80)=""/171, 0xab}], 0x2}, 0xfffffc00}], 0x4, 0x120, 0x0) 20:11:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000000c0)={r5, 0x5dcc, 0xfffffffd}) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r6, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r6, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short={0x2, 0x3}}, 0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x1201) [ 3318.922016] FAULT_INJECTION: forcing a failure. [ 3318.922016] name failslab, interval 1, probability 0, space 0, times 0 [ 3318.929303] CPU: 1 PID: 31924 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3318.929958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3318.930746] Call Trace: [ 3318.931002] dump_stack+0x107/0x167 [ 3318.931351] should_fail.cold+0x5/0xa [ 3318.931723] ? create_object.isra.0+0x3a/0xa20 [ 3318.932164] should_failslab+0x5/0x20 [ 3318.932527] kmem_cache_alloc+0x5b/0x310 [ 3318.932878] create_object.isra.0+0x3a/0xa20 [ 3318.933255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3318.933688] kmem_cache_alloc_node+0x169/0x330 [ 3318.934083] __alloc_skb+0x6d/0x5b0 [ 3318.934401] alloc_skb_with_frags+0x92/0x570 [ 3318.934783] sock_alloc_send_pskb+0x7af/0x930 [ 3318.935172] ? sk_alloc+0x350/0x350 [ 3318.935485] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3318.935896] ? lock_downgrade+0x6d0/0x6d0 [ 3318.936250] ? do_raw_spin_lock+0x121/0x260 [ 3318.936650] ? wait_for_completion_io+0x270/0x270 [ 3318.937061] ? rwlock_bug.part.0+0x90/0x90 [ 3318.937435] unix_stream_sendpage+0x245/0xcd0 [ 3318.937824] ? unix_dgram_connect+0xae0/0xae0 [ 3318.938206] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3318.938671] ? kernel_sendpage.part.0+0x82/0x290 [ 3318.939076] kernel_sendpage.part.0+0x146/0x290 [ 3318.939476] sock_sendpage+0xe5/0x140 [ 3318.939808] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3318.940232] pipe_to_sendpage+0x2af/0x380 [ 3318.940618] ? propagate_umount+0x1550/0x1550 [ 3318.941007] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3318.941468] __splice_from_pipe+0x43d/0x890 [ 3318.941840] ? propagate_umount+0x1550/0x1550 [ 3318.942227] generic_splice_sendpage+0xd5/0x140 [ 3318.942625] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3318.943009] ? security_file_permission+0xb1/0xe0 [ 3318.943422] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3318.943800] direct_splice_actor+0x10f/0x170 [ 3318.944179] splice_direct_to_actor+0x387/0x980 [ 3318.944609] ? pipe_to_sendpage+0x380/0x380 [ 3318.944985] ? do_splice_to+0x160/0x160 [ 3318.945326] ? security_file_permission+0xb1/0xe0 [ 3318.945743] do_splice_direct+0x1c4/0x290 [ 3318.946097] ? splice_direct_to_actor+0x980/0x980 [ 3318.946515] ? security_file_permission+0xb1/0xe0 [ 3318.946933] do_sendfile+0x553/0x11e0 [ 3318.947268] ? do_pwritev+0x270/0x270 [ 3318.947597] ? wait_for_completion_io+0x270/0x270 [ 3318.948011] ? rcu_read_lock_any_held+0x75/0xa0 [ 3318.948414] ? vfs_write+0x354/0xb10 [ 3318.948740] __x64_sys_sendfile64+0x1d1/0x210 [ 3318.949125] ? __ia32_sys_sendfile+0x220/0x220 [ 3318.949518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3318.949967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3318.950410] do_syscall_64+0x33/0x40 [ 3318.950727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3318.951162] RIP: 0033:0x7fab3943fb19 [ 3318.951481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3318.953103] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3318.953748] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3318.954347] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3318.954947] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3318.955549] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000001 [ 3318.956150] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:39 executing program 4: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0x4e23, 0x9, @remote, 0xffffffff}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="508c4beb1e748a08a9c5f10c77d736dd3b0db16239dc65c3c3e363a864c76db8bbc303221f0fccf2a3f916edbf3cf01784680d9930850cfc0408448a04c78f282c8ca55a4329eca8a2ab8f22a54183563b25bc29431c3999ea0992eadcb0e024389834fa2159df1a47cde3d71dabf42ed9ec0cc16a02428185", 0x79}], 0x1, &(0x7f0000000140)=[@dstopts_2292={{0x70, 0x29, 0x4, {0x5e, 0xb, '\x00', [@ra={0x5, 0x2, 0x4}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x6, 0x4a, "3ead0cc968caff8b26900f4dac4bc9082d80e0fc7491f27f849668526b32f3a77a46951531c718cd229f25cf53e7066231d839fa51007593b8d876109801894f58a2f2256a89ee3a13eb"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x1d, 0x5, '\x00', [@ra={0x5, 0x2, 0xfff}, @pad1, @ra={0x5, 0x2, 0x6}, @ra={0x5, 0x2, 0x7fff}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0x8}, @jumbo={0xc2, 0x4, 0x2}, @ra={0x5, 0x2, 0x71d}, @jumbo={0xc2, 0x4, 0x4}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x33, 0xa, 0x2, 0x5, 0x0, [@mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, @private0, @empty, @mcast1]}}}, @dstopts={{0x20, 0x29, 0x37, {0x67, 0x1, '\x00', [@generic={0xff, 0x6, "6a0f9e313a45"}]}}}, @rthdrdstopts={{0x78, 0x29, 0x37, {0x2, 0xb, '\x00', [@calipso={0x7, 0x8, {0x3, 0x0, 0x4, 0x2}}, @pad1, @pad1, @generic={0x1a, 0x35, "f30d49280dc1f92fcccef9aee16057b22f15f0e531848e67cac558863ae861d6a4272583b40b4d7738dc784df035f67a1b1de5ccc3"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}}}], 0x1d0}, 0x4000840) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002b80)=[{{&(0x7f0000002980)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, '\x00', 0x1b}, 0x4}, 0x1c, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="aa33a48f7aa1b224553f7c979f2e7fc63d", 0x11}, {&(0x7f0000002a00)="df5098ade5bf43f4b5bddc7a464305347a", 0x11}, {&(0x7f0000002a40)="4505a5215f93476108896810887fba1b19342c80223245e00c8e19ad049c40f0deed95298ae4da6334ea2edcf60ecaa0b8842a3231e3209322d16a287846665079f138222f409c82df3e827d5b71350fc526bf4795ee9042bc63bb49df268e", 0x5f}], 0x3, &(0x7f0000002b00)=[@rthdr={{0x38, 0x29, 0x39, {0xcea0e28436082e84, 0x4, 0x1, 0x40, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x50}}], 0x1, 0x2004018) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = syz_open_dev$vcsu(&(0x7f0000001580), 0x7ff, 0x80000) sendmsg$nl_xfrm(r1, &(0x7f0000002940)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002900)={&(0x7f0000001640)=@delsa={0x12bc, 0x11, 0x200, 0x70bd2b, 0x25dfdbfd, {@in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4d5, 0xa, 0x3c}, [@user_kmaddress={0x2c, 0x13, {@in6=@dev={0xfe, 0x80, '\x00', 0x1e}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xa}}, @tmpl={0xc4, 0x5, [{{@in=@loopback, 0x4d3, 0x6c}, 0x3, @in6=@dev={0xfe, 0x80, '\x00', 0x32}, 0x0, 0x4, 0x2, 0x6, 0x9, 0xcf, 0xe5d0}, {{@in=@remote, 0x4d6, 0x3c}, 0x0, @in6=@mcast2, 0x34ff, 0x2, 0x2, 0x7, 0x5, 0x4}, {{@in6=@private1, 0x4d6, 0x32}, 0x2, @in=@multicast2, 0x3506, 0x1, 0x0, 0x6, 0x40000, 0x1, 0x1000}]}, @mark={0xc, 0x15, {0x35075d, 0x4}}, @encap={0x1c, 0x4, {0x2, 0x4e23, 0x4e24, @in6=@dev={0xfe, 0x80, '\x00', 0x30}}}, @algo_comp={0x1048, 0x3, {{'lzs\x00'}, 0x8000, "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"}}, @migrate={0x134, 0x11, [{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@remote, @in6=@dev={0xfe, 0x80, '\x00', 0x13}, @in=@multicast2, 0x3c, 0x1, 0x0, 0x3504, 0x455f393a77655327}, {@in=@multicast2, @in=@empty, @in=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x32, 0x1a7001a409299b11, 0x0, 0x3502, 0xa, 0x2}, {@in=@private=0xa010100, @in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x3f}, @in6=@empty, 0x33, 0x1, 0x0, 0x3501, 0x2, 0xa}, {@in=@loopback, @in=@remote, @in=@multicast2, @in=@multicast1, 0xff, 0x2, 0x0, 0x3505, 0x2, 0x2}]}]}, 0x12bc}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f00000003c0)={'gre0\x00', 0x0, 0x40, 0x8000, 0x4, 0x1, {{0x11, 0x4, 0x0, 0x8, 0x44, 0x68, 0x0, 0xfc, 0x4, 0x0, @local, @multicast1, {[@rr={0x7, 0x1b, 0xf9, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x44}, @private=0xa010101, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0x5f, 0x1, 0x1, [{@private=0xa010102, 0x80000000}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000001540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f00000014c0)={0x64, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x20}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xffffffff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x64}}, 0x2000c041) 20:11:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') sendfile(r0, r0, &(0x7f0000000040)=0x2988, 0x203) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) 20:11:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000300), 0xe}, 0x0, 0x9, 0x0, 0x3, 0x1, 0x400040, 0xffed}, 0xffffffffffffffff, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_open_procfs(r2, &(0x7f00000002c0)='net/ip_mr_cache\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3f21, &(0x7f00000000c0)={0x0, 0x3a49, 0x4, 0x3, 0x255}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x3f, &(0x7f00000004c0)=[0xffffffffffffffff, r2, r2, 0xffffffffffffffff], 0x4, 0x0, 0x0, {0x0, r3}}, 0x3) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x0, {0x0, r3}}, 0x7fffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:11:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x4000) 20:11:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x2000) 20:11:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/224, 0xe0}], 0x10000000000001f6) [ 3333.409476] FAULT_INJECTION: forcing a failure. [ 3333.409476] name failslab, interval 1, probability 0, space 0, times 0 [ 3333.410763] CPU: 0 PID: 32014 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3333.411406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3333.412179] Call Trace: [ 3333.412432] dump_stack+0x107/0x167 [ 3333.412798] should_fail.cold+0x5/0xa [ 3333.413164] should_failslab+0x5/0x20 [ 3333.413522] __kmalloc_node_track_caller+0x74/0x3b0 [ 3333.413989] ? alloc_skb_with_frags+0x92/0x570 [ 3333.414416] __alloc_skb+0xb1/0x5b0 [ 3333.414758] alloc_skb_with_frags+0x92/0x570 [ 3333.415174] sock_alloc_send_pskb+0x7af/0x930 [ 3333.415598] ? sk_alloc+0x350/0x350 [ 3333.415938] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3333.416385] ? lock_downgrade+0x6d0/0x6d0 [ 3333.416821] ? do_raw_spin_lock+0x121/0x260 [ 3333.417284] ? wait_for_completion_io+0x270/0x270 [ 3333.417790] ? rwlock_bug.part.0+0x90/0x90 [ 3333.418246] unix_stream_sendpage+0x245/0xcd0 [ 3333.418670] ? unix_dgram_connect+0xae0/0xae0 [ 3333.419093] ? ktime_get_coarse_real_ts64+0x97/0x190 [ 3333.419569] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3333.420043] kernel_sendpage.part.0+0x146/0x290 [ 3333.420483] sock_sendpage+0xe5/0x140 [ 3333.420841] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3333.421305] pipe_to_sendpage+0x2af/0x380 [ 3333.421693] ? propagate_umount+0x1550/0x1550 [ 3333.422112] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3333.422607] __splice_from_pipe+0x43d/0x890 [ 3333.423015] ? propagate_umount+0x1550/0x1550 [ 3333.423436] generic_splice_sendpage+0xd5/0x140 [ 3333.423866] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3333.424285] ? security_file_permission+0xb1/0xe0 [ 3333.424779] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3333.425241] direct_splice_actor+0x10f/0x170 [ 3333.426206] splice_direct_to_actor+0x387/0x980 [ 3333.427283] ? pipe_to_sendpage+0x380/0x380 [ 3333.428252] ? do_splice_to+0x160/0x160 [ 3333.429204] ? security_file_permission+0xb1/0xe0 [ 3333.430316] do_splice_direct+0x1c4/0x290 [ 3333.431263] ? splice_direct_to_actor+0x980/0x980 [ 3333.432360] ? security_file_permission+0xb1/0xe0 [ 3333.433480] do_sendfile+0x553/0x11e0 [ 3333.434359] ? do_pwritev+0x270/0x270 [ 3333.435217] ? wait_for_completion_io+0x270/0x270 [ 3333.436316] ? rcu_read_lock_any_held+0x75/0xa0 [ 3333.437371] ? vfs_write+0x354/0xb10 [ 3333.438222] __x64_sys_sendfile64+0x1d1/0x210 [ 3333.439218] ? __ia32_sys_sendfile+0x220/0x220 [ 3333.440255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3333.441456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3333.442620] do_syscall_64+0x33/0x40 [ 3333.443460] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3333.444644] RIP: 0033:0x7fab3943fb19 [ 3333.445502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3333.449791] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3333.451517] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3333.453154] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3333.454802] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3333.456429] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3333.458084] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r0, @ANYRES16=r1, @ANYRES64]) r3 = getpgrp(0x0) ptrace(0x10, r3) kcmp(0x0, r3, 0x1, 0xffffffffffffffff, r2) fcntl$setown(0xffffffffffffffff, 0x8, r3) waitid(0x0, r3, 0x0, 0x8, 0x0) recvmsg$unix(r1, &(0x7f0000001940)={&(0x7f00000014c0)=@abs, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001640)=""/212, 0xd4}, {&(0x7f0000001540)=""/181, 0xb5}, {&(0x7f0000001740)=""/81, 0x51}, {&(0x7f00000017c0)=""/160, 0xa0}], 0x4, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x20) r5 = syz_open_procfs(r4, &(0x7f00000019c0)='net/rt_cache\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:11:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x2103) 20:11:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite6\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:11:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f00000002c0)="5e9774ada2b84f78025e7721f5a9c3cde2aaa96888616c5d03582a5ce4066bb4e19597f8a25c633b324fb8a5544c001483e38afa178cc5c732c80a167b65a0c8f3e167d535d73cfd85e3cb04ced905b68b298b61ddb73da6fa5a84d75d984e521e695bec4cabdeeba328", 0x6a, 0xd19) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xffff) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000001580)={{'\x00', 0x1}, {0x6}, 0x2, 0x0, 0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)="aca73bacaf0fa682eb61e23ab30c1016c43ce06731da7dcc6762e002ef6240d8fb90217d3011d6206ad9b4c3dc793940329bbaf2ab8987528680d9bd5dbce60d3049e1a10f66702d6f4f40c443b503152e00b4ddaca5a84c2ad07728936cebca7b9f241e568cf7b6f9035d8d3df8f6e17c5f189a810cd46060f579d932e6b945fc4ab412c36d29f65f852d", 0x8b, 0x0, &(0x7f0000001640)={0x2, 0x108, {0x1, 0xc, 0x38, "6eba3e6a7263aad62686629d2582c73766fc5d2a49fcded5838cb461560be743402cc9c4cb75d6cfcf15d4090cdcdfa7f74affb68e01ede0", 0xc3, "b8d07893aff1215d27bc9d09658a62b607a0322ba402428c33878515c407a20a80b67c701bf6b8e1e8e63210b89025c6368970d409cc403bfec529e9b4b25ca4eb48dd31f7c194f0b7110c5c989751da54a2663102e842fea36a305bbb7b703e3d6f2b733f8c77f60f48d7ac34220e4e76047ea984e3107ce70a8d220fc77b5e41cb43bde6896969a9a7a183987c7dc08c958561a83f3edc264e4b4fd8c4f4f03deef5c5235058580bee649ae9bc330c882a5eb8e828e013992f7d6116769e4c8d2dc3"}, 0x21, "d32be5962fdcd097690e54a382ee87b5ad93745a16bc7e5186af3698288c15b88f"}, 0x135}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000001780)='./file0/../file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x80800) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x3e}], 0x0) read(r0, &(0x7f0000000100)=""/91, 0x5b) 20:11:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x8004) 20:11:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/172, 0xac}, {&(0x7f0000000280)=""/248, 0xf8}], 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) sendto(r0, &(0x7f0000000380)="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", 0xfc, 0x841, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}, 'veth1_macvtap\x00'}}, 0x80) 20:11:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 11) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3334.403524] FAULT_INJECTION: forcing a failure. [ 3334.403524] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.405434] CPU: 1 PID: 32153 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3334.406024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.406789] Call Trace: [ 3334.407022] dump_stack+0x107/0x167 [ 3334.407389] should_fail.cold+0x5/0xa [ 3334.407719] ? create_object.isra.0+0x3a/0xa20 [ 3334.408174] should_failslab+0x5/0x20 [ 3334.408523] kmem_cache_alloc+0x5b/0x310 [ 3334.408889] create_object.isra.0+0x3a/0xa20 [ 3334.409488] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3334.409928] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3334.410410] ? alloc_skb_with_frags+0x92/0x570 [ 3334.410801] __alloc_skb+0xb1/0x5b0 [ 3334.411123] alloc_skb_with_frags+0x92/0x570 [ 3334.411501] sock_alloc_send_pskb+0x7af/0x930 [ 3334.411889] ? sk_alloc+0x350/0x350 [ 3334.412208] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3334.412647] ? lock_downgrade+0x6d0/0x6d0 [ 3334.413010] ? do_raw_spin_lock+0x121/0x260 [ 3334.413384] ? wait_for_completion_io+0x270/0x270 [ 3334.413791] ? rwlock_bug.part.0+0x90/0x90 [ 3334.414163] unix_stream_sendpage+0x245/0xcd0 [ 3334.414555] ? unix_dgram_connect+0xae0/0xae0 [ 3334.414940] ? trace_hardirqs_on+0x5b/0x180 [ 3334.415314] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3334.415747] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3334.416180] ? atime_needs_update+0x291/0x600 [ 3334.416600] kernel_sendpage.part.0+0x146/0x290 [ 3334.416999] sock_sendpage+0xe5/0x140 [ 3334.417327] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3334.417749] pipe_to_sendpage+0x2af/0x380 [ 3334.418103] ? propagate_umount+0x1550/0x1550 [ 3334.418488] ? __splice_from_pipe+0x210/0x890 [ 3334.418876] __splice_from_pipe+0x43d/0x890 [ 3334.419247] ? propagate_umount+0x1550/0x1550 [ 3334.419638] generic_splice_sendpage+0xd5/0x140 [ 3334.420032] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3334.420415] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3334.420822] direct_splice_actor+0x10f/0x170 [ 3334.421198] splice_direct_to_actor+0x387/0x980 [ 3334.421596] ? pipe_to_sendpage+0x380/0x380 [ 3334.421966] ? do_splice_to+0x160/0x160 [ 3334.422307] ? security_file_permission+0xb1/0xe0 [ 3334.422723] do_splice_direct+0x1c4/0x290 [ 3334.423078] ? splice_direct_to_actor+0x980/0x980 [ 3334.423491] ? security_file_permission+0xb1/0xe0 [ 3334.423909] do_sendfile+0x553/0x11e0 [ 3334.424240] ? do_pwritev+0x270/0x270 [ 3334.424620] ? wait_for_completion_io+0x270/0x270 [ 3334.425038] ? rcu_read_lock_any_held+0x75/0xa0 [ 3334.425448] ? vfs_write+0x354/0xb10 [ 3334.426515] __x64_sys_sendfile64+0x1d1/0x210 [ 3334.426897] ? __ia32_sys_sendfile+0x220/0x220 [ 3334.427343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3334.427784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3334.428269] do_syscall_64+0x33/0x40 [ 3334.428838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3334.429333] RIP: 0033:0x7fab3943fb19 [ 3334.429649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.431327] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3334.431964] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3334.433113] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3334.433711] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3334.434384] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3334.434984] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:11:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000040)={0x2, 0xfffffffe, 0x1, 'queue1\x00', 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:11:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={r1, r2/1000+10000}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) close_range(r3, r4, 0x0) r5 = syz_io_uring_setup(0x2ea0, &(0x7f00000000c0)={0x0, 0x545a, 0x8, 0x1, 0x125, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) r7 = pidfd_getfd(r0, r5, 0x0) io_uring_enter(r7, 0x6e45, 0x7e2a, 0x3, &(0x7f0000000200)={[0x2]}, 0x8) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f00000001c0)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1f, 0x1, {0x0, r8}}, 0x0) 20:11:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x84ea1740ebdc17b4) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x20, 0x80, 0x9, 0x2, 0x0, 0x7, 0x40000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x83, 0x1, @perf_config_ext={0x3, 0x96b0}, 0x0, 0x3, 0x4, 0x1, 0x4, 0x56, 0x3, 0x0, 0xfffffffa, 0x0, 0x5}, r2, 0x4, r1, 0x2) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000340)='./file0/../file0\x00', 0x2, 0x9, &(0x7f0000001a80)=[{&(0x7f00000014c0)="8c99e17428d8670e66221e1d8a8973ba0aaa5628ec802a9af0d3b0119a8bf3833ab62a15f506d96efe6ca5b79be6435bb1f912ed2985adc32335550bd433cdae31e0884adbe7ffd62e22f704527df1057dce3addd2428e43f182ecf613046aef74641f02962a4391cb5d4e75c74d31217dc36c1fe2ec8af5c89d98bae78e08405cc646b28e64523baa43b9ec31994916590d36b939d3004c293d40c19a6c6b1ff71b1049acfaba2b4af8372bf2ccd9bdf83f924d15cd27a63c767b1010ba7dd9b4396e6a4d3637206bb9ef6ec19f0f4134dc158697537e3ea274c8e1a72ccb1db87693f9de480be46010b71048398fdf", 0xf0, 0xff}, {&(0x7f00000015c0)="c33e2aeb287e74b419ec0620", 0xc, 0xae6}, {&(0x7f0000001640)="9c0c194f0edf404596a7049cb84c46c256036bbb3225b22ff1850edb6a1cf3f9c8bdb0104bec49d66a1b67aa3d0c4a15febe3d25dbb9555f4e9f1e9bbfaf20bd24037381db9c25457feaccf604", 0x4d, 0x8000}, {&(0x7f00000016c0)="b3a23d2dcd9207158e72e1de8b94fdf25076539297b056872b3d9643b3dbe56f0c796f7080ce655693d8a6c90437fc56a91704f471270b6af88aa05b2797a09c48a273eaa94dc68205fdbfc212a7ac6a2efd9d1a7ef4419f2dc032c06e79dd557219477f6ac785b8a7d705434078876db01d86e91afc93f1b4a8c41fe12785ecf9c08972dbe3d694defa061968f30f52f41c65d0fed5bfdae45fa38c951d400a9d55f9f979510a210f2e246ec55067c0f007a322b7338c608f8834cf24042f8547378849cd5576a985e93e7979958fda984fae878601ec30032b0e95412620fac48a877e8b8aba4ff5a835da7ef20d428ee7c3533220a1", 0xf7, 0x52ef}, {&(0x7f00000017c0)="aca209e9808e7aad9c8ed1e7c109224d9210dede2d930812ad9809a18a04cbbf74bf374e4b3dca86ee8f56a1056a1ccf9da5c5", 0x33, 0x7}, {&(0x7f0000001800)="514e13e456804626eb757a885bfd086e960569e32b8b94f6d69f61cbedf47223e2143ed7aec0c8fb69f3bc8ed14f3df52c8d5bcadf68e2e41724af14c0e833cc89f207ecc0ebc7caa2072d2c3bcb01d2559b6158ec45eac6b39d7d42fffef12129b19f0a0d1f665d0829c88bb3a158e21ee3330e3244916f758a61c49fe9e35ddc309e9df71073", 0x87, 0x2}, {&(0x7f00000018c0)="bc10e5aa9b830485d9fd11aefda275a3a2b50c7374d8e67dafbf3f974925c0e20945e6f4b4a38b97974bbdb675e2cd695c4fc784132fdcf7c85ecd982785a91c1d630cf3c7eaf99adbb03ec235c650d0b10749040d743814d2a1ec49fa208cd1cf5ea8558ed3db36dadc6a755b9552c8452cb4325a5bca6b6fbb40853bc35748457d092deb3829d56b121cf07c6d1a3f79c6421ffd1d8568b96189ddb4ef3dcfd2fdb7e0078f4d01525fabc07be7cb6792f1d112fd68444ed862b37d7a42ec67b138048649b004c4df39f1ae7125b7db27", 0xd1}, {&(0x7f00000019c0)="2f94147a208340bfc103c8d61cce07aa3ae45149c8f54be562c65cfc38a5277ac3fb37fa42099ba42c23d6649e4eba7efa8d58a517a9d534f09e386a9795448df7b5e1e843dc9d7bbc0aa81cc568f44b4dad95ff712e85646e9e6226ff52f884", 0x60, 0x6}, {&(0x7f0000001a40)="f2d722a02e4403377f1a7f9259f9b70ede", 0x11, 0x137}], 0x1108464, &(0x7f0000001b80)={[{'*\''}, {'L-'}, {'fd/4\x00'}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@dont_measure}, {@pcr={'pcr', 0x3d, 0x3f}}, {@smackfshat={'smackfshat', 0x3d, 'trusted.overlay.nlink\x00'}}, {@obj_user={'obj_user', 0x3d, 'mounts\x00'}}, {@pcr={'pcr', 0x3d, 0xe}}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:11:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}, 0x0, 0x20000040}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1d}, 0x80000001) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001800210c2a000000000000000200e95e5e293e5e128f00003a482e4eec9b701c256f629d08000200", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r5, 0x3, {0x0, r6}, 0x0, 0x5, 0x2ef32ecc8386864c, {0x0, 0x0, r7}}, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000180)=0xffffffff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:11:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xc601) 20:11:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x2400) [ 3349.006552] FAULT_INJECTION: forcing a failure. [ 3349.006552] name failslab, interval 1, probability 0, space 0, times 0 [ 3349.009694] CPU: 1 PID: 32265 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3349.010598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3349.012819] Call Trace: [ 3349.013067] dump_stack+0x107/0x167 [ 3349.013381] should_fail.cold+0x5/0xa [ 3349.013706] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3349.014149] should_failslab+0x5/0x20 [ 3349.014471] __kmalloc_node+0x76/0x420 [ 3349.017663] ? lock_downgrade+0x6d0/0x6d0 [ 3349.018069] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3349.018558] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3349.020427] ? trace_hardirqs_on+0x5b/0x180 [ 3349.020846] kmem_cache_alloc_node+0x181/0x330 [ 3349.021307] __alloc_skb+0x6d/0x5b0 [ 3349.022093] alloc_skb_with_frags+0x92/0x570 [ 3349.022471] sock_alloc_send_pskb+0x7af/0x930 [ 3349.022854] ? sk_alloc+0x350/0x350 [ 3349.023737] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3349.025350] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3349.025362] ? lock_downgrade+0x6d0/0x6d0 [ 3349.025375] ? do_raw_spin_lock+0x121/0x260 [ 3349.025388] ? wait_for_completion_io+0x270/0x270 [ 3349.025399] ? rwlock_bug.part.0+0x90/0x90 [ 3349.025421] unix_stream_sendpage+0x245/0xcd0 [ 3349.025440] ? unix_dgram_connect+0xae0/0xae0 [ 3349.025452] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3349.025469] ? kernel_sendpage.part.0+0xb3/0x290 [ 3349.025480] ? kernel_sendpage.part.0+0x15e/0x290 [ 3349.025495] kernel_sendpage.part.0+0x146/0x290 [ 3349.025510] sock_sendpage+0xe5/0x140 [ 3349.025524] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3349.025535] pipe_to_sendpage+0x2af/0x380 [ 3349.025566] ? propagate_umount+0x1550/0x1550 [ 3349.025579] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3349.025595] __splice_from_pipe+0x43d/0x890 [ 3349.025609] ? propagate_umount+0x1550/0x1550 [ 3349.025626] generic_splice_sendpage+0xd5/0x140 [ 3349.025637] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3349.025657] ? security_file_permission+0xb1/0xe0 [ 3349.025670] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3349.025693] direct_splice_actor+0x10f/0x170 [ 3349.025707] splice_direct_to_actor+0x387/0x980 [ 3349.025722] ? pipe_to_sendpage+0x380/0x380 [ 3349.025736] ? do_splice_to+0x160/0x160 [ 3349.025749] ? security_file_permission+0xb1/0xe0 [ 3349.025766] do_splice_direct+0x1c4/0x290 [ 3349.025778] ? splice_direct_to_actor+0x980/0x980 [ 3349.025795] ? security_file_permission+0xb1/0xe0 [ 3349.025814] do_sendfile+0x553/0x11e0 [ 3349.025832] ? do_pwritev+0x270/0x270 [ 3349.025846] ? wait_for_completion_io+0x270/0x270 [ 3349.025915] ? rcu_read_lock_any_held+0x75/0xa0 [ 3349.025926] ? vfs_write+0x354/0xb10 [ 3349.025942] __x64_sys_sendfile64+0x1d1/0x210 [ 3349.025956] ? __ia32_sys_sendfile+0x220/0x220 [ 3349.025971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3349.025983] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3349.026008] do_syscall_64+0x33/0x40 [ 3349.026020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3349.026029] RIP: 0033:0x7fab3943fb19 [ 3349.026041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3349.026048] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3349.026062] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3349.026069] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3349.026077] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3349.026084] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3349.026091] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:11:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xa100, 0x0) ioctl(r1, 0x6, &(0x7f0000000080)="c6f173277bdab62a9f397ff6de09a9857db3a473e2f36485df0d8644ca48aba1391fab4f45d8f2940a3e9fd311c4cc49d00fe01f3b4f308e1f11429eefe911a28740047a26d5eb9d6e2ad53b25db98cba612497a6c1265a9b513318d0154d03373e10668e6448d46ca0c399e129e7155828c69b3419a72182045052e169da7c48cc504b257d71085946809677be9953dd70612d706fa5367cb258d30c25c4de96474f286d8f0c418b817a53d39cdaf97a50c96a21ce70989f017e8413ceb5edbd12cec002d7bae2aeeca49b9b3c0e4b31130fd91f6317fd11d3a4dc77b744016ee47d67cd4124173") ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000180)={{0x0, 0x6}, {0x5, 0x6}, 0xe4f}) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) [ 3349.195560] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 20:12:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x303a) 20:12:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8000}}, '\x00'}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000340)=0x1) r2 = openat2(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x880, 0x2, 0x4}, 0x18) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f00000001c0)) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4104, 0x1008}], 0x1) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000180021000000000000000000020000000804020002a5f2d515155e0000000000", @ANYRES32, @ANYBLOB="5a0100000000000000"], 0x28}}, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r5], 0x1) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x3f, &(0x7f00000004c0)=[0xffffffffffffffff, r3, r3, 0xffffffffffffffff], 0x4, 0x0, 0x0, {0x0, r6}}, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x4001}, 0x0, {0x0, r6}}, 0x4a) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f00000000c0), 0x0) 20:12:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 13) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:12:10 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) finit_module(r0, &(0x7f0000000080)='mounts\x00', 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f0000001640)=""/4107, 0x100b}], 0x1) readv(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f00000001c0)=""/180, 0xb4}, {&(0x7f0000000280)=""/104, 0x68}, {&(0x7f0000000300)=""/103, 0x67}], 0x4) 20:12:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x80000) 20:12:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2, 0x10000000}, 0x54801, 0x0, 0x0, 0x3, 0x1, 0x40, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) write$binfmt_elf64(r0, &(0x7f0000001640)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x0, 0x9, 0x5, 0x6, 0x1, 0x3, 0x3f, 0x168, 0x40, 0x2cc, 0x5, 0x6, 0x38, 0x1, 0x5, 0x0, 0x3f}, [{0x1, 0x8, 0x6, 0x7, 0x19d, 0xc8, 0x6, 0x5}, {0x6, 0x6, 0x7, 0x8000, 0x5, 0x1, 0xfffffffffffffffe, 0x852}], "4f94759c5d06bc2bd9510c9c858cdd2bf15ecbeef1e0e3e96483dd4ab09a841f96fbcbe230506352f5a301d77aaca151200b66e66c12599a29fa6ba307753c608e552219bc3a4b07ab892d9cff713c7143bfe30bc2682572e26a029c9165bcd8172e7cc23efa9f9f52d60a32a3a389b93b5c", ['\x00', '\x00', '\x00', '\x00']}, 0x522) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r6 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0, 0x155) openat(r6, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r6, &(0x7f0000000380)=""/78, 0x4e) syz_open_procfs(r3, &(0x7f00000000c0)='stat\x00') bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000300)={0x24, @none={0x0, 0x3}}, 0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r5, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], 0x883) unshare(0x48020200) 20:12:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3364.207847] FAULT_INJECTION: forcing a failure. [ 3364.207847] name failslab, interval 1, probability 0, space 0, times 0 [ 3364.220938] CPU: 1 PID: 32395 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3364.225164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3364.227533] Call Trace: [ 3364.228217] dump_stack+0x107/0x167 [ 3364.229268] should_fail.cold+0x5/0xa [ 3364.230409] ? create_object.isra.0+0x3a/0xa20 [ 3364.236537] should_failslab+0x5/0x20 [ 3364.237551] kmem_cache_alloc+0x5b/0x310 [ 3364.237938] create_object.isra.0+0x3a/0xa20 [ 3364.238453] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3364.238944] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 3364.239550] ? alloc_skb_with_frags+0x92/0x570 [ 3364.239961] __alloc_skb+0xb1/0x5b0 [ 3364.240298] alloc_skb_with_frags+0x92/0x570 [ 3364.242005] sock_alloc_send_pskb+0x7af/0x930 [ 3364.244981] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3364.245470] ? sk_alloc+0x350/0x350 [ 3364.245493] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3364.249855] ? lock_downgrade+0x6d0/0x6d0 [ 3364.251013] ? do_raw_spin_lock+0x121/0x260 [ 3364.252236] ? wait_for_completion_io+0x270/0x270 [ 3364.253521] ? rwlock_bug.part.0+0x90/0x90 [ 3364.254724] ? __lockdep_reset_lock+0x180/0x180 [ 3364.255932] unix_stream_sendpage+0x245/0xcd0 [ 3364.262569] ? unix_dgram_connect+0xae0/0xae0 [ 3364.264219] ? _raw_spin_unlock_irq+0x1f/0x30 [ 3364.266371] ? _raw_spin_unlock_irq+0x27/0x30 [ 3364.267774] kernel_sendpage.part.0+0x146/0x290 [ 3364.269763] sock_sendpage+0xe5/0x140 [ 3364.271390] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3364.273453] pipe_to_sendpage+0x2af/0x380 [ 3364.275253] ? propagate_umount+0x1550/0x1550 [ 3364.277287] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3364.278872] __splice_from_pipe+0x43d/0x890 [ 3364.281771] ? propagate_umount+0x1550/0x1550 [ 3364.283445] generic_splice_sendpage+0xd5/0x140 [ 3364.285565] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3364.287340] ? security_file_permission+0xb1/0xe0 [ 3364.289169] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3364.290834] direct_splice_actor+0x10f/0x170 [ 3364.292426] splice_direct_to_actor+0x387/0x980 [ 3364.293619] ? pipe_to_sendpage+0x380/0x380 [ 3364.294618] ? do_splice_to+0x160/0x160 [ 3364.295553] ? security_file_permission+0xb1/0xe0 [ 3364.296754] do_splice_direct+0x1c4/0x290 [ 3364.297147] ? splice_direct_to_actor+0x980/0x980 [ 3364.297602] ? security_file_permission+0xb1/0xe0 [ 3364.298050] do_sendfile+0x553/0x11e0 [ 3364.298410] ? do_pwritev+0x270/0x270 [ 3364.298769] ? wait_for_completion_io+0x270/0x270 [ 3364.299205] ? rcu_read_lock_any_held+0x75/0xa0 [ 3364.299623] ? vfs_write+0x354/0xb10 [ 3364.299976] __x64_sys_sendfile64+0x1d1/0x210 [ 3364.300389] ? __ia32_sys_sendfile+0x220/0x220 [ 3364.300855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3364.301327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3364.301805] do_syscall_64+0x33/0x40 [ 3364.302154] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3364.302617] RIP: 0033:0x7fab3943fb19 [ 3364.302964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3364.304387] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3364.305102] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3364.305738] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3364.306414] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3364.307067] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3364.307709] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:12:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:12:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:12:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000240)) r4 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x2018, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x19, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) readv(r4, &(0x7f0000000200)=[{&(0x7f0000000040)=""/99, 0x63}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/58, 0x3a}], 0x4) 20:12:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x303e) 20:12:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0xc0000) 20:12:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x408000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001800040000000000000000000200000008000200080000000c00098008000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) fcntl$dupfd(r1, 0x0, r3) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x595b26d0307979ed}, 0x0, 0x3, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:12:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) r5 = openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x9, 0xfffffffffffffe86, 0x0, 0x223fc35, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) r6 = socket(0x2b, 0x2, 0xd37e) dup2(r5, r6) 20:12:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000500), r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000008", @ANYRES16=r1, @ANYRESDEC, @ANYRES32], 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x80) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r2, 0x300, 0x70bd28, 0x25dfdc03}, 0x14}, 0x1, 0x0, 0x0, 0x24004084}, 0x40c1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r3) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="b1a92dbd7000ffdbdf2521000000050020000000000005002000000000000c00050000000000000000000500200001000000"], 0x38}}, 0x2000) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, r4, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40d0) [ 3365.115974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8216 sclass=netlink_route_socket pid=32522 comm=syz-executor.0 [ 3365.132849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8216 sclass=netlink_route_socket pid=32525 comm=syz-executor.0 20:12:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'wg0\x00'}) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/4087, 0x1000}], 0x10000000000000ad) 20:12:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 20:12:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r2 = dup(r1) write$P9_RSETATTR(r2, &(0x7f0000000180)={0x7, 0x1b, 0x1}, 0x7) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000001c0)={0x1, 0x3, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0x6f}]}, 0x28) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040), 0xfffffffffffffff7, 0x139001) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000005, 0x1010, r1, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000000140)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ff9000/0x1000)=nil, 0x1000, 0xb}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000080020000002e2f66696c653000ab49ef73974c8d891d031cf9cba3fad4bdf998d4d6a633623724a89b708ba1225d1104cad7ed151fba8b99aa354da6de54c31a514bb1d50e844edc48ed1d08cd72efab4cb7b37ba65df90216295eaa1cb579b7da87b1a6849328e3adfd2e081a5962e191e55cddb77c93b726553fcc89e44255"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x2f, 0x0) [ 3365.203278] FAULT_INJECTION: forcing a failure. [ 3365.203278] name failslab, interval 1, probability 0, space 0, times 0 [ 3365.204574] CPU: 0 PID: 32528 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3365.205277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3365.206136] Call Trace: [ 3365.206430] dump_stack+0x107/0x167 [ 3365.206785] should_fail.cold+0x5/0xa [ 3365.207219] should_failslab+0x5/0x20 [ 3365.207620] __kmalloc_node_track_caller+0x74/0x3b0 [ 3365.208142] ? alloc_skb_with_frags+0x92/0x570 [ 3365.208643] __alloc_skb+0xb1/0x5b0 [ 3365.209077] alloc_skb_with_frags+0x92/0x570 [ 3365.209537] sock_alloc_send_pskb+0x7af/0x930 [ 3365.210021] ? sk_alloc+0x350/0x350 [ 3365.210406] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3365.210868] ? lock_downgrade+0x6d0/0x6d0 [ 3365.211319] ? do_raw_spin_lock+0x121/0x260 [ 3365.211761] ? wait_for_completion_io+0x270/0x270 [ 3365.212276] ? rwlock_bug.part.0+0x90/0x90 [ 3365.212739] unix_stream_sendpage+0x245/0xcd0 [ 3365.213238] ? unix_dgram_connect+0xae0/0xae0 [ 3365.213730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3365.214276] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3365.214814] ? trace_hardirqs_on+0x5b/0x180 [ 3365.215285] kernel_sendpage.part.0+0x146/0x290 [ 3365.215763] sock_sendpage+0xe5/0x140 [ 3365.216205] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3365.216725] pipe_to_sendpage+0x2af/0x380 [ 3365.217192] ? propagate_umount+0x1550/0x1550 [ 3365.217677] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3365.218233] __splice_from_pipe+0x43d/0x890 [ 3365.218679] ? propagate_umount+0x1550/0x1550 [ 3365.219148] generic_splice_sendpage+0xd5/0x140 [ 3365.219635] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3365.220127] ? security_file_permission+0xb1/0xe0 [ 3365.220632] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3365.221120] direct_splice_actor+0x10f/0x170 [ 3365.221584] splice_direct_to_actor+0x387/0x980 [ 3365.222067] ? pipe_to_sendpage+0x380/0x380 [ 3365.222555] ? do_splice_to+0x160/0x160 [ 3365.222972] ? security_file_permission+0xb1/0xe0 [ 3365.223483] do_splice_direct+0x1c4/0x290 [ 3365.223878] ? splice_direct_to_actor+0x980/0x980 [ 3365.224442] ? security_file_permission+0xb1/0xe0 [ 3365.224992] do_sendfile+0x553/0x11e0 [ 3365.225392] ? do_pwritev+0x270/0x270 [ 3365.225769] ? wait_for_completion_io+0x270/0x270 [ 3365.226259] ? rcu_read_lock_any_held+0x75/0xa0 [ 3365.226746] ? vfs_write+0x354/0xb10 [ 3365.227143] __x64_sys_sendfile64+0x1d1/0x210 [ 3365.227631] ? __ia32_sys_sendfile+0x220/0x220 [ 3365.228140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3365.228666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3365.229247] do_syscall_64+0x33/0x40 [ 3365.229640] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3365.230172] RIP: 0033:0x7fab3943fb19 [ 3365.230564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3365.232478] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3365.233273] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3365.233965] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3365.234673] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3365.235375] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3365.241952] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:12:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x3a30) 20:12:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) 20:12:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x1000000) 20:12:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x3e30) 20:12:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f00000017c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@private2}}, &(0x7f00000015c0)=0xe8) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x303) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r9 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYRESOCT, @ANYRESDEC=r7, @ANYRES16=r8, @ANYRES64]) r10 = getpgrp(0x0) ptrace(0x10, r10) kcmp(0x0, r10, 0x1, r6, r9) fcntl$setown(0xffffffffffffffff, 0x8, r10) waitid(0x0, r10, 0x0, 0x8, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000480)={0x1, 0x4, 0x81, 0x7, r10}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r7, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000001800)=ANY=[@ANYBLOB="e4010000", @ANYRES16=0x0, @ANYBLOB="04002abd7000ffdbdf250e0000000c00018008000300010000004400018008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f68737200000000080003000000000014000200697036746e6c3000000000000000000020000280080002000800000008000200050000000400010008000200000000000c00028008000200000001005401028004000100080002000200000044010380540001800500020000000000060002005d00000019000200292d5e215d4a5d7b642c2f247b5d5b2d2d5b322e0000000005000200000000000b0002006d6f756e7473000008000100ff07000004000300040003000800018004000300380001800b0002006d6f756e74730000080001000700000007000200107d00000800010003000000040003000b0002006d6f756e747300001400018008000100ffffffff04000300040003004000018008000100050000000400030008000100060000000800010089ca7b700b0002006d6f756e747300000400030004000300040003000800010000004000200001800b0002006d6f756e74730000040003000b0002006dcf34eda473000038000180070002002e2a000005000200000000000800010049b9000008000100000000000b0002006d6f756e74730000060002002d000000"], 0x1e4}, 0x1, 0x0, 0x0, 0x30000014}, 0x44) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:12:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/76}, {&(0x7f00000000c0)=""/101}, {&(0x7f0000000140)=""/157}, {&(0x7f0000000200)=""/23}, {&(0x7f0000000240)=""/4096}, {&(0x7f0000001240)=""/153}, {&(0x7f0000001300)=""/29}, {&(0x7f0000001340)=""/230}], 0x1) 20:12:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) 20:12:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) r1 = syz_io_uring_setup(0x6e73, &(0x7f00000000c0)={0x0, 0xbb4c, 0x8, 0x1, 0x1c3}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) syz_io_uring_setup(0x6491, &(0x7f0000000300)={0x0, 0x9ce, 0x4, 0x0, 0x389}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000380)=0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x3f, &(0x7f00000004c0)=[0xffffffffffffffff, r4, r4, 0xffffffffffffffff], 0x4, 0x0, 0x0, {0x0, r5}}, 0x3) syz_io_uring_submit(r2, r3, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x77359400}, 0x1, 0x1, 0x1, {0x0, r5}}, 0xd0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x2018, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x5}, 0x0) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x400a, &(0x7f00000020c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@msize={'msize', 0x3d, 0x6}}], [{@dont_appraise}, {@uid_gt}, {@permit_directio}, {@obj_role={'obj_role', 0x3d, '.'}}, {@uid_gt}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@permit_directio}]}}) connect$inet(r7, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:12:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x3f00) 20:12:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 15) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) [ 3365.783902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8216 sclass=netlink_route_socket pid=32776 comm=syz-executor.6 [ 3365.886920] FAULT_INJECTION: forcing a failure. [ 3365.886920] name failslab, interval 1, probability 0, space 0, times 0 [ 3365.888307] CPU: 1 PID: 32782 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3365.888937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3365.890550] Call Trace: [ 3365.890817] dump_stack+0x107/0x167 [ 3365.891169] should_fail.cold+0x5/0xa [ 3365.891546] ? create_object.isra.0+0x3a/0xa20 [ 3365.891990] should_failslab+0x5/0x20 [ 3365.892375] kmem_cache_alloc+0x5b/0x310 [ 3365.892772] create_object.isra.0+0x3a/0xa20 [ 3365.893206] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3365.893711] __kmalloc_node+0x1ae/0x420 [ 3365.894101] ? kfree+0xd7/0x340 [ 3365.894439] kvmalloc_node+0xc0/0x170 [ 3365.895217] seq_read_iter+0x443/0x12b0 [ 3365.895617] proc_reg_read_iter+0x20a/0x2e0 [ 3365.896033] generic_file_splice_read+0x455/0x6d0 [ 3365.896507] ? pipe_to_user+0x170/0x170 [ 3365.896908] ? fsnotify_perm.part.0+0x22d/0x620 [ 3365.897372] ? security_file_permission+0xb1/0xe0 [ 3365.897839] ? pipe_to_user+0x170/0x170 [ 3365.898250] do_splice_to+0x10e/0x160 [ 3365.898613] splice_direct_to_actor+0x2fe/0x980 [ 3365.899050] ? pipe_to_sendpage+0x380/0x380 [ 3365.899486] ? do_splice_to+0x160/0x160 [ 3365.899879] ? security_file_permission+0xb1/0xe0 [ 3365.900362] do_splice_direct+0x1c4/0x290 [ 3365.900772] ? splice_direct_to_actor+0x980/0x980 [ 3365.901798] ? security_file_permission+0xb1/0xe0 [ 3365.902891] do_sendfile+0x553/0x11e0 [ 3365.903763] ? do_pwritev+0x270/0x270 [ 3365.904638] ? wait_for_completion_io+0x270/0x270 [ 3365.905732] ? rcu_read_lock_any_held+0x75/0xa0 [ 3365.906763] ? vfs_write+0x354/0xb10 [ 3365.907597] __x64_sys_sendfile64+0x1d1/0x210 [ 3365.908618] ? __ia32_sys_sendfile+0x220/0x220 [ 3365.909675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3365.910850] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3365.912017] do_syscall_64+0x33/0x40 [ 3365.912858] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3365.914011] RIP: 0033:0x7fab3943fb19 [ 3365.914847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3365.918935] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3365.920600] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3365.922167] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3365.923746] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3365.925314] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3365.926881] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 [ 3365.931337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8216 sclass=netlink_route_socket pid=32776 comm=syz-executor.6 20:12:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 16) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) pidfd_send_signal(r1, 0x17, &(0x7f0000000100)={0x40, 0x3, 0x7fff}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x6e30c27f, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r2, &(0x7f0000004d00), 0x2f, 0x0) 20:12:26 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_open_procfs(0x0, &(0x7f0000000180)='status\x00') r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="54da4484564df86f20941b898a6eb331990251b21b6a27252b1943af3a0b48434bb68c99381e5410a6ab4b9af4c085bd4c99e96fb2d26312f930ebfebc180a7b62d1af8df42a2321ad6efedb5b86ff837659f389c617a5060396bb2ab6c7a63f0000000225cecf4885c978ca6d69b2e22700a119ac1138480560c2b0b9036a2b97813b262b5fb9ead5866357b965156fbb10c7d550ae1d3545f064f77e26fc144ef15015a952a662bccddf6312db57b0ded3e143ca5612077d05819fa4f62bad0417555d9d11097fdbe265979a11fe134cde9470e38f023444186c"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0xc) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/88, 0x58}, {&(0x7f00000000c0)=""/83, 0x53}], 0x2) 20:12:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) pread64(r1, &(0x7f0000000040)=""/200, 0xc8, 0x3) readv(r0, &(0x7f0000001600), 0x0) 20:12:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x2000000) 20:12:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) 20:12:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x5505) 20:12:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r5, &(0x7f0000000380)=""/78, 0x4e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r4, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) dup(r1) [ 3380.942980] FAULT_INJECTION: forcing a failure. [ 3380.942980] name failslab, interval 1, probability 0, space 0, times 0 [ 3380.950782] CPU: 1 PID: 32804 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3380.953475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3380.956420] Call Trace: [ 3380.960978] dump_stack+0x107/0x167 [ 3380.961377] should_fail.cold+0x5/0xa [ 3380.961791] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3380.962355] should_failslab+0x5/0x20 [ 3380.962769] __kmalloc_node+0x76/0x420 [ 3380.963196] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3380.963742] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3380.964276] ? trace_hardirqs_on+0x5b/0x180 [ 3380.964744] __kmalloc_node+0x1c6/0x420 [ 3380.965172] ? kfree+0xd7/0x340 [ 3380.965520] kvmalloc_node+0xc0/0x170 [ 3380.965890] seq_read_iter+0x443/0x12b0 [ 3380.966292] proc_reg_read_iter+0x20a/0x2e0 [ 3380.966705] generic_file_splice_read+0x455/0x6d0 [ 3380.967159] ? pipe_to_user+0x170/0x170 [ 3380.967547] ? fsnotify_perm.part.0+0x22d/0x620 [ 3380.967985] ? security_file_permission+0xb1/0xe0 [ 3380.968426] ? pipe_to_user+0x170/0x170 [ 3380.968808] do_splice_to+0x10e/0x160 [ 3380.973184] splice_direct_to_actor+0x2fe/0x980 [ 3380.973713] ? pipe_to_sendpage+0x380/0x380 [ 3380.974185] ? do_splice_to+0x160/0x160 [ 3380.974632] ? security_file_permission+0xb1/0xe0 [ 3380.975052] do_splice_direct+0x1c4/0x290 [ 3380.975509] ? splice_direct_to_actor+0x980/0x980 [ 3380.976055] ? security_file_permission+0xb1/0xe0 [ 3380.976602] do_sendfile+0x553/0x11e0 [ 3380.977052] ? do_pwritev+0x270/0x270 [ 3380.977473] ? wait_for_completion_io+0x270/0x270 [ 3380.978011] ? rcu_read_lock_any_held+0x75/0xa0 [ 3380.978522] ? vfs_write+0x354/0xb10 [ 3380.978925] __x64_sys_sendfile64+0x1d1/0x210 [ 3380.979417] ? __ia32_sys_sendfile+0x220/0x220 [ 3380.979930] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3380.980509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3380.985199] do_syscall_64+0x33/0x40 [ 3380.985577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3380.986102] RIP: 0033:0x7fab3943fb19 [ 3380.986478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3380.988329] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3380.994702] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3380.995424] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3380.996140] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3380.997363] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3380.998028] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:12:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x0, @remote}}) 20:12:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={@desc={0x1, 0x0, @desc1}}) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000001940)=[{&(0x7f00000000c0)=""/190, 0xbe}, {&(0x7f0000000180)=""/226, 0xe2}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f00000014c0)=""/198, 0xc6}, {&(0x7f0000001640)=""/169, 0xa9}, {&(0x7f00000015c0)=""/46, 0x2e}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/140, 0x8c}, {&(0x7f0000001880)=""/138, 0x8a}], 0x9) r1 = syz_mount_image$ext4(&(0x7f0000000380)='ext2\x00', &(0x7f0000001a00)='./file0\x00', 0x3c, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000001a40)="6e145bc8496ed0fc7e91c6a9ca28b938ce8d28e2edeb58239f8882a2361e4f00d79c48ecd42a969f8cb6870eac69d7c1a2de2783d5cbf42ec9b681094fa90c7ac860bc495d5fc8eb5cb1bc", 0x4b}], 0x40010, &(0x7f0000001b00)={[{@dioread_nolock}, {@dax}, {@test_dummy_encryption}], [{@euid_gt={'euid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x30, 0x33, 0x38, 0x50, 0x65, 0x37, 0x61], 0x2d, [0x31, 0x32, 0x34, 0x61], 0x2d, [0x65, 0x34, 0x65, 0x53], 0x2d, [0x36, 0x62, 0x61, 0x33], 0x2d, [0x62, 0x67, 0x61, 0x64, 0x31, 0x66, 0x38, 0x64]}}}]}) execveat(r1, &(0x7f0000001bc0)='./file0\x00', &(0x7f0000001cc0)=[&(0x7f0000001c00)='\\}![\x00', &(0x7f0000001c40)='mounts\x00', &(0x7f0000001c80)='mounts\x00'], &(0x7f0000001e00)=[&(0x7f0000001d00)='B,$}\x00', &(0x7f0000001d40)='[*\'\x00', &(0x7f0000001d80)=',$!\x00', &(0x7f0000001dc0)='#*\x00'], 0x1000) r2 = openat$cgroup_subtree(r0, &(0x7f0000001f00), 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {r7}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000001f80)=ANY=[@ANYRES64=r6, @ANYBLOB="0004000000000000ffff0000000000d20ecf000400000000000000274600000000000000000000001000000000000000000000a561d6a1e900b8870000003f0000d100000000c1ffffffffffffff03000000000000000600000000000000280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000297848d4ddc28e430cb70ce5d5d325347b0c29128a04643392b609334aa56cd34eb8e0a7d8c828c9b68fd5c5ef44d0dc52633a6b0630473d581c1bdf275be90a14ebc56553e267acd7b4ebf3fb286d56d476aa66ac419657"]) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001b00210c00000000000000200200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) poll(&(0x7f0000001f40)=[{r1, 0x1}, {r2, 0x4000}, {r4}, {r1, 0x10e4}], 0x4, 0x6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000003c0)) 20:12:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x6400) 20:12:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) 20:12:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) sendmmsg$inet6(r2, &(0x7f0000000740)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x6, @local, 0x5}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)="9b7e76be8f1957d902acbef674049e6baa430d28798aa7a44ce904bd6818289243391c056e703b8f445d69507ed8d40dd710615c3c9b56e651b5481f019dcfc26160c8afb4bd36242aeafec1bf72dc18f7a8e8f924a9e1ca5f7041f2e7f105d0b31de43293e24206b6ac2eb3e883a0c53c9f8d1e", 0x74}], 0x1, &(0x7f0000000280)=[@hoplimit={{0x14, 0x29, 0x34, 0x2}}, @rthdr_2292={{0x18, 0x29, 0x39, {0x87, 0x0, 0x0, 0x5}}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hopopts={{0x68, 0x29, 0x36, {0x0, 0x9, '\x00', [@generic={0x0, 0x48, "21bed80ee3d61fb8162dbe40c9dc2aa8d121650d04209502c411b8ac5e33fb7fcfe3c41d1b4f1ac4bb2a2ed36e9607cda8eba9aadd1b77ca5733096aa2b91d88872a3c33edb1e149"}, @ra={0x5, 0x2, 0x8001}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x5e, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @loopback}]}}}, @hoplimit_2292={{0x14}}, @rthdr={{0x68, 0x29, 0x39, {0x29, 0xa, 0x1, 0xad, 0x0, [@dev={0xfe, 0x80, '\x00', 0x18}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @mcast1, @mcast2]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x2c, 0x3, '\x00', [@hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x4}, @ra={0x5, 0x2, 0x7ff}]}}}], 0x1b0}}, {{&(0x7f00000001c0)={0xa, 0x4e23, 0x7ff, @local, 0xfffffffd}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000440)="ecfa43e6d5f8db110aaeb4707392d4f51a5cd2c452ce502800ebf1a891f2e86600bf3c5545cab0613f4d60f2c57b047bb2bfcc4fa72fbe73d392997bf90e73059f350a6dbc4ed933396611301c070ceaf557c1a519bc72d9ab", 0x59}], 0x1, &(0x7f0000000580)=[@rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x1, 0x0, 0x0, [@remote, @local]}}}, @hopopts={{0x98, 0x29, 0x36, {0x67, 0xf, '\x00', [@pad1, @calipso={0x7, 0x28, {0x1, 0x8, 0x40, 0xddd, [0x0, 0x80, 0x9, 0x0]}}, @pad1, @hao={0xc9, 0x10, @mcast2}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x20, [0x7, 0x10000, 0x80]}}, @jumbo={0xc2, 0x4, 0x5}]}}}, @hopopts={{0xe0, 0x29, 0x36, {0x32, 0x18, '\x00', [@pad1, @calipso={0x7, 0x10, {0x3, 0x2, 0x1, 0x7fff, [0x4324]}}, @enc_lim={0x4, 0x1, 0xff}, @ra={0x5, 0x2, 0x6}, @generic={0x9, 0x67, "55bf06e9e778f5faa0d376a1e733bffc987a22d746b4acafd9638b986108af38a1a7d8bfff7fa25345a29c1622a7fa13cf63dc1d23532543b33070f6f179912e7f32456fb173a1f76d294917d5cd2d8fcb1b2b6ce2e33aeb3e7ed89ac75cc5eb25c12f69bc083c"}, @pad1, @ra={0x5, 0x2, 0x3f}, @calipso={0x7, 0x38, {0x2, 0xc, 0x4, 0x3f, [0x80000000000, 0x4, 0x4, 0x20, 0x0, 0x3]}}]}}}], 0x1b0}}], 0x2, 0x840) [ 3381.447783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=32918 comm=syz-executor.4 [ 3381.494773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=32918 comm=syz-executor.4 20:12:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='keyring\x00', r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000005040), &(0x7f0000005080)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="b3192547ddc14c4067018f85b3569cae5a6a59b2bc789e72fc9c27f4739049fac6f931cfdebd5024e0c615a5b3181b8221a1b62e53c336201c0997ba02cf7e8239e9387d4aa09700d9f69ff5893795df32d48045c51c091f3ada767c52a48f23b52d63fda6b35f7e7729117d7c434df30d536fe3a77775276946a1583be3b120e93b717255f98f9b1f07a021970d3aa59a5f846b8c7b8173900c3df5f25498a3aed4c4097f017f1a1e67fb9a0205f87714e90eb3b18ee5c9e60f56470b9e0bfd9b172a7ddc1b739ffeb54872e5bc78fc6b29", 0xd2, r1) r3 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, r2, 0x1) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='mounts\x00', r0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:12:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 17) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0x81}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:12:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='keyring\x00', r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000005040), &(0x7f0000005080)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='keyring\x00', r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r2, 0x0, 0x0) add_key$keyring(&(0x7f0000005040), &(0x7f0000005080)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x1) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffff9, r2, 0x1) add_key$keyring(&(0x7f0000000240), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$read(0xb, r0, &(0x7f0000000100)=""/130, 0x82) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="06000000000000002e2f66696c653000d7b34517f976456230d932df749e7316b5656ef00ecdc58a25875f299cdb7386711c8c5a8f28c2568f1987587646e29f2a91627e38b7d180ae818e640f7dc030393e71a75cd300a75f9d813e0014e71bf87d15b4dd54035a"]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x10000, 0x391e41d89367e34d) readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x8, 0x0, 0x1, 0x3}, 0x14) 20:12:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x3000000) 20:12:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x0, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) 20:12:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x8004) [ 3396.082730] FAULT_INJECTION: forcing a failure. [ 3396.082730] name failslab, interval 1, probability 0, space 0, times 0 [ 3396.084086] CPU: 0 PID: 32947 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3396.084743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3396.085530] Call Trace: [ 3396.085783] dump_stack+0x107/0x167 [ 3396.086129] should_fail.cold+0x5/0xa [ 3396.086492] ? create_object.isra.0+0x3a/0xa20 [ 3396.086933] should_failslab+0x5/0x20 [ 3396.087294] kmem_cache_alloc+0x5b/0x310 [ 3396.087677] ? create_object.isra.0+0x3ad/0xa20 [ 3396.088122] create_object.isra.0+0x3a/0xa20 [ 3396.088548] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3396.089051] __kmalloc_node+0x1ae/0x420 [ 3396.089444] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 3396.089930] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 3396.090406] ? trace_hardirqs_on+0x5b/0x180 [ 3396.090822] __kmalloc_node_track_caller+0x1bd/0x3b0 [ 3396.091310] ? alloc_skb_with_frags+0x92/0x570 [ 3396.091753] __alloc_skb+0xb1/0x5b0 [ 3396.092107] alloc_skb_with_frags+0x92/0x570 [ 3396.092535] sock_alloc_send_pskb+0x7af/0x930 [ 3396.092981] ? sk_alloc+0x350/0x350 [ 3396.093331] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3396.093782] ? lock_downgrade+0x6d0/0x6d0 [ 3396.094175] ? do_raw_spin_lock+0x121/0x260 [ 3396.094578] ? wait_for_completion_io+0x270/0x270 [ 3396.095030] ? rwlock_bug.part.0+0x90/0x90 [ 3396.095443] unix_stream_sendpage+0x245/0xcd0 [ 3396.095873] ? unix_dgram_connect+0xae0/0xae0 [ 3396.096299] ? trace_hardirqs_on+0x5b/0x180 [ 3396.096705] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3396.097206] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 3396.097690] kernel_sendpage.part.0+0x146/0x290 [ 3396.098134] sock_sendpage+0xe5/0x140 [ 3396.098494] ? __sock_recv_ts_and_drops+0x430/0x430 [ 3396.098960] pipe_to_sendpage+0x2af/0x380 [ 3396.099352] ? propagate_umount+0x1550/0x1550 [ 3396.099778] ? splice_from_pipe_next.part.0+0x166/0x520 [ 3396.100286] __splice_from_pipe+0x43d/0x890 [ 3396.100693] ? propagate_umount+0x1550/0x1550 [ 3396.101133] generic_splice_sendpage+0xd5/0x140 [ 3396.101574] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3396.101996] ? security_file_permission+0xb1/0xe0 [ 3396.102452] ? __do_sys_vmsplice+0x8d0/0x8d0 [ 3396.102864] direct_splice_actor+0x10f/0x170 [ 3396.103277] splice_direct_to_actor+0x387/0x980 [ 3396.103715] ? pipe_to_sendpage+0x380/0x380 [ 3396.104128] ? do_splice_to+0x160/0x160 [ 3396.104506] ? security_file_permission+0xb1/0xe0 [ 3396.104974] do_splice_direct+0x1c4/0x290 [ 3396.105373] ? splice_direct_to_actor+0x980/0x980 [ 3396.105828] ? security_file_permission+0xb1/0xe0 [ 3396.106291] do_sendfile+0x553/0x11e0 [ 3396.106662] ? do_pwritev+0x270/0x270 [ 3396.107020] ? wait_for_completion_io+0x270/0x270 [ 3396.107485] ? rcu_read_lock_any_held+0x75/0xa0 [ 3396.107922] ? vfs_write+0x354/0xb10 [ 3396.108288] __x64_sys_sendfile64+0x1d1/0x210 [ 3396.108709] ? __ia32_sys_sendfile+0x220/0x220 [ 3396.109168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3396.109663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3396.110158] do_syscall_64+0x33/0x40 [ 3396.110508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3396.110984] RIP: 0033:0x7fab3943fb19 [ 3396.111339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3396.113059] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3396.113785] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3396.114458] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3396.115129] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3396.115794] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3396.116464] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:12:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0x8}) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r5, 0x301, 0x0, 0x0, {{0x15}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0xffffff1b, 0x64}}}}, [@NL80211_ATTR_PS_STATE={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000844}, 0x40041) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8c1) 20:12:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) 20:12:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @short}, 0xb) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"/2200], 0x883) unshare(0x48020200) 20:12:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffff) (fail_nth: 18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) openat(r4, &(0x7f0000000140)='./file0\x00', 0x101002, 0x62) getdents(r4, &(0x7f0000000380)=""/78, 0x4e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L-', 0x7fffffff}, 0x16, 0x2) getdents64(r3, &(0x7f0000000400)=""/172, 0xac) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7e, 0x9, 0x3f, 0x40000, 0x0, 0x3e, 0x4, 0xdd, 0x40, 0x204, 0x800000, 0x8, 0x38, 0x1, 0x1, 0x9e, 0x1}, [{0x7000000a, 0x5, 0xcd1c, 0xb5fe, 0x0, 0xffffffffffffff42, 0x9, 0x1}], "cbd4d85b2dd07f2949b14c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x883) unshare(0x48020200) 20:12:56 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f00000000c0)=0x9, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0xd8e8, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 20:12:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x8102) 20:12:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x4000000) 20:12:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) pread64(r1, &(0x7f00000000c0)=""/91, 0x5b, 0x800) socket$nl_generic(0x10, 0x3, 0x10) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 20:12:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001800210c00000000000000000200000008000200000000000c00098008000000", @ANYRES32, @ANYBLOB="5f073d73b782a292eb1616c4acf5ad316e08ff393e73938e1466f60607de45a6190533440a49e38fc3e58e59c7a83616caecfa995800f426527ead573972f5d7edf9060d2bb477144b454c38600ca3f21e2a241c68830843eb3ffdb849c98fc020b67ebb396dcbd91df0416ac1b267d6c2cc2f42fcb186f351732ee08026aca432c8e63f89bd0f1db8b9c2841c6b8eb545cde3f3ebd522dc"], 0x28}}, 0x0) r3 = openat(r2, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80800, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000300)={'security\x00', 0x0, [0x9552, 0x98b, 0x9, 0x2, 0x5]}, &(0x7f0000000380)=0x54) getsockopt(r4, 0x9, 0x5, &(0x7f00000000c0)=""/241, &(0x7f0000000200)=0xf1) [ 3410.628408] FAULT_INJECTION: forcing a failure. [ 3410.628408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3410.638164] CPU: 1 PID: 33082 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 3410.638754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3410.639452] Call Trace: [ 3410.639684] dump_stack+0x107/0x167 [ 3410.639997] should_fail.cold+0x5/0xa [ 3410.640332] __alloc_pages_nodemask+0x182/0x600 [ 3410.640732] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3410.641257] ? lock_release+0x41f/0x680 [ 3410.641607] ? perf_trace_lock+0xac/0x490 [ 3410.641968] alloc_pages_current+0x187/0x280 [ 3410.642350] ? __lockdep_reset_lock+0x180/0x180 [ 3410.642753] push_pipe+0x2b5/0x6d0 [ 3410.643070] _copy_to_iter+0x509/0x12d0 [ 3410.643411] ? __virt_addr_valid+0x346/0x5d0 [ 3410.643789] ? lock_downgrade+0x6d0/0x6d0 [ 3410.644149] ? timer_list_start+0x2e0/0x2e0 [ 3410.644522] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3410.644949] ? __check_object_size+0x319/0x440 [ 3410.645418] seq_read_iter+0xdcb/0x12b0 [ 3410.645778] proc_reg_read_iter+0x20a/0x2e0 [ 3410.646151] generic_file_splice_read+0x455/0x6d0 [ 3410.646559] ? pipe_to_user+0x170/0x170 [ 3410.646911] ? fsnotify_perm.part.0+0x22d/0x620 [ 3410.647310] ? security_file_permission+0xb1/0xe0 [ 3410.647720] ? pipe_to_user+0x170/0x170 [ 3410.648057] do_splice_to+0x10e/0x160 [ 3410.648385] splice_direct_to_actor+0x2fe/0x980 20:12:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xf000) 20:12:56 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @initdev}, &(0x7f0000000240)=0xc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT_ANY(0x0, 0x3, &(0x7f0000000000)=""/62) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x28, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x602, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000040)={@private0, 0x37, r5}) [ 3410.648782] ? pipe_to_sendpage+0x380/0x380 [ 3410.657132] ? do_splice_to+0x160/0x160 [ 3410.657468] ? security_file_permission+0xb1/0xe0 [ 3410.657877] do_splice_direct+0x1c4/0x290 [ 3410.658224] ? splice_direct_to_actor+0x980/0x980 [ 3410.658634] ? security_file_permission+0xb1/0xe0 [ 3410.659044] do_sendfile+0x553/0x11e0 [ 3410.659373] ? do_pwritev+0x270/0x270 [ 3410.659698] ? wait_for_completion_io+0x270/0x270 [ 3410.660104] ? rcu_read_lock_any_held+0x75/0xa0 [ 3410.660491] ? vfs_write+0x354/0xb10 [ 3410.660815] __x64_sys_sendfile64+0x1d1/0x210 [ 3410.661211] ? __ia32_sys_sendfile+0x220/0x220 [ 3410.661597] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3410.669300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3410.669736] do_syscall_64+0x33/0x40 [ 3410.670049] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3410.670476] RIP: 0033:0x7fab3943fb19 [ 3410.670789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3410.672297] RSP: 002b:00007fab369b5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 3410.672929] RAX: ffffffffffffffda RBX: 00007fab39552f60 RCX: 00007fab3943fb19 [ 3410.673535] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 3410.674129] RBP: 00007fab369b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 3410.674718] R10: 000000000000ffff R11: 0000000000000246 R12: 0000000000000002 [ 3410.675308] R13: 00007ffc176cd35f R14: 00007fab369b5300 R15: 0000000000022000 20:12:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@seclabel}]}}) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) 20:12:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/113, 0x71}], 0x1) 20:12:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x5000000) [ 3410.780545] ------------[ cut here ]------------ [ 3410.781285] WARNING: CPU: 1 PID: 33198 at kernel/cgroup/cgroup.c:1395 cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.782077] Modules linked in: [ 3410.782504] CPU: 1 PID: 33198 Comm: syz-executor.4 Not tainted 5.10.226 #1 [ 3410.783081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3410.783785] RIP: 0010:cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.784253] Code: 50 08 00 be ff ff ff ff 48 c7 c7 08 3a 02 85 e8 6e 9e ad 02 31 ff 41 89 c4 89 c6 e8 d2 49 08 00 45 85 e4 75 07 e8 78 50 08 00 <0f> 0b e8 71 50 08 00 48 89 ea 83 e5 07 48 b8 00 00 00 00 00 fc ff [ 3410.786158] RSP: 0018:ffff8880588279b8 EFLAGS: 00010006 [ 3410.786616] RAX: 0000000000000970 RBX: ffff88800d270000 RCX: ffffc90001bef000 [ 3410.787224] RDX: 0000000000040000 RSI: ffffffff81384ec8 RDI: 0000000000000005 [ 3410.787826] RBP: ffffffff85676efc R08: 0000000000000000 R09: 0000000000000003 [ 3410.788563] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 3410.789443] R13: ffff88800f83c000 R14: ffff888008df6c00 R15: 0000000000000000 [ 3410.790047] FS: 00007fe34ad78700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 3410.790725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3410.791219] CR2: 0000000020001600 CR3: 0000000047e16000 CR4: 0000000000350ee0 [ 3410.791815] Call Trace: [ 3410.792045] ? __warn+0xe2/0x1f0 [ 3410.792337] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.792763] ? report_bug+0x1c1/0x210 [ 3410.793366] ? handle_bug+0x41/0x90 [ 3410.793674] ? exc_invalid_op+0x14/0x50 [ 3410.794013] ? asm_exc_invalid_op+0x12/0x20 [ 3410.794389] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.794792] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.795197] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.795606] cgroup_path_ns_locked+0x6c/0x110 [ 3410.795988] proc_cpuset_show+0x19a/0x510 [ 3410.796347] proc_single_show+0x121/0x1f0 [ 3410.796705] seq_read_iter+0x510/0x12b0 [ 3410.797104] ? find_held_lock+0x2c/0x110 [ 3410.799065] seq_read+0x3dd/0x5b0 [ 3410.799407] ? seq_read_iter+0x12b0/0x12b0 [ 3410.799780] ? fsnotify_perm.part.0+0x22d/0x620 [ 3410.800179] ? security_file_permission+0xb1/0xe0 [ 3410.800597] do_iter_read+0x4fa/0x760 [ 3410.800927] ? import_iovec+0x83/0xb0 [ 3410.802418] vfs_readv+0xe5/0x160 [ 3410.802715] ? vfs_iter_read+0xa0/0xa0 [ 3410.803053] ? __fdget_pos+0xf1/0x190 [ 3410.803422] ? lock_downgrade+0x6d0/0x6d0 [ 3410.803923] ? putname+0xe1/0x120 [ 3410.804369] ? __fget_files+0x2f8/0x520 [ 3410.804724] do_readv+0x139/0x300 [ 3410.809147] ? vfs_readv+0x160/0x160 [ 3410.809468] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3410.809916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3410.810354] do_syscall_64+0x33/0x40 [ 3410.810671] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3410.811105] RIP: 0033:0x7fe34d802b19 [ 3410.811422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3410.812964] RSP: 002b:00007fe34ad78188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 3410.813628] RAX: ffffffffffffffda RBX: 00007fe34d915f60 RCX: 00007fe34d802b19 [ 3410.814226] RDX: 0000000000000001 RSI: 0000000020001600 RDI: 0000000000000003 [ 3410.814824] RBP: 00007fe34d85cf6d R08: 0000000000000000 R09: 0000000000000000 [ 3410.815423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3410.816020] R13: 00007ffdc7bf825f R14: 00007fe34ad78300 R15: 0000000000022000 [ 3410.816632] irq event stamp: 164 [ 3410.816924] hardirqs last enabled at (163): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 3410.817769] hardirqs last disabled at (164): [] _raw_spin_lock_irq+0x3e/0x40 [ 3410.818493] softirqs last enabled at (0): [] copy_process+0x16ed/0x7800 [ 3410.819185] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 3410.819713] ---[ end trace bac585838267c8e7 ]--- [ 3410.926662] ------------[ cut here ]------------ [ 3410.927153] WARNING: CPU: 0 PID: 33198 at kernel/cgroup/cgroup.c:1395 cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.928007] Modules linked in: [ 3410.928319] CPU: 0 PID: 33198 Comm: syz-executor.4 Tainted: G W 5.10.226 #1 [ 3410.929106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3410.929878] RIP: 0010:cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.930375] Code: 50 08 00 be ff ff ff ff 48 c7 c7 08 3a 02 85 e8 6e 9e ad 02 31 ff 41 89 c4 89 c6 e8 d2 49 08 00 45 85 e4 75 07 e8 78 50 08 00 <0f> 0b e8 71 50 08 00 48 89 ea 83 e5 07 48 b8 00 00 00 00 00 fc ff [ 3410.932062] RSP: 0018:ffff8880588279b8 EFLAGS: 00010002 [ 3410.932556] RAX: 00000000000001c0 RBX: ffff88800d270000 RCX: ffffc90001bef000 [ 3410.933237] RDX: 0000000000040000 RSI: ffffffff81384ec8 RDI: 0000000000000005 [ 3410.933895] RBP: ffffffff85676efc R08: 0000000000000000 R09: 0000000000000003 [ 3410.934555] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 3410.935216] R13: ffff88800f83c000 R14: ffff888008df6c00 R15: 0000000000000000 [ 3410.935879] FS: 00007fe34ad78700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 3410.936624] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3410.937178] CR2: 00007fe34ad57718 CR3: 0000000047e16000 CR4: 0000000000350ef0 [ 3410.937838] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3410.938500] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000dd060a [ 3410.939155] Call Trace: [ 3410.939408] ? __warn+0xe2/0x1f0 [ 3410.939727] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.940172] ? report_bug+0x1c1/0x210 [ 3410.940537] ? handle_bug+0x41/0x90 [ 3410.940876] ? exc_invalid_op+0x14/0x50 [ 3410.941261] ? asm_exc_invalid_op+0x12/0x20 [ 3410.941674] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.942116] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.942559] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 3410.943003] cgroup_path_ns_locked+0x6c/0x110 [ 3410.943431] proc_cpuset_show+0x19a/0x510 [ 3410.943825] proc_single_show+0x121/0x1f0 [ 3410.944216] seq_read_iter+0x510/0x12b0 [ 3410.944590] ? find_held_lock+0x2c/0x110 [ 3410.944980] seq_read+0x3dd/0x5b0 [ 3410.945330] ? seq_read_iter+0x12b0/0x12b0 [ 3410.945740] ? fsnotify_perm.part.0+0x22d/0x620 [ 3410.946182] ? security_file_permission+0xb1/0xe0 [ 3410.946641] do_iter_read+0x4fa/0x760 [ 3410.947005] ? import_iovec+0x83/0xb0 [ 3410.947367] vfs_readv+0xe5/0x160 [ 3410.947693] ? vfs_iter_read+0xa0/0xa0 [ 3410.948060] ? __fdget_pos+0xf1/0x190 [ 3410.948417] ? lock_downgrade+0x6d0/0x6d0 [ 3410.948807] ? putname+0xe1/0x120 [ 3410.949161] ? __fget_files+0x2f8/0x520 [ 3410.949548] do_readv+0x139/0x300 [ 3410.949875] ? vfs_readv+0x160/0x160 [ 3410.950230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3410.950717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3410.951198] do_syscall_64+0x33/0x40 [ 3410.951547] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3410.952020] RIP: 0033:0x7fe34d802b19 [ 3410.952369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3410.954064] RSP: 002b:00007fe34ad78188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 3410.954768] RAX: ffffffffffffffda RBX: 00007fe34d915f60 RCX: 00007fe34d802b19 [ 3410.955425] RDX: 0000000000000001 RSI: 0000000020001600 RDI: 0000000000000003 [ 3410.956083] RBP: 00007fe34d85cf6d R08: 0000000000000000 R09: 0000000000000000 [ 3410.956739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3410.957413] R13: 00007ffdc7bf825f R14: 00007fe34ad78300 R15: 0000000000022000 [ 3410.958086] irq event stamp: 904 [ 3410.958404] hardirqs last enabled at (903): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 3410.959271] hardirqs last disabled at (904): [] _raw_spin_lock_irq+0x3e/0x40 [ 3410.960065] softirqs last enabled at (834): [] asm_call_irq_on_stack+0x12/0x20 [ 3410.960884] softirqs last disabled at (635): [] asm_call_irq_on_stack+0x12/0x20 [ 3410.961712] ---[ end trace bac585838267c8e8 ]--- 20:12:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0xff01) VM DIAGNOSIS: 20:12:57 Registers: info registers vcpu 0 RAX=0000000000000050 RBX=ffffffff8539efa0 RCX=ffffffff81f432a4 RDX=00000000000003f6 RSI=ffffffff81f432b2 RDI=0000000000000007 RBP=00000000000103f6 RSP=ffff88800bb4f670 R8 =0000000000000000 R9 =0000000000006d2c R10=0000000000010000 R11=0000000000000001 R12=0000000000000000 R13=1ffff11001ea2001 R14=dffffc0000000000 R15=ffff88800f510008 RIP=ffffffff81f432b6 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f265648d0a0 CR3=0000000045d0a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000dd060a EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000006f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822da261 RDI=ffffffff879ef140 RBP=ffffffff879ef100 RSP=ffff888058827358 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000006f R13=000000000000006f R14=ffffffff879ef100 R15=dffffc0000000000 RIP=ffffffff822da2b8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe34ad78700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe3f00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020001600 CR3=0000000047e16000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000