x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 29) [ 2111.497040] neigh_connected_output+0x382/0x4d0 [ 2111.497765] ip_finish_output2+0x6f1/0x21f0 [ 2111.498302] ? nf_hook_slow+0xfc/0x1e0 [ 2111.498793] ? ip_frag_next+0x9e0/0x9e0 [ 2111.499287] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2111.499917] __ip_finish_output.part.0+0x5f3/0xb50 [ 2111.500526] ? ip_fragment.constprop.0+0x240/0x240 [ 2111.501506] ? netif_rx_ni+0xe7/0x300 [ 2111.501984] ip_mc_output+0x401/0xa30 [ 2111.502461] ip_send_skb+0xdd/0x260 [ 2111.502917] udp_send_skb+0x6da/0x11d0 [ 2111.503409] udp_sendmsg+0x139a/0x2160 [ 2111.503891] ? mark_lock+0xf5/0x2df0 [ 2111.504353] ? ip_frag_init+0x350/0x350 [ 2111.504846] ? lock_chain_count+0x20/0x20 [ 2111.505394] ? udp_setsockopt+0xc0/0xc0 [ 2111.506572] ? mark_lock+0xf5/0x2df0 [ 2111.507482] ? lock_acquire+0x197/0x470 [ 2111.508456] ? lock_chain_count+0x20/0x20 [ 2111.509510] ? mark_lock+0xf5/0x2df0 [ 2111.510423] ? mark_lock+0xf5/0x2df0 [ 2111.511331] ? lock_chain_count+0x20/0x20 [ 2111.512347] ? __lock_acquire+0xbb1/0x5b00 [ 2111.513418] ? lock_chain_count+0x20/0x20 [ 2111.514614] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.515895] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.516897] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2111.517917] ? udp_v6_push_pending_frames+0x360/0x360 [ 2111.519178] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.520173] ? mark_lock+0xf5/0x2df0 [ 2111.521084] ? lock_acquire+0x197/0x470 [ 2111.522208] ? find_held_lock+0x2c/0x110 [ 2111.523210] ? __might_fault+0xd3/0x180 [ 2111.524180] ? lock_downgrade+0x6d0/0x6d0 [ 2111.525199] ? lock_downgrade+0x6d0/0x6d0 [ 2111.526383] ? sock_has_perm+0x1ea/0x280 [ 2111.527373] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2111.528640] ? _copy_from_user+0xfb/0x1b0 [ 2111.529726] ? __import_iovec+0x458/0x590 [ 2111.530739] ? udp_v6_push_pending_frames+0x360/0x360 [ 2111.532012] inet6_sendmsg+0x105/0x140 [ 2111.532961] ? inet6_compat_ioctl+0x320/0x320 [ 2111.534214] __sock_sendmsg+0xf2/0x190 [ 2111.535163] ____sys_sendmsg+0x70d/0x870 [ 2111.536156] ? sock_write_iter+0x3d0/0x3d0 [ 2111.537191] ? do_recvmmsg+0x6d0/0x6d0 [ 2111.538292] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.539287] ? lock_downgrade+0x6d0/0x6d0 [ 2111.540300] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.541645] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.542642] ___sys_sendmsg+0xf3/0x170 [ 2111.543599] ? sendmsg_copy_msghdr+0x160/0x160 [ 2111.544720] ? __fget_files+0x2cf/0x520 [ 2111.545804] ? lock_downgrade+0x6d0/0x6d0 [ 2111.546869] ? find_held_lock+0x2c/0x110 [ 2111.547872] ? __fget_files+0x2f8/0x520 [ 2111.548850] ? __fget_light+0xea/0x290 [ 2111.549944] __sys_sendmsg+0xe5/0x1b0 [ 2111.550878] ? __sys_sendmsg_sock+0x40/0x40 [ 2111.551932] ? rcu_read_lock_any_held+0x75/0xa0 [ 2111.553092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2111.554577] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2111.555843] ? trace_hardirqs_on+0x5b/0x180 [ 2111.556903] do_syscall_64+0x33/0x40 [ 2111.557920] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2111.559179] RIP: 0033:0x7f251a6f7b19 [ 2111.560085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2111.565243] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2111.567548] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2111.569310] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2111.571374] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2111.573131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2111.575190] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2111.647334] FAULT_INJECTION: forcing a failure. [ 2111.647334] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.650629] CPU: 1 PID: 10079 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2111.652342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2111.654582] Call Trace: [ 2111.655221] dump_stack+0x107/0x167 [ 2111.656109] should_fail.cold+0x5/0xa [ 2111.657037] ? trace_hardirqs_on+0x5b/0x180 [ 2111.658274] ? __alloc_skb+0x6d/0x5b0 [ 2111.659206] should_failslab+0x5/0x20 [ 2111.660134] kmem_cache_alloc_node+0x55/0x330 [ 2111.661236] __alloc_skb+0x6d/0x5b0 [ 2111.661779] skb_segment+0x9d8/0x3aa0 [ 2111.662252] ? __lock_acquire+0xbb1/0x5b00 [ 2111.662803] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2111.663420] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.664069] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.664577] __udp_gso_segment+0x11c6/0x1830 [ 2111.665118] ? __sk_receive_skb+0x830/0x830 [ 2111.666212] udp4_ufo_fragment+0x528/0x720 [ 2111.667251] ? skb_udp_tunnel_segment+0x1db0/0x1db0 09:47:02 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:02 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x1269, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2111.668475] inet_gso_segment+0x4fb/0x11a0 [ 2111.669635] skb_mac_gso_segment+0x273/0x570 [ 2111.670894] ? inet_sock_destruct+0x840/0x840 [ 2111.672172] ? skb_network_protocol+0x650/0x650 [ 2111.673513] ? skb_crc32c_csum_help+0x80/0x80 [ 2111.674614] ? lock_acquire+0x197/0x470 [ 2111.675583] ? __dev_queue_xmit+0x1c6/0x2690 [ 2111.676660] __skb_gso_segment+0x32d/0x6d0 [ 2111.678022] ? mark_lock+0xf5/0x2df0 [ 2111.678936] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2111.680224] ? lock_chain_count+0x20/0x20 [ 2111.681235] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2111.682554] __dev_queue_xmit+0x825/0x2690 [ 2111.683592] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2111.684854] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2111.685797] ? mark_held_locks+0x9e/0xe0 [ 2111.686302] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2111.686950] neigh_connected_output+0x382/0x4d0 [ 2111.687534] ip_finish_output2+0x6f1/0x21f0 [ 2111.688068] ? nf_hook_slow+0xfc/0x1e0 [ 2111.688554] ? ip_frag_next+0x9e0/0x9e0 [ 2111.689043] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2111.690101] __ip_finish_output.part.0+0x5f3/0xb50 [ 2111.691304] ? ip_fragment.constprop.0+0x240/0x240 [ 2111.692511] ? netif_rx_ni+0xe7/0x300 [ 2111.693485] ip_mc_output+0x401/0xa30 [ 2111.694571] ip_send_skb+0xdd/0x260 [ 2111.695461] udp_send_skb+0x6da/0x11d0 [ 2111.696420] udp_sendmsg+0x139a/0x2160 [ 2111.697399] ? mark_lock+0xf5/0x2df0 [ 2111.698493] ? ip_frag_init+0x350/0x350 [ 2111.699464] ? lock_chain_count+0x20/0x20 [ 2111.700480] ? udp_setsockopt+0xc0/0xc0 [ 2111.701481] ? mark_lock+0xf5/0x2df0 [ 2111.702388] ? lock_acquire+0x197/0x470 [ 2111.703360] ? lock_chain_count+0x20/0x20 [ 2111.704377] ? mark_lock+0xf5/0x2df0 [ 2111.705285] ? mark_lock+0xf5/0x2df0 [ 2111.706370] ? lock_chain_count+0x20/0x20 [ 2111.707385] ? __lock_acquire+0xbb1/0x5b00 [ 2111.708419] ? lock_chain_count+0x20/0x20 [ 2111.709479] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.710761] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.711760] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2111.712768] ? udp_v6_push_pending_frames+0x360/0x360 [ 2111.714198] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.715195] ? mark_lock+0xf5/0x2df0 [ 2111.716107] ? lock_acquire+0x197/0x470 [ 2111.717075] ? find_held_lock+0x2c/0x110 [ 2111.718211] ? __might_fault+0xd3/0x180 [ 2111.719181] ? lock_downgrade+0x6d0/0x6d0 [ 2111.720202] ? lock_downgrade+0x6d0/0x6d0 [ 2111.721213] ? sock_has_perm+0x1ea/0x280 [ 2111.722380] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2111.723648] ? _copy_from_user+0xfb/0x1b0 [ 2111.724671] ? __import_iovec+0x458/0x590 [ 2111.725541] ? udp_v6_push_pending_frames+0x360/0x360 [ 2111.726188] inet6_sendmsg+0x105/0x140 [ 2111.726671] ? inet6_compat_ioctl+0x320/0x320 [ 2111.727226] __sock_sendmsg+0xf2/0x190 [ 2111.727709] ____sys_sendmsg+0x70d/0x870 [ 2111.728215] ? sock_write_iter+0x3d0/0x3d0 [ 2111.728736] ? do_recvmmsg+0x6d0/0x6d0 [ 2111.729225] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.729757] ? lock_downgrade+0x6d0/0x6d0 [ 2111.730267] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2111.730903] ? SOFTIRQ_verbose+0x10/0x10 [ 2111.731406] ___sys_sendmsg+0xf3/0x170 [ 2111.731884] ? sendmsg_copy_msghdr+0x160/0x160 [ 2111.732444] ? __fget_files+0x2cf/0x520 [ 2111.732928] ? lock_downgrade+0x6d0/0x6d0 [ 2111.733492] ? find_held_lock+0x2c/0x110 [ 2111.733998] ? __fget_files+0x2f8/0x520 [ 2111.734496] ? __fget_light+0xea/0x290 [ 2111.734977] __sys_sendmsg+0xe5/0x1b0 [ 2111.735443] ? __sys_sendmsg_sock+0x40/0x40 [ 2111.735969] ? rcu_read_lock_any_held+0x75/0xa0 [ 2111.736555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2111.737196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2111.737894] ? trace_hardirqs_on+0x5b/0x180 [ 2111.738425] do_syscall_64+0x33/0x40 [ 2111.738884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2111.739517] RIP: 0033:0x7f3f9ec55b19 [ 2111.739977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2111.742254] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2111.743187] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2111.744066] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2111.744944] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2111.745883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2111.746753] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2126.091958] FAULT_INJECTION: forcing a failure. [ 2126.091958] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.093544] CPU: 0 PID: 10098 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2126.094478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.095569] Call Trace: [ 2126.095921] dump_stack+0x107/0x167 [ 2126.096402] should_fail.cold+0x5/0xa [ 2126.096907] ? create_object.isra.0+0x3a/0xa20 [ 2126.097513] should_failslab+0x5/0x20 [ 2126.098030] kmem_cache_alloc+0x5b/0x310 [ 2126.098569] create_object.isra.0+0x3a/0xa20 [ 2126.106119] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2126.106797] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2126.107459] ? skb_segment+0x9d8/0x3aa0 [ 2126.107991] __alloc_skb+0xb1/0x5b0 [ 2126.108470] skb_segment+0x9d8/0x3aa0 [ 2126.108977] ? __lock_acquire+0xbb1/0x5b00 [ 2126.109558] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.110234] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.110929] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.111468] __udp_gso_segment+0x11c6/0x1830 [ 2126.112052] ? __sk_receive_skb+0x830/0x830 [ 2126.112626] udp4_ufo_fragment+0x528/0x720 [ 2126.113200] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.113886] inet_gso_segment+0x4fb/0x11a0 [ 2126.114481] skb_mac_gso_segment+0x273/0x570 [ 2126.115064] ? inet_sock_destruct+0x840/0x840 [ 2126.115659] ? skb_network_protocol+0x650/0x650 [ 2126.116263] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.116857] ? lock_acquire+0x197/0x470 [ 2126.117376] ? __dev_queue_xmit+0x1c6/0x2690 [ 2126.117978] __skb_gso_segment+0x32d/0x6d0 [ 2126.118533] ? mark_lock+0xf5/0x2df0 [ 2126.119030] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.119729] ? lock_chain_count+0x20/0x20 [ 2126.120269] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2126.120877] __dev_queue_xmit+0x825/0x2690 [ 2126.121436] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.122139] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.122747] ? mark_held_locks+0x9e/0xe0 [ 2126.123285] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.123975] neigh_connected_output+0x382/0x4d0 [ 2126.124599] ip_finish_output2+0x6f1/0x21f0 [ 2126.125168] ? nf_hook_slow+0xfc/0x1e0 [ 2126.125681] ? ip_frag_next+0x9e0/0x9e0 [ 2126.126215] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.126877] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.127522] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.128168] ? netif_rx_ni+0xe7/0x300 [ 2126.128674] ip_mc_output+0x401/0xa30 [ 2126.129180] ip_send_skb+0xdd/0x260 [ 2126.129662] udp_send_skb+0x6da/0x11d0 [ 2126.130193] udp_sendmsg+0x139a/0x2160 [ 2126.130710] ? mark_lock+0xf5/0x2df0 [ 2126.131200] ? ip_frag_init+0x350/0x350 [ 2126.131726] ? mark_lock+0xf5/0x2df0 [ 2126.132217] ? udp_setsockopt+0xc0/0xc0 [ 2126.132739] ? mark_lock+0xf5/0x2df0 [ 2126.133228] ? lock_chain_count+0x20/0x20 [ 2126.133778] ? lock_chain_count+0x20/0x20 [ 2126.134351] ? perf_output_begin+0x589/0xc60 [ 2126.134937] ? mark_lock+0xf5/0x2df0 [ 2126.135430] ? mark_lock+0xf5/0x2df0 [ 2126.135920] ? lock_chain_count+0x20/0x20 [ 2126.136467] ? lock_chain_count+0x20/0x20 [ 2126.137015] ? __lock_acquire+0xbb1/0x5b00 [ 2126.137588] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.138143] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.138821] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.139358] ? mark_lock+0xf5/0x2df0 [ 2126.139853] ? lock_acquire+0x197/0x470 [ 2126.140379] ? find_held_lock+0x2c/0x110 [ 2126.140917] ? __might_fault+0xd3/0x180 [ 2126.141437] ? lock_downgrade+0x6d0/0x6d0 [ 2126.142003] ? lock_downgrade+0x6d0/0x6d0 [ 2126.142550] ? sock_has_perm+0x1ea/0x280 [ 2126.143084] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.143768] ? _copy_from_user+0xfb/0x1b0 [ 2126.144322] ? __import_iovec+0x458/0x590 [ 2126.144869] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.145550] inet6_sendmsg+0x105/0x140 [ 2126.146079] ? inet6_compat_ioctl+0x320/0x320 [ 2126.146674] __sock_sendmsg+0xf2/0x190 [ 2126.147189] ____sys_sendmsg+0x70d/0x870 [ 2126.147724] ? sock_write_iter+0x3d0/0x3d0 [ 2126.148285] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.148799] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.149332] ? lock_downgrade+0x6d0/0x6d0 [ 2126.153897] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.154595] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.155131] ___sys_sendmsg+0xf3/0x170 [ 2126.155642] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.156246] ? __fget_files+0x2cf/0x520 [ 2126.156767] ? lock_downgrade+0x6d0/0x6d0 [ 2126.157310] ? find_held_lock+0x2c/0x110 [ 2126.157851] ? __fget_files+0x2f8/0x520 [ 2126.158395] ? __fget_light+0xea/0x290 [ 2126.158918] __sys_sendmsg+0xe5/0x1b0 [ 2126.159416] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.159981] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.160604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.161288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.161979] ? trace_hardirqs_on+0x5b/0x180 [ 2126.162546] do_syscall_64+0x33/0x40 [ 2126.163037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.163707] RIP: 0033:0x7f6082bd7b19 [ 2126.164198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.166637] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.167640] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2126.168577] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2126.169510] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.170472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.171404] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2126.184307] FAULT_INJECTION: forcing a failure. [ 2126.184307] name failslab, interval 1, probability 0, space 0, times 0 09:47:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x5c8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:47:17 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:47:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 31) 09:47:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 28) 09:47:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 30) 09:47:17 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x1274, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xa00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2126.185688] CPU: 1 PID: 10095 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2126.190634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.191586] Call Trace: [ 2126.191922] dump_stack+0x107/0x167 [ 2126.192383] should_fail.cold+0x5/0xa [ 2126.192893] should_failslab+0x5/0x20 [ 2126.193411] __kmalloc_node_track_caller+0x74/0x3b0 [ 2126.194089] ? skb_segment+0x9d8/0x3aa0 [ 2126.194599] __alloc_skb+0xb1/0x5b0 [ 2126.195035] skb_segment+0x9d8/0x3aa0 [ 2126.195506] ? __lock_acquire+0xbb1/0x5b00 [ 2126.196056] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.196679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.197348] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.197851] __udp_gso_segment+0x11c6/0x1830 [ 2126.198407] ? __sk_receive_skb+0x830/0x830 [ 2126.198947] udp4_ufo_fragment+0x528/0x720 [ 2126.199495] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.200095] inet_gso_segment+0x4fb/0x11a0 [ 2126.200603] skb_mac_gso_segment+0x273/0x570 [ 2126.201116] ? inet_sock_destruct+0x840/0x840 [ 2126.201638] ? skb_network_protocol+0x650/0x650 [ 2126.202225] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.202768] ? lock_acquire+0x197/0x470 [ 2126.203236] ? __dev_queue_xmit+0x1c6/0x2690 [ 2126.203752] __skb_gso_segment+0x32d/0x6d0 [ 2126.204246] ? mark_lock+0xf5/0x2df0 [ 2126.204683] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.205312] ? lock_chain_count+0x20/0x20 [ 2126.205832] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2126.206428] __dev_queue_xmit+0x825/0x2690 [ 2126.206998] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.207629] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.208172] ? mark_held_locks+0x9e/0xe0 [ 2126.208696] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.209347] neigh_connected_output+0x382/0x4d0 [ 2126.214001] ip_finish_output2+0x6f1/0x21f0 [ 2126.218405] ? nf_hook_slow+0xfc/0x1e0 [ 2126.218865] ? ip_frag_next+0x9e0/0x9e0 [ 2126.219332] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.219919] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.220512] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.221136] ? netif_rx_ni+0xe7/0x300 [ 2126.221622] ip_mc_output+0x401/0xa30 [ 2126.222135] ip_send_skb+0xdd/0x260 [ 2126.222600] udp_send_skb+0x6da/0x11d0 [ 2126.223108] udp_sendmsg+0x139a/0x2160 [ 2126.223600] ? mark_lock+0xf5/0x2df0 [ 2126.224080] ? ip_frag_init+0x350/0x350 [ 2126.224599] ? lock_chain_count+0x20/0x20 [ 2126.225140] ? udp_setsockopt+0xc0/0xc0 [ 2126.225637] ? mark_lock+0xf5/0x2df0 [ 2126.230209] ? lock_acquire+0x197/0x470 [ 2126.230674] ? lock_chain_count+0x20/0x20 [ 2126.231162] ? mark_lock+0xf5/0x2df0 [ 2126.231627] ? mark_lock+0xf5/0x2df0 [ 2126.232093] ? lock_chain_count+0x20/0x20 [ 2126.232606] ? __lock_acquire+0xbb1/0x5b00 [ 2126.233136] ? lock_chain_count+0x20/0x20 [ 2126.233668] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.234333] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.234871] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.249521] FAULT_INJECTION: forcing a failure. [ 2126.249521] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.249979] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.254968] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.255482] ? mark_lock+0xf5/0x2df0 [ 2126.255946] ? lock_acquire+0x197/0x470 [ 2126.256437] ? find_held_lock+0x2c/0x110 [ 2126.256957] ? __might_fault+0xd3/0x180 [ 2126.257450] ? lock_downgrade+0x6d0/0x6d0 [ 2126.261991] ? lock_downgrade+0x6d0/0x6d0 [ 2126.262489] ? sock_has_perm+0x1ea/0x280 [ 2126.262972] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.263576] ? _copy_from_user+0xfb/0x1b0 [ 2126.264067] ? __import_iovec+0x458/0x590 [ 2126.264559] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.265164] inet6_sendmsg+0x105/0x140 [ 2126.265626] ? inet6_compat_ioctl+0x320/0x320 [ 2126.266176] __sock_sendmsg+0xf2/0x190 [ 2126.266637] ____sys_sendmsg+0x70d/0x870 [ 2126.267114] ? sock_write_iter+0x3d0/0x3d0 [ 2126.267608] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.268068] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.268545] ? lock_downgrade+0x6d0/0x6d0 [ 2126.269034] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.269705] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.270219] ___sys_sendmsg+0xf3/0x170 [ 2126.270679] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.271220] ? __fget_files+0x2cf/0x520 [ 2126.271683] ? lock_downgrade+0x6d0/0x6d0 [ 2126.272168] ? find_held_lock+0x2c/0x110 [ 2126.272647] ? __fget_files+0x2f8/0x520 [ 2126.273117] ? __fget_light+0xea/0x290 [ 2126.273575] __sys_sendmsg+0xe5/0x1b0 [ 2126.274034] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.274538] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.275093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.275704] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.276308] ? trace_hardirqs_on+0x5b/0x180 [ 2126.276808] do_syscall_64+0x33/0x40 [ 2126.277242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.277833] RIP: 0033:0x7f251a6f7b19 [ 2126.278287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.280562] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.281478] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2126.286408] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2126.287264] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.288092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.288914] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2126.289759] CPU: 0 PID: 10114 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2126.290707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.291787] Call Trace: [ 2126.292146] dump_stack+0x107/0x167 [ 2126.292622] should_fail.cold+0x5/0xa [ 2126.293125] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2126.293815] ? create_object.isra.0+0x3a/0xa20 [ 2126.294447] should_failslab+0x5/0x20 [ 2126.294944] kmem_cache_alloc+0x5b/0x310 [ 2126.295474] ? mark_held_locks+0x9e/0xe0 [ 2126.296005] create_object.isra.0+0x3a/0xa20 [ 2126.296572] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2126.297230] kmem_cache_alloc_node+0x169/0x330 [ 2126.297829] __alloc_skb+0x6d/0x5b0 [ 2126.298349] skb_segment+0x9d8/0x3aa0 [ 2126.298847] ? __lock_acquire+0xbb1/0x5b00 [ 2126.299423] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.300070] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.300746] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.301278] __udp_gso_segment+0x11c6/0x1830 [ 2126.301855] ? __sk_receive_skb+0x830/0x830 [ 2126.306455] udp4_ufo_fragment+0x528/0x720 [ 2126.307007] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.307651] inet_gso_segment+0x4fb/0x11a0 [ 2126.308212] skb_mac_gso_segment+0x273/0x570 [ 2126.308780] ? inet_sock_destruct+0x840/0x840 [ 2126.309357] ? skb_network_protocol+0x650/0x650 [ 2126.309972] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.310552] ? mark_held_locks+0x9e/0xe0 [ 2126.311075] ? lock_acquire+0x197/0x470 [ 2126.311596] __skb_gso_segment+0x32d/0x6d0 [ 2126.312153] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.312831] ? __dev_queue_xmit+0x731/0x2690 [ 2126.313401] __dev_queue_xmit+0x825/0x2690 [ 2126.314003] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.314681] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.315281] ? mark_held_locks+0x9e/0xe0 [ 2126.315814] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.316498] neigh_connected_output+0x382/0x4d0 [ 2126.317119] ip_finish_output2+0x6f1/0x21f0 [ 2126.317682] ? nf_hook_slow+0xfc/0x1e0 [ 2126.318218] ? ip_frag_next+0x9e0/0x9e0 [ 2126.318740] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.319392] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.320028] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.320662] ? netif_rx_ni+0xe7/0x300 [ 2126.321159] ip_mc_output+0x401/0xa30 [ 2126.321657] ip_send_skb+0xdd/0x260 [ 2126.326166] udp_send_skb+0x6da/0x11d0 [ 2126.326682] udp_sendmsg+0x139a/0x2160 [ 2126.327185] ? mark_lock+0xf5/0x2df0 [ 2126.327670] ? ip_frag_init+0x350/0x350 [ 2126.328192] ? lock_chain_count+0x20/0x20 [ 2126.328733] ? udp_setsockopt+0xc0/0xc0 [ 2126.329245] ? mark_lock+0xf5/0x2df0 [ 2126.329729] ? lock_acquire+0x197/0x470 [ 2126.330274] ? lock_chain_count+0x20/0x20 [ 2126.330815] ? mark_lock+0xf5/0x2df0 [ 2126.331299] ? mark_lock+0xf5/0x2df0 [ 2126.331782] ? lock_chain_count+0x20/0x20 [ 2126.332317] ? __lock_acquire+0xbb1/0x5b00 [ 2126.332866] ? lock_chain_count+0x20/0x20 [ 2126.333413] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.334138] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.334675] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.335213] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.335877] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.336410] ? mark_lock+0xf5/0x2df0 [ 2126.336896] ? lock_acquire+0x197/0x470 [ 2126.337408] ? find_held_lock+0x2c/0x110 [ 2126.337972] ? __might_fault+0xd3/0x180 [ 2126.338490] ? lock_downgrade+0x6d0/0x6d0 [ 2126.339029] ? lock_downgrade+0x6d0/0x6d0 [ 2126.339574] ? sock_has_perm+0x1ea/0x280 [ 2126.340099] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.340769] ? _copy_from_user+0xfb/0x1b0 [ 2126.341316] ? __import_iovec+0x458/0x590 [ 2126.341853] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.342557] inet6_sendmsg+0x105/0x140 [ 2126.343080] ? inet6_compat_ioctl+0x320/0x320 [ 2126.343668] __sock_sendmsg+0xf2/0x190 [ 2126.344172] ____sys_sendmsg+0x70d/0x870 [ 2126.344700] ? sock_write_iter+0x3d0/0x3d0 [ 2126.345259] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.345775] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.350336] ? lock_downgrade+0x6d0/0x6d0 [ 2126.350882] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.351572] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.352122] ___sys_sendmsg+0xf3/0x170 [ 2126.352645] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.353256] ? __fget_files+0x2cf/0x520 [ 2126.353771] ? lock_downgrade+0x6d0/0x6d0 [ 2126.354341] ? find_held_lock+0x2c/0x110 [ 2126.354885] ? __fget_files+0x2f8/0x520 [ 2126.355406] ? __fget_light+0xea/0x290 [ 2126.355916] __sys_sendmsg+0xe5/0x1b0 [ 2126.356409] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.356970] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.357585] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.358295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.358969] ? trace_hardirqs_on+0x5b/0x180 [ 2126.359535] do_syscall_64+0x33/0x40 [ 2126.360020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.360683] RIP: 0033:0x7f3f9ec55b19 [ 2126.361167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.363559] RSP: 002b:00007f3f9c1aa188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.364547] RAX: ffffffffffffffda RBX: 00007f3f9ed69020 RCX: 00007f3f9ec55b19 [ 2126.365473] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2126.366410] RBP: 00007f3f9c1aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.367334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.368263] R13: 00007ffc3dc4976f R14: 00007f3f9c1aa300 R15: 0000000000022000 09:47:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 32) 09:47:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 29) 09:47:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:17 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x1275, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 31) [ 2126.501455] FAULT_INJECTION: forcing a failure. [ 2126.501455] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.506979] CPU: 1 PID: 10126 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2126.507843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.508871] Call Trace: [ 2126.509210] dump_stack+0x107/0x167 [ 2126.509670] should_fail.cold+0x5/0xa [ 2126.510152] ? trace_hardirqs_on+0x5b/0x180 [ 2126.510654] ? __alloc_skb+0x6d/0x5b0 [ 2126.511098] should_failslab+0x5/0x20 [ 2126.511551] kmem_cache_alloc_node+0x55/0x330 [ 2126.512101] __alloc_skb+0x6d/0x5b0 [ 2126.512535] skb_segment+0x9d8/0x3aa0 [ 2126.512986] ? __lock_acquire+0xbb1/0x5b00 [ 2126.513514] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.514135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.514776] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.515277] __udp_gso_segment+0x11c6/0x1830 [ 2126.515805] ? __sk_receive_skb+0x830/0x830 [ 2126.516333] udp4_ufo_fragment+0x528/0x720 [ 2126.516858] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.517454] inet_gso_segment+0x4fb/0x11a0 [ 2126.518128] skb_mac_gso_segment+0x273/0x570 [ 2126.518173] FAULT_INJECTION: forcing a failure. [ 2126.518173] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.518656] ? inet_sock_destruct+0x840/0x840 [ 2126.518669] ? skb_network_protocol+0x650/0x650 [ 2126.518680] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.518698] ? lock_acquire+0x197/0x470 [ 2126.522353] ? __dev_queue_xmit+0x1c6/0x2690 [ 2126.522917] __skb_gso_segment+0x32d/0x6d0 [ 2126.523450] ? mark_lock+0xf5/0x2df0 [ 2126.523936] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.524610] ? lock_chain_count+0x20/0x20 [ 2126.525132] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2126.525731] __dev_queue_xmit+0x825/0x2690 [ 2126.526280] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.526941] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.527543] ? mark_held_locks+0x9e/0xe0 [ 2126.528089] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.528788] neigh_connected_output+0x382/0x4d0 [ 2126.529393] ip_finish_output2+0x6f1/0x21f0 [ 2126.529962] ? nf_hook_slow+0xfc/0x1e0 [ 2126.530475] ? ip_frag_next+0x9e0/0x9e0 [ 2126.530987] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.531666] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.532297] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.532932] ? netif_rx_ni+0xe7/0x300 [ 2126.533402] ip_mc_output+0x401/0xa30 [ 2126.533906] ip_send_skb+0xdd/0x260 [ 2126.534393] udp_send_skb+0x6da/0x11d0 [ 2126.534888] udp_sendmsg+0x139a/0x2160 [ 2126.535359] ? mark_lock+0xf5/0x2df0 [ 2126.535822] ? ip_frag_init+0x350/0x350 [ 2126.536339] ? lock_chain_count+0x20/0x20 [ 2126.536901] ? udp_setsockopt+0xc0/0xc0 [ 2126.537423] ? mark_lock+0xf5/0x2df0 [ 2126.537920] ? lock_acquire+0x197/0x470 [ 2126.538440] ? lock_chain_count+0x20/0x20 [ 2126.538949] ? mark_lock+0xf5/0x2df0 [ 2126.539422] ? mark_lock+0xf5/0x2df0 [ 2126.539886] ? lock_chain_count+0x20/0x20 [ 2126.540385] ? __lock_acquire+0xbb1/0x5b00 [ 2126.540900] ? lock_chain_count+0x20/0x20 [ 2126.541435] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.542115] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.542648] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.543196] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.543830] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.544326] ? mark_lock+0xf5/0x2df0 [ 2126.544779] ? lock_acquire+0x197/0x470 [ 2126.545282] ? find_held_lock+0x2c/0x110 [ 2126.545815] ? __might_fault+0xd3/0x180 [ 2126.546390] ? lock_downgrade+0x6d0/0x6d0 [ 2126.546937] ? lock_downgrade+0x6d0/0x6d0 [ 2126.547483] ? sock_has_perm+0x1ea/0x280 [ 2126.548018] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.548654] ? _copy_from_user+0xfb/0x1b0 [ 2126.549170] ? __import_iovec+0x458/0x590 [ 2126.549678] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.550333] inet6_sendmsg+0x105/0x140 [ 2126.550815] ? inet6_compat_ioctl+0x320/0x320 [ 2126.551351] __sock_sendmsg+0xf2/0x190 [ 2126.551822] ____sys_sendmsg+0x70d/0x870 [ 2126.552308] ? sock_write_iter+0x3d0/0x3d0 [ 2126.552824] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.553385] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.553924] ? lock_downgrade+0x6d0/0x6d0 [ 2126.554443] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.555078] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.555589] ___sys_sendmsg+0xf3/0x170 [ 2126.556095] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.556713] ? __fget_files+0x2cf/0x520 [ 2126.557242] ? lock_downgrade+0x6d0/0x6d0 [ 2126.557798] ? find_held_lock+0x2c/0x110 [ 2126.558362] ? __fget_files+0x2f8/0x520 [ 2126.558885] ? __fget_light+0xea/0x290 [ 2126.559380] __sys_sendmsg+0xe5/0x1b0 [ 2126.559891] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.560447] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.561081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.561754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.562419] ? trace_hardirqs_on+0x5b/0x180 [ 2126.562961] do_syscall_64+0x33/0x40 [ 2126.563428] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.564072] RIP: 0033:0x7f6082bd7b19 [ 2126.564550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.566983] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.568052] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2126.568985] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2126.569934] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.570928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.571894] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2126.572895] CPU: 0 PID: 10122 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2126.573947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.575150] Call Trace: [ 2126.575549] dump_stack+0x107/0x167 [ 2126.576081] should_fail.cold+0x5/0xa [ 2126.576640] ? create_object.isra.0+0x3a/0xa20 [ 2126.577293] should_failslab+0x5/0x20 [ 2126.577814] kmem_cache_alloc+0x5b/0x310 [ 2126.578378] create_object.isra.0+0x3a/0xa20 [ 2126.578951] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2126.579621] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2126.580295] ? skb_segment+0x9d8/0x3aa0 [ 2126.580824] __alloc_skb+0xb1/0x5b0 [ 2126.581306] skb_segment+0x9d8/0x3aa0 [ 2126.581809] ? __lock_acquire+0xbb1/0x5b00 [ 2126.581946] FAULT_INJECTION: forcing a failure. [ 2126.581946] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.582418] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.584427] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.585109] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.585649] __udp_gso_segment+0x11c6/0x1830 [ 2126.590247] ? __sk_receive_skb+0x830/0x830 [ 2126.590820] udp4_ufo_fragment+0x528/0x720 [ 2126.591371] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.592021] inet_gso_segment+0x4fb/0x11a0 [ 2126.592579] skb_mac_gso_segment+0x273/0x570 [ 2126.593151] ? inet_sock_destruct+0x840/0x840 [ 2126.593735] ? skb_network_protocol+0x650/0x650 [ 2126.594350] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.594936] ? lock_acquire+0x197/0x470 [ 2126.595450] ? __dev_queue_xmit+0x1c6/0x2690 [ 2126.596029] __skb_gso_segment+0x32d/0x6d0 [ 2126.596579] ? mark_lock+0xf5/0x2df0 [ 2126.597067] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.597749] ? lock_chain_count+0x20/0x20 [ 2126.598312] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2126.598916] __dev_queue_xmit+0x825/0x2690 [ 2126.599467] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.600138] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.600739] ? mark_held_locks+0x9e/0xe0 [ 2126.601267] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.601969] neigh_connected_output+0x382/0x4d0 [ 2126.602583] ip_finish_output2+0x6f1/0x21f0 [ 2126.603145] ? nf_hook_slow+0xfc/0x1e0 [ 2126.603655] ? ip_frag_next+0x9e0/0x9e0 [ 2126.604169] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.604832] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.605468] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.606136] ? netif_rx_ni+0xe7/0x300 [ 2126.606640] ip_mc_output+0x401/0xa30 [ 2126.607139] ip_send_skb+0xdd/0x260 [ 2126.607617] udp_send_skb+0x6da/0x11d0 [ 2126.608131] udp_sendmsg+0x139a/0x2160 [ 2126.608639] ? mark_lock+0xf5/0x2df0 [ 2126.609123] ? ip_frag_init+0x350/0x350 [ 2126.609642] ? lock_chain_count+0x20/0x20 [ 2126.614211] ? udp_setsockopt+0xc0/0xc0 [ 2126.614735] ? mark_lock+0xf5/0x2df0 [ 2126.615217] ? lock_acquire+0x197/0x470 [ 2126.615740] ? lock_chain_count+0x20/0x20 [ 2126.616277] ? mark_lock+0xf5/0x2df0 [ 2126.616767] ? mark_lock+0xf5/0x2df0 [ 2126.617248] ? lock_chain_count+0x20/0x20 [ 2126.617819] ? __lock_acquire+0xbb1/0x5b00 [ 2126.618380] ? lock_chain_count+0x20/0x20 [ 2126.618937] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.619619] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.620155] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.620708] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.621373] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.621917] ? mark_lock+0xf5/0x2df0 [ 2126.622409] ? lock_acquire+0x197/0x470 [ 2126.622930] ? find_held_lock+0x2c/0x110 [ 2126.623461] ? __might_fault+0xd3/0x180 [ 2126.623991] ? lock_downgrade+0x6d0/0x6d0 [ 2126.624532] ? lock_downgrade+0x6d0/0x6d0 [ 2126.625078] ? sock_has_perm+0x1ea/0x280 [ 2126.625609] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.626297] ? _copy_from_user+0xfb/0x1b0 [ 2126.626857] ? __import_iovec+0x458/0x590 [ 2126.627395] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.628073] inet6_sendmsg+0x105/0x140 [ 2126.628582] ? inet6_compat_ioctl+0x320/0x320 [ 2126.629166] __sock_sendmsg+0xf2/0x190 [ 2126.629678] ____sys_sendmsg+0x70d/0x870 [ 2126.633427] ? sock_write_iter+0x3d0/0x3d0 [ 2126.633997] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.634508] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.635040] ? lock_downgrade+0x6d0/0x6d0 [ 2126.635584] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.636266] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.636810] ___sys_sendmsg+0xf3/0x170 [ 2126.637318] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.637930] ? __fget_files+0x2cf/0x520 [ 2126.638451] ? lock_downgrade+0x6d0/0x6d0 [ 2126.638999] ? find_held_lock+0x2c/0x110 [ 2126.639537] ? __fget_files+0x2f8/0x520 [ 2126.640072] ? __fget_light+0xea/0x290 [ 2126.640591] __sys_sendmsg+0xe5/0x1b0 [ 2126.641092] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.641660] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.642297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.642988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.643658] ? trace_hardirqs_on+0x5b/0x180 [ 2126.644216] do_syscall_64+0x33/0x40 [ 2126.644705] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.645365] RIP: 0033:0x7f251a6f7b19 [ 2126.645854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.648246] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.649242] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2126.650448] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2126.651553] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.652484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.653417] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2126.654398] CPU: 1 PID: 10128 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2126.655291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.656256] Call Trace: [ 2126.656594] dump_stack+0x107/0x167 [ 2126.657055] should_fail.cold+0x5/0xa [ 2126.657534] should_failslab+0x5/0x20 [ 2126.658031] __kmalloc_node_track_caller+0x74/0x3b0 [ 2126.658629] ? skb_segment+0x9d8/0x3aa0 [ 2126.659132] __alloc_skb+0xb1/0x5b0 [ 2126.659577] skb_segment+0x9d8/0x3aa0 [ 2126.660059] ? __lock_acquire+0xbb1/0x5b00 [ 2126.660636] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2126.661284] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.661962] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.662500] __udp_gso_segment+0x11c6/0x1830 [ 2126.663052] ? __sk_receive_skb+0x830/0x830 [ 2126.663594] udp4_ufo_fragment+0x528/0x720 [ 2126.664111] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2126.674316] inet_gso_segment+0x4fb/0x11a0 [ 2126.674880] skb_mac_gso_segment+0x273/0x570 [ 2126.675447] ? inet_sock_destruct+0x840/0x840 [ 2126.676031] ? skb_network_protocol+0x650/0x650 [ 2126.676628] ? skb_crc32c_csum_help+0x80/0x80 [ 2126.677185] ? lock_acquire+0x197/0x470 [ 2126.677691] ? __dev_queue_xmit+0x1c6/0x2690 [ 2126.678219] __skb_gso_segment+0x32d/0x6d0 [ 2126.678713] ? mark_lock+0xf5/0x2df0 [ 2126.679149] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2126.679773] ? lock_chain_count+0x20/0x20 [ 2126.680312] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2126.680858] __dev_queue_xmit+0x825/0x2690 [ 2126.681353] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2126.681968] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2126.682512] ? mark_held_locks+0x9e/0xe0 [ 2126.682989] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2126.683607] neigh_connected_output+0x382/0x4d0 [ 2126.684190] ip_finish_output2+0x6f1/0x21f0 [ 2126.684736] ? nf_hook_slow+0xfc/0x1e0 [ 2126.685238] ? ip_frag_next+0x9e0/0x9e0 [ 2126.685743] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2126.686376] __ip_finish_output.part.0+0x5f3/0xb50 [ 2126.686968] ? ip_fragment.constprop.0+0x240/0x240 [ 2126.687557] ? netif_rx_ni+0xe7/0x300 [ 2126.688042] ip_mc_output+0x401/0xa30 [ 2126.688549] ip_send_skb+0xdd/0x260 [ 2126.689029] udp_send_skb+0x6da/0x11d0 [ 2126.689537] udp_sendmsg+0x139a/0x2160 [ 2126.694073] ? mark_lock+0xf5/0x2df0 [ 2126.694511] ? ip_frag_init+0x350/0x350 [ 2126.694978] ? lock_chain_count+0x20/0x20 [ 2126.695465] ? udp_setsockopt+0xc0/0xc0 [ 2126.695928] ? mark_lock+0xf5/0x2df0 [ 2126.696362] ? lock_acquire+0x197/0x470 [ 2126.696825] ? lock_chain_count+0x20/0x20 [ 2126.697302] ? mark_lock+0xf5/0x2df0 [ 2126.697737] ? mark_lock+0xf5/0x2df0 [ 2126.698193] ? lock_chain_count+0x20/0x20 [ 2126.698728] ? __lock_acquire+0xbb1/0x5b00 [ 2126.699272] ? lock_chain_count+0x20/0x20 [ 2126.699813] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.700436] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.700928] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2126.701415] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.706188] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.706670] ? mark_lock+0xf5/0x2df0 [ 2126.707109] ? lock_acquire+0x197/0x470 [ 2126.707574] ? find_held_lock+0x2c/0x110 [ 2126.708051] ? __might_fault+0xd3/0x180 [ 2126.708515] ? lock_downgrade+0x6d0/0x6d0 [ 2126.709001] ? lock_downgrade+0x6d0/0x6d0 [ 2126.709482] ? sock_has_perm+0x1ea/0x280 [ 2126.709968] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2126.710575] ? _copy_from_user+0xfb/0x1b0 [ 2126.711072] ? __import_iovec+0x458/0x590 [ 2126.711557] ? udp_v6_push_pending_frames+0x360/0x360 [ 2126.712219] inet6_sendmsg+0x105/0x140 [ 2126.712722] ? inet6_compat_ioctl+0x320/0x320 [ 2126.713282] __sock_sendmsg+0xf2/0x190 [ 2126.713739] ____sys_sendmsg+0x70d/0x870 [ 2126.714240] ? sock_write_iter+0x3d0/0x3d0 [ 2126.714729] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.715181] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.715651] ? lock_downgrade+0x6d0/0x6d0 [ 2126.716138] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2126.716746] ? SOFTIRQ_verbose+0x10/0x10 [ 2126.717221] ___sys_sendmsg+0xf3/0x170 [ 2126.717675] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.718306] ? __fget_files+0x2cf/0x520 [ 2126.718791] ? lock_downgrade+0x6d0/0x6d0 [ 2126.719293] ? find_held_lock+0x2c/0x110 [ 2126.719795] ? __fget_files+0x2f8/0x520 [ 2126.720283] ? __fget_light+0xea/0x290 [ 2126.720762] __sys_sendmsg+0xe5/0x1b0 [ 2126.721224] ? __sys_sendmsg_sock+0x40/0x40 [ 2126.721747] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.722335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2126.722974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.723598] ? trace_hardirqs_on+0x5b/0x180 [ 2126.724123] do_syscall_64+0x33/0x40 [ 2126.724578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.725215] RIP: 0033:0x7f3f9ec55b19 [ 2126.725678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.727940] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2126.728875] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2126.729748] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2126.730635] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.731509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.732384] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:47:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:33 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x1276, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:33 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 32) 09:47:33 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:47:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 30) 09:47:33 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 33) 09:47:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xe00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:47:33 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2142.703138] FAULT_INJECTION: forcing a failure. [ 2142.703138] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.704742] CPU: 0 PID: 10155 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2142.705677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.706818] Call Trace: [ 2142.707184] dump_stack+0x107/0x167 [ 2142.707692] should_fail.cold+0x5/0xa [ 2142.708213] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2142.708941] ? create_object.isra.0+0x3a/0xa20 [ 2142.709563] should_failslab+0x5/0x20 [ 2142.710081] kmem_cache_alloc+0x5b/0x310 [ 2142.710666] ? mark_held_locks+0x9e/0xe0 [ 2142.711220] create_object.isra.0+0x3a/0xa20 [ 2142.711818] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2142.712506] kmem_cache_alloc_node+0x169/0x330 [ 2142.713131] __alloc_skb+0x6d/0x5b0 [ 2142.713635] skb_segment+0x9d8/0x3aa0 [ 2142.714151] ? __lock_acquire+0xbb1/0x5b00 [ 2142.714777] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2142.715453] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.716156] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.716715] __udp_gso_segment+0x11c6/0x1830 [ 2142.717305] ? __sk_receive_skb+0x830/0x830 [ 2142.717891] udp4_ufo_fragment+0x528/0x720 [ 2142.718486] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2142.719177] inet_gso_segment+0x4fb/0x11a0 [ 2142.719753] skb_mac_gso_segment+0x273/0x570 [ 2142.720348] ? inet_sock_destruct+0x840/0x840 [ 2142.720951] ? skb_network_protocol+0x650/0x650 [ 2142.721575] ? skb_crc32c_csum_help+0x80/0x80 [ 2142.722178] ? lock_acquire+0x197/0x470 [ 2142.722836] ? __dev_queue_xmit+0x1c6/0x2690 [ 2142.723434] __skb_gso_segment+0x32d/0x6d0 [ 2142.724004] ? mark_lock+0xf5/0x2df0 [ 2142.724508] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2142.725196] ? lock_chain_count+0x20/0x20 [ 2142.725748] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2142.726324] __dev_queue_xmit+0x825/0x2690 [ 2142.726901] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2142.727566] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2142.728162] ? mark_held_locks+0x9e/0xe0 [ 2142.728687] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2142.729369] neigh_connected_output+0x382/0x4d0 [ 2142.730006] ip_finish_output2+0x6f1/0x21f0 [ 2142.730619] ? nf_hook_slow+0xfc/0x1e0 [ 2142.731136] ? ip_frag_next+0x9e0/0x9e0 [ 2142.731671] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2142.732347] __ip_finish_output.part.0+0x5f3/0xb50 [ 2142.733001] ? ip_fragment.constprop.0+0x240/0x240 [ 2142.733652] ? netif_rx_ni+0xe7/0x300 [ 2142.734173] ip_mc_output+0x401/0xa30 [ 2142.738741] ip_send_skb+0xdd/0x260 [ 2142.739240] udp_send_skb+0x6da/0x11d0 [ 2142.739782] udp_sendmsg+0x139a/0x2160 [ 2142.740303] ? mark_lock+0xf5/0x2df0 [ 2142.740812] ? ip_frag_init+0x350/0x350 [ 2142.741352] ? lock_chain_count+0x20/0x20 [ 2142.741922] ? udp_setsockopt+0xc0/0xc0 [ 2142.742458] ? mark_lock+0xf5/0x2df0 [ 2142.742992] ? lock_acquire+0x197/0x470 [ 2142.743538] ? lock_chain_count+0x20/0x20 [ 2142.744102] ? mark_lock+0xf5/0x2df0 [ 2142.744611] ? mark_lock+0xf5/0x2df0 [ 2142.745108] ? lock_chain_count+0x20/0x20 [ 2142.745655] ? __lock_acquire+0xbb1/0x5b00 [ 2142.746224] ? lock_chain_count+0x20/0x20 [ 2142.746827] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.747556] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.748130] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2142.748713] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.749389] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.749911] ? mark_lock+0xf5/0x2df0 [ 2142.750399] ? lock_acquire+0x197/0x470 [ 2142.750951] ? find_held_lock+0x2c/0x110 [ 2142.751504] ? __might_fault+0xd3/0x180 [ 2142.752058] ? lock_downgrade+0x6d0/0x6d0 [ 2142.752646] ? lock_downgrade+0x6d0/0x6d0 [ 2142.753227] ? sock_has_perm+0x1ea/0x280 [ 2142.753793] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2142.754492] ? _copy_from_user+0xfb/0x1b0 [ 2142.755090] ? __import_iovec+0x458/0x590 [ 2142.755670] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.756392] inet6_sendmsg+0x105/0x140 [ 2142.756934] ? inet6_compat_ioctl+0x320/0x320 [ 2142.757534] __sock_sendmsg+0xf2/0x190 [ 2142.758075] ____sys_sendmsg+0x70d/0x870 [ 2142.758679] ? sock_write_iter+0x3d0/0x3d0 [ 2142.759256] ? do_recvmmsg+0x6d0/0x6d0 [ 2142.759800] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.760355] ? lock_downgrade+0x6d0/0x6d0 [ 2142.760921] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.761646] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.762214] ___sys_sendmsg+0xf3/0x170 [ 2142.766802] ? sendmsg_copy_msghdr+0x160/0x160 [ 2142.767448] ? __fget_files+0x2cf/0x520 [ 2142.768002] ? lock_downgrade+0x6d0/0x6d0 [ 2142.768581] ? find_held_lock+0x2c/0x110 [ 2142.769150] ? __fget_files+0x2f8/0x520 [ 2142.769689] ? __fget_light+0xea/0x290 [ 2142.770236] __sys_sendmsg+0xe5/0x1b0 [ 2142.770785] ? __sys_sendmsg_sock+0x40/0x40 [ 2142.771388] ? rcu_read_lock_any_held+0x75/0xa0 [ 2142.772052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2142.772763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2142.773448] ? trace_hardirqs_on+0x5b/0x180 [ 2142.774052] do_syscall_64+0x33/0x40 [ 2142.774602] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2142.775317] RIP: 0033:0x7f6082bd7b19 [ 2142.775840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.778298] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2142.783397] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2142.784368] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2142.785309] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.786257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.787268] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2142.840046] FAULT_INJECTION: forcing a failure. [ 2142.840046] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.841648] CPU: 0 PID: 10158 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2142.842591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.843709] Call Trace: [ 2142.844074] dump_stack+0x107/0x167 [ 2142.844574] should_fail.cold+0x5/0xa [ 2142.845094] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2142.845805] ? create_object.isra.0+0x3a/0xa20 [ 2142.846427] should_failslab+0x5/0x20 [ 2142.846963] kmem_cache_alloc+0x5b/0x310 [ 2142.847523] create_object.isra.0+0x3a/0xa20 [ 2142.848115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2142.848807] kmem_cache_alloc_node+0x169/0x330 [ 2142.849431] __alloc_skb+0x6d/0x5b0 [ 2142.849935] skb_segment+0x9d8/0x3aa0 [ 2142.850504] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2142.851213] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.851928] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.852487] __udp_gso_segment+0x11c6/0x1830 [ 2142.853084] ? __sk_receive_skb+0x830/0x830 [ 2142.853682] udp4_ufo_fragment+0x528/0x720 [ 2142.854262] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2142.855019] inet_gso_segment+0x4fb/0x11a0 [ 2142.855608] skb_mac_gso_segment+0x273/0x570 [ 2142.856206] ? inet_sock_destruct+0x840/0x840 [ 2142.856807] ? skb_network_protocol+0x650/0x650 [ 2142.857409] ? skb_crc32c_csum_help+0x80/0x80 [ 2142.858020] ? lock_acquire+0x197/0x470 [ 2142.862598] ? __dev_queue_xmit+0x1c6/0x2690 [ 2142.863201] __skb_gso_segment+0x32d/0x6d0 [ 2142.863783] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2142.864491] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.865040] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2142.865660] __dev_queue_xmit+0x825/0x2690 [ 2142.866236] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2142.866968] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2142.867589] ? lock_downgrade+0x6d0/0x6d0 [ 2142.868151] ? lock_acquire+0x197/0x470 [ 2142.868688] ? find_held_lock+0x2c/0x110 [ 2142.869243] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2142.869960] ip_finish_output2+0x1514/0x21f0 [ 2142.870582] ? ip_frag_next+0x9e0/0x9e0 [ 2142.871122] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2142.871807] __ip_finish_output.part.0+0x5f3/0xb50 [ 2142.872472] ? ip_fragment.constprop.0+0x240/0x240 [ 2142.873131] ? nf_hook+0x510/0x510 [ 2142.873626] ip_output+0x2f7/0x600 [ 2142.874114] ip_send_skb+0xdd/0x260 [ 2142.876661] udp_send_skb+0x6da/0x11d0 [ 2142.877203] udp_sendmsg+0x1980/0x2160 [ 2142.877738] ? ip_frag_init+0x350/0x350 [ 2142.878285] ? udp_setsockopt+0xc0/0xc0 [ 2142.878864] ? mark_lock+0xf5/0x2df0 [ 2142.879365] ? lock_acquire+0x197/0x470 [ 2142.879918] ? lock_chain_count+0x20/0x20 [ 2142.880488] ? mark_lock+0xf5/0x2df0 [ 2142.881000] ? lock_chain_count+0x20/0x20 [ 2142.881583] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.882294] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.882876] udpv6_sendmsg+0x1b30/0x2ad0 [ 2142.883441] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.884136] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.884691] ? mark_lock+0xf5/0x2df0 [ 2142.885200] ? lock_acquire+0x197/0x470 [ 2142.885736] ? find_held_lock+0x2c/0x110 [ 2142.886291] ? __might_fault+0xd3/0x180 [ 2142.886855] ? lock_downgrade+0x6d0/0x6d0 [ 2142.887419] ? lock_downgrade+0x6d0/0x6d0 [ 2142.887984] ? sock_has_perm+0x1ea/0x280 [ 2142.888543] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2142.889240] ? _copy_from_user+0xfb/0x1b0 [ 2142.889813] ? __import_iovec+0x458/0x590 [ 2142.890379] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.891111] inet6_sendmsg+0x105/0x140 [ 2142.891651] ? inet6_compat_ioctl+0x320/0x320 [ 2142.892254] __sock_sendmsg+0xf2/0x190 [ 2142.892779] ____sys_sendmsg+0x70d/0x870 [ 2142.893327] ? sock_write_iter+0x3d0/0x3d0 [ 2142.893903] ? do_recvmmsg+0x6d0/0x6d0 [ 2142.894445] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.895019] ? lock_downgrade+0x6d0/0x6d0 [ 2142.895599] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.896306] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.896865] ___sys_sendmsg+0xf3/0x170 [ 2142.897402] ? sendmsg_copy_msghdr+0x160/0x160 [ 2142.897783] FAULT_INJECTION: forcing a failure. [ 2142.897783] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.898031] ? __fget_files+0x2cf/0x520 [ 2142.898047] ? lock_downgrade+0x6d0/0x6d0 [ 2142.898067] ? find_held_lock+0x2c/0x110 [ 2142.901128] ? __fget_files+0x2f8/0x520 [ 2142.901680] ? __fget_light+0xea/0x290 [ 2142.902214] __sys_sendmsg+0xe5/0x1b0 [ 2142.902753] ? __sys_sendmsg_sock+0x40/0x40 [ 2142.903331] ? rcu_read_lock_any_held+0x75/0xa0 [ 2142.903981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2142.904695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2142.905387] ? trace_hardirqs_on+0x5b/0x180 [ 2142.905975] do_syscall_64+0x33/0x40 [ 2142.906489] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2142.907193] RIP: 0033:0x7f251a6f7b19 [ 2142.907709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.910166] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2142.911207] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2142.912165] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2142.913125] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.914083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.915076] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2142.916066] CPU: 1 PID: 10172 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2142.917017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.918108] Call Trace: [ 2142.918475] dump_stack+0x107/0x167 [ 2142.918985] should_fail.cold+0x5/0xa [ 2142.919496] ? create_object.isra.0+0x3a/0xa20 [ 2142.920110] should_failslab+0x5/0x20 [ 2142.920610] kmem_cache_alloc+0x5b/0x310 [ 2142.921146] create_object.isra.0+0x3a/0xa20 [ 2142.921719] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2142.922387] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2142.923073] ? skb_segment+0x9d8/0x3aa0 [ 2142.923559] __alloc_skb+0xb1/0x5b0 [ 2142.924007] skb_segment+0x9d8/0x3aa0 [ 2142.924469] ? __lock_acquire+0xbb1/0x5b00 [ 2142.925018] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2142.925617] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.926252] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.926766] __udp_gso_segment+0x11c6/0x1830 [ 2142.927296] ? __sk_receive_skb+0x830/0x830 [ 2142.927831] udp4_ufo_fragment+0x528/0x720 [ 2142.928378] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2142.929009] inet_gso_segment+0x4fb/0x11a0 [ 2142.929657] skb_mac_gso_segment+0x273/0x570 [ 2142.930199] ? inet_sock_destruct+0x840/0x840 [ 2142.930791] ? skb_network_protocol+0x650/0x650 [ 2142.931360] ? skb_crc32c_csum_help+0x80/0x80 [ 2142.931936] ? lock_acquire+0x197/0x470 [ 2142.932404] ? __dev_queue_xmit+0x1c6/0x2690 [ 2142.932936] __skb_gso_segment+0x32d/0x6d0 [ 2142.933436] ? mark_lock+0xf5/0x2df0 [ 2142.933877] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2142.934573] ? lock_chain_count+0x20/0x20 [ 2142.935111] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2142.935658] __dev_queue_xmit+0x825/0x2690 [ 2142.936175] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2142.936800] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2142.937360] ? mark_held_locks+0x9e/0xe0 [ 2142.937859] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2142.938506] neigh_connected_output+0x382/0x4d0 [ 2142.939093] ip_finish_output2+0x6f1/0x21f0 [ 2142.939622] ? nf_hook_slow+0xfc/0x1e0 [ 2142.940092] ? ip_frag_next+0x9e0/0x9e0 [ 2142.940567] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2142.941168] __ip_finish_output.part.0+0x5f3/0xb50 [ 2142.941797] ? ip_fragment.constprop.0+0x240/0x240 [ 2142.942401] ? netif_rx_ni+0xe7/0x300 [ 2142.942896] ip_mc_output+0x401/0xa30 [ 2142.943367] ip_send_skb+0xdd/0x260 [ 2142.943817] udp_send_skb+0x6da/0x11d0 [ 2142.944292] udp_sendmsg+0x139a/0x2160 [ 2142.944763] ? mark_lock+0xf5/0x2df0 [ 2142.945211] ? ip_frag_init+0x350/0x350 [ 2142.945691] ? lock_chain_count+0x20/0x20 [ 2142.946191] ? udp_setsockopt+0xc0/0xc0 [ 2142.946699] ? mark_lock+0xf5/0x2df0 [ 2142.947155] ? lock_acquire+0x197/0x470 [ 2142.947637] ? lock_chain_count+0x20/0x20 [ 2142.948139] ? mark_lock+0xf5/0x2df0 [ 2142.948593] ? mark_lock+0xf5/0x2df0 [ 2142.949049] ? lock_chain_count+0x20/0x20 [ 2142.949581] ? __lock_acquire+0xbb1/0x5b00 [ 2142.950146] ? lock_chain_count+0x20/0x20 [ 2142.950706] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.951356] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.951864] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2142.952374] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.952997] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.953496] ? mark_lock+0xf5/0x2df0 [ 2142.953947] ? lock_acquire+0x197/0x470 [ 2142.954456] ? find_held_lock+0x2c/0x110 [ 2142.955013] ? __might_fault+0xd3/0x180 [ 2142.955524] ? lock_downgrade+0x6d0/0x6d0 [ 2142.956054] ? lock_downgrade+0x6d0/0x6d0 [ 2142.956601] ? sock_has_perm+0x1ea/0x280 [ 2142.957148] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2142.957837] ? _copy_from_user+0xfb/0x1b0 [ 2142.958360] ? __import_iovec+0x458/0x590 [ 2142.958901] ? udp_v6_push_pending_frames+0x360/0x360 [ 2142.959535] inet6_sendmsg+0x105/0x140 [ 2142.960014] ? inet6_compat_ioctl+0x320/0x320 [ 2142.960314] FAULT_INJECTION: forcing a failure. [ 2142.960314] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.960546] __sock_sendmsg+0xf2/0x190 [ 2142.960564] ____sys_sendmsg+0x70d/0x870 [ 2142.960584] ? sock_write_iter+0x3d0/0x3d0 [ 2142.963596] ? do_recvmmsg+0x6d0/0x6d0 [ 2142.964056] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.964525] ? lock_downgrade+0x6d0/0x6d0 [ 2142.965011] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.965676] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.966180] ___sys_sendmsg+0xf3/0x170 [ 2142.966661] ? sendmsg_copy_msghdr+0x160/0x160 [ 2142.967196] ? __fget_files+0x2cf/0x520 [ 2142.967661] ? lock_downgrade+0x6d0/0x6d0 [ 2142.968141] ? find_held_lock+0x2c/0x110 [ 2142.968627] ? __fget_files+0x2f8/0x520 [ 2142.969105] ? __fget_light+0xea/0x290 [ 2142.969564] __sys_sendmsg+0xe5/0x1b0 [ 2142.970010] ? __sys_sendmsg_sock+0x40/0x40 [ 2142.970530] ? rcu_read_lock_any_held+0x75/0xa0 [ 2142.971103] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2142.971725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2142.972336] ? trace_hardirqs_on+0x5b/0x180 [ 2142.972854] do_syscall_64+0x33/0x40 [ 2142.973292] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2142.973895] RIP: 0033:0x7f3f9ec55b19 [ 2142.974345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.976652] RSP: 002b:00007f3f9c1aa188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2142.977543] RAX: ffffffffffffffda RBX: 00007f3f9ed69020 RCX: 00007f3f9ec55b19 [ 2142.978377] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2142.979253] RBP: 00007f3f9c1aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.980092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.980926] R13: 00007ffc3dc4976f R14: 00007f3f9c1aa300 R15: 0000000000022000 [ 2142.981798] CPU: 0 PID: 10176 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2142.982811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.983926] Call Trace: [ 2142.984292] dump_stack+0x107/0x167 [ 2142.984796] should_fail.cold+0x5/0xa [ 2142.985318] should_failslab+0x5/0x20 [ 2142.985842] __kmalloc_node_track_caller+0x74/0x3b0 [ 2142.986532] ? skb_segment+0x9d8/0x3aa0 [ 2142.987079] __alloc_skb+0xb1/0x5b0 [ 2142.987576] skb_segment+0x9d8/0x3aa0 [ 2142.988100] ? __lock_acquire+0xbb1/0x5b00 [ 2142.988704] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2142.989372] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2142.990079] ? SOFTIRQ_verbose+0x10/0x10 [ 2142.990665] __udp_gso_segment+0x11c6/0x1830 [ 2142.991255] ? __sk_receive_skb+0x830/0x830 [ 2142.991841] udp4_ufo_fragment+0x528/0x720 [ 2142.992415] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2142.993078] inet_gso_segment+0x4fb/0x11a0 [ 2142.993657] skb_mac_gso_segment+0x273/0x570 [ 2142.994253] ? inet_sock_destruct+0x840/0x840 [ 2142.994874] ? skb_network_protocol+0x650/0x650 [ 2142.995493] ? skb_crc32c_csum_help+0x80/0x80 [ 2142.996091] ? lock_acquire+0x197/0x470 [ 2142.996621] ? __dev_queue_xmit+0x1c6/0x2690 [ 2142.997213] __skb_gso_segment+0x32d/0x6d0 [ 2142.997778] ? mark_lock+0xf5/0x2df0 [ 2142.998280] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2142.999000] ? lock_chain_count+0x20/0x20 [ 2142.999555] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.000174] __dev_queue_xmit+0x825/0x2690 [ 2143.000750] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.001439] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.002065] ? mark_held_locks+0x9e/0xe0 [ 2143.002644] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.003357] neigh_connected_output+0x382/0x4d0 [ 2143.003998] ip_finish_output2+0x6f1/0x21f0 [ 2143.004585] ? nf_hook_slow+0xfc/0x1e0 [ 2143.005109] ? ip_frag_next+0x9e0/0x9e0 [ 2143.005651] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.006333] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.007016] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.007675] ? netif_rx_ni+0xe7/0x300 [ 2143.008191] ip_mc_output+0x401/0xa30 [ 2143.008710] ip_send_skb+0xdd/0x260 [ 2143.009203] udp_send_skb+0x6da/0x11d0 [ 2143.009737] udp_sendmsg+0x139a/0x2160 [ 2143.010256] ? mark_lock+0xf5/0x2df0 [ 2143.010782] ? ip_frag_init+0x350/0x350 [ 2143.011312] ? lock_chain_count+0x20/0x20 [ 2143.011864] ? udp_setsockopt+0xc0/0xc0 [ 2143.012379] ? mark_lock+0xf5/0x2df0 [ 2143.012869] ? __lock_acquire+0x1657/0x5b00 [ 2143.013438] ? lock_chain_count+0x20/0x20 [ 2143.013989] ? mark_lock+0xf5/0x2df0 [ 2143.014506] ? mark_lock+0xf5/0x2df0 [ 2143.015011] ? lock_chain_count+0x20/0x20 [ 2143.015568] ? __lock_acquire+0xbb1/0x5b00 [ 2143.016138] ? lock_chain_count+0x20/0x20 [ 2143.016710] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.017411] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.017971] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.018545] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.019238] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.019792] ? mark_lock+0xf5/0x2df0 [ 2143.020297] ? lock_acquire+0x197/0x470 [ 2143.020833] ? find_held_lock+0x2c/0x110 [ 2143.021392] ? __might_fault+0xd3/0x180 [ 2143.021929] ? lock_downgrade+0x6d0/0x6d0 [ 2143.022499] ? lock_downgrade+0x6d0/0x6d0 [ 2143.023073] ? sock_has_perm+0x1ea/0x280 [ 2143.023622] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.024316] ? _copy_from_user+0xfb/0x1b0 [ 2143.024889] ? __import_iovec+0x458/0x590 [ 2143.025447] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.026138] inet6_sendmsg+0x105/0x140 [ 2143.026686] ? inet6_compat_ioctl+0x320/0x320 [ 2143.027286] __sock_sendmsg+0xf2/0x190 [ 2143.027812] ____sys_sendmsg+0x70d/0x870 [ 2143.028363] ? sock_write_iter+0x3d0/0x3d0 [ 2143.028931] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.029459] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.029997] ? lock_downgrade+0x6d0/0x6d0 [ 2143.030572] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.031274] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.031825] ___sys_sendmsg+0xf3/0x170 [ 2143.032353] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.032969] ? __fget_files+0x2cf/0x520 [ 2143.033505] ? lock_downgrade+0x6d0/0x6d0 [ 2143.034064] ? find_held_lock+0x2c/0x110 [ 2143.034648] ? __fget_files+0x2f8/0x520 [ 2143.035201] ? __fget_light+0xea/0x290 [ 2143.035736] __sys_sendmsg+0xe5/0x1b0 [ 2143.036250] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.036831] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.037473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.038180] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.038888] ? trace_hardirqs_on+0x5b/0x180 [ 2143.039468] do_syscall_64+0x33/0x40 [ 2143.039975] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.040662] RIP: 0033:0x7f6082bd7b19 [ 2143.041172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.043629] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.044649] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2143.045600] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2143.046576] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.047547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.048498] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 09:47:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 31) 09:47:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x1c00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:47:34 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x4b47, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:34 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfd', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:34 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 33) 09:47:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 32) 09:47:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 34) 09:47:34 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x4b49, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2143.272774] FAULT_INJECTION: forcing a failure. [ 2143.272774] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.274377] FAULT_INJECTION: forcing a failure. [ 2143.274377] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.276218] CPU: 1 PID: 10198 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2143.276226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.276230] Call Trace: [ 2143.276258] dump_stack+0x107/0x167 [ 2143.281629] should_fail.cold+0x5/0xa [ 2143.282099] ? trace_hardirqs_on+0x5b/0x180 [ 2143.282911] ? __alloc_skb+0x6d/0x5b0 [ 2143.284050] should_failslab+0x5/0x20 [ 2143.285200] kmem_cache_alloc_node+0x55/0x330 [ 2143.286527] __alloc_skb+0x6d/0x5b0 [ 2143.287639] skb_segment+0x9d8/0x3aa0 [ 2143.288789] ? __lock_acquire+0xbb1/0x5b00 [ 2143.289899] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.291192] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.292583] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.293640] __udp_gso_segment+0x11c6/0x1830 [ 2143.294779] ? __sk_receive_skb+0x830/0x830 [ 2143.295882] udp4_ufo_fragment+0x528/0x720 [ 2143.296899] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.298148] inet_gso_segment+0x4fb/0x11a0 [ 2143.299439] skb_mac_gso_segment+0x273/0x570 [ 2143.300714] ? inet_sock_destruct+0x840/0x840 [ 2143.301307] ? skb_network_protocol+0x650/0x650 [ 2143.301856] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.302379] ? lock_acquire+0x197/0x470 [ 2143.302872] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.303390] __skb_gso_segment+0x32d/0x6d0 [ 2143.303889] ? mark_lock+0xf5/0x2df0 [ 2143.304327] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.304954] ? lock_chain_count+0x20/0x20 [ 2143.305461] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.306048] __dev_queue_xmit+0x825/0x2690 [ 2143.306598] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.307262] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.307856] ? mark_held_locks+0x9e/0xe0 [ 2143.308340] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.308972] neigh_connected_output+0x382/0x4d0 [ 2143.309534] ip_finish_output2+0x6f1/0x21f0 [ 2143.310057] ? nf_hook_slow+0xfc/0x1e0 [ 2143.310549] ? ip_frag_next+0x9e0/0x9e0 [ 2143.311033] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.311627] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.312209] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.312791] ? netif_rx_ni+0xe7/0x300 [ 2143.313238] ip_mc_output+0x401/0xa30 [ 2143.313694] ip_send_skb+0xdd/0x260 [ 2143.314132] udp_send_skb+0x6da/0x11d0 [ 2143.314637] udp_sendmsg+0x139a/0x2160 [ 2143.315104] ? mark_lock+0xf5/0x2df0 [ 2143.315542] ? ip_frag_init+0x350/0x350 [ 2143.316038] ? lock_chain_count+0x20/0x20 [ 2143.316528] ? udp_setsockopt+0xc0/0xc0 [ 2143.316997] ? mark_lock+0xf5/0x2df0 [ 2143.317430] ? lock_acquire+0x197/0x470 [ 2143.317942] ? lock_chain_count+0x20/0x20 [ 2143.318505] ? mark_lock+0xf5/0x2df0 [ 2143.318964] ? mark_lock+0xf5/0x2df0 [ 2143.319398] ? lock_chain_count+0x20/0x20 [ 2143.319885] ? __lock_acquire+0xbb1/0x5b00 [ 2143.320376] ? lock_chain_count+0x20/0x20 [ 2143.320884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.321492] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.321980] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.322464] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.323100] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.323586] ? mark_lock+0xf5/0x2df0 [ 2143.324056] ? lock_acquire+0x197/0x470 [ 2143.324556] ? find_held_lock+0x2c/0x110 [ 2143.325098] ? __might_fault+0xd3/0x180 [ 2143.325588] ? lock_downgrade+0x6d0/0x6d0 [ 2143.326132] ? lock_downgrade+0x6d0/0x6d0 [ 2143.326719] ? sock_has_perm+0x1ea/0x280 [ 2143.327209] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.327868] ? _copy_from_user+0xfb/0x1b0 [ 2143.328405] ? __import_iovec+0x458/0x590 [ 2143.328925] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.329586] inet6_sendmsg+0x105/0x140 [ 2143.330053] ? inet6_compat_ioctl+0x320/0x320 [ 2143.330636] __sock_sendmsg+0xf2/0x190 [ 2143.331135] ____sys_sendmsg+0x70d/0x870 [ 2143.331669] ? sock_write_iter+0x3d0/0x3d0 [ 2143.332206] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.332685] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.333181] ? lock_downgrade+0x6d0/0x6d0 [ 2143.333679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.334299] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.334829] ___sys_sendmsg+0xf3/0x170 [ 2143.335324] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.335875] ? __fget_files+0x2cf/0x520 [ 2143.336349] ? lock_downgrade+0x6d0/0x6d0 [ 2143.336862] ? find_held_lock+0x2c/0x110 [ 2143.337361] ? __fget_files+0x2f8/0x520 [ 2143.337868] ? __fget_light+0xea/0x290 [ 2143.338347] __sys_sendmsg+0xe5/0x1b0 [ 2143.338861] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.339392] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.339968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.340587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.341189] ? trace_hardirqs_on+0x5b/0x180 [ 2143.341710] do_syscall_64+0x33/0x40 [ 2143.342151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.342791] RIP: 0033:0x7f3f9ec55b19 [ 2143.343229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.345435] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.346354] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2143.347274] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2143.348170] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.349049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.349924] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2143.350902] CPU: 0 PID: 10195 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2143.351903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.353011] Call Trace: [ 2143.353417] dump_stack+0x107/0x167 [ 2143.353953] should_fail.cold+0x5/0xa [ 2143.354469] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2143.355369] ? create_object.isra.0+0x3a/0xa20 [ 2143.355990] should_failslab+0x5/0x20 [ 2143.356503] kmem_cache_alloc+0x5b/0x310 [ 2143.357063] create_object.isra.0+0x3a/0xa20 [ 2143.357655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.358337] kmem_cache_alloc_node+0x169/0x330 [ 2143.358993] __alloc_skb+0x6d/0x5b0 [ 2143.359484] skb_segment+0x9d8/0x3aa0 [ 2143.359995] ? __lock_acquire+0xbb1/0x5b00 [ 2143.360597] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.361266] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.361970] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.362541] __udp_gso_segment+0x11c6/0x1830 [ 2143.363138] ? __sk_receive_skb+0x830/0x830 [ 2143.363730] udp4_ufo_fragment+0x528/0x720 [ 2143.364303] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.364970] inet_gso_segment+0x4fb/0x11a0 [ 2143.365553] skb_mac_gso_segment+0x273/0x570 [ 2143.366141] ? inet_sock_destruct+0x840/0x840 [ 2143.366773] ? skb_network_protocol+0x650/0x650 [ 2143.367394] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.367993] ? lock_acquire+0x197/0x470 [ 2143.368522] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.369101] __skb_gso_segment+0x32d/0x6d0 [ 2143.369657] ? mark_lock+0xf5/0x2df0 09:47:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x2000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2143.370171] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.370911] ? lock_chain_count+0x20/0x20 [ 2143.371470] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.372400] __dev_queue_xmit+0x825/0x2690 [ 2143.372980] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.373673] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.374298] ? mark_held_locks+0x9e/0xe0 [ 2143.374880] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.375601] neigh_connected_output+0x382/0x4d0 [ 2143.376239] ip_finish_output2+0x6f1/0x21f0 [ 2143.376826] ? nf_hook_slow+0xfc/0x1e0 [ 2143.377349] ? ip_frag_next+0x9e0/0x9e0 [ 2143.377887] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.378587] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.379258] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.379922] ? netif_rx_ni+0xe7/0x300 [ 2143.380439] ip_mc_output+0x401/0xa30 [ 2143.380959] ip_send_skb+0xdd/0x260 [ 2143.381457] udp_send_skb+0x6da/0x11d0 [ 2143.381992] udp_sendmsg+0x139a/0x2160 [ 2143.382530] ? mark_lock+0xf5/0x2df0 [ 2143.383047] ? ip_frag_init+0x350/0x350 [ 2143.383590] ? lock_chain_count+0x20/0x20 [ 2143.384158] ? udp_setsockopt+0xc0/0xc0 [ 2143.384697] ? mark_lock+0xf5/0x2df0 [ 2143.385202] ? lock_acquire+0x197/0x470 [ 2143.385756] ? lock_chain_count+0x20/0x20 [ 2143.386318] ? mark_lock+0xf5/0x2df0 [ 2143.386868] ? mark_lock+0xf5/0x2df0 [ 2143.387373] ? lock_chain_count+0x20/0x20 [ 2143.387937] ? __lock_acquire+0xbb1/0x5b00 [ 2143.388513] ? lock_chain_count+0x20/0x20 [ 2143.389092] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.389810] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.390372] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.390981] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.391679] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.392240] ? mark_lock+0xf5/0x2df0 [ 2143.392750] ? lock_acquire+0x197/0x470 [ 2143.393290] ? find_held_lock+0x2c/0x110 [ 2143.393843] ? __might_fault+0xd3/0x180 [ 2143.394383] ? lock_downgrade+0x6d0/0x6d0 [ 2143.394967] ? lock_downgrade+0x6d0/0x6d0 [ 2143.395534] ? sock_has_perm+0x1ea/0x280 [ 2143.396077] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.396776] ? _copy_from_user+0xfb/0x1b0 [ 2143.397341] ? __import_iovec+0x458/0x590 [ 2143.397905] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.398636] inet6_sendmsg+0x105/0x140 [ 2143.399169] ? inet6_compat_ioctl+0x320/0x320 [ 2143.399778] __sock_sendmsg+0xf2/0x190 [ 2143.400306] ____sys_sendmsg+0x70d/0x870 [ 2143.400868] ? sock_write_iter+0x3d0/0x3d0 [ 2143.401438] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.401964] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.402517] ? lock_downgrade+0x6d0/0x6d0 [ 2143.403089] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.403793] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.404355] ___sys_sendmsg+0xf3/0x170 [ 2143.404896] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.405532] ? __fget_files+0x2cf/0x520 [ 2143.406082] ? lock_downgrade+0x6d0/0x6d0 [ 2143.406686] ? find_held_lock+0x2c/0x110 [ 2143.407247] ? __fget_files+0x2f8/0x520 [ 2143.407803] ? __fget_light+0xea/0x290 [ 2143.408340] __sys_sendmsg+0xe5/0x1b0 [ 2143.408856] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.409439] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.410086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.410829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.411538] ? trace_hardirqs_on+0x5b/0x180 [ 2143.412129] do_syscall_64+0x33/0x40 [ 2143.412645] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.413336] RIP: 0033:0x7f251a6f7b19 [ 2143.413847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.416293] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.417317] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2143.418267] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2143.419249] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.420207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.421167] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2143.460487] FAULT_INJECTION: forcing a failure. [ 2143.460487] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.462243] CPU: 0 PID: 10197 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2143.463334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.464456] Call Trace: [ 2143.464826] dump_stack+0x107/0x167 [ 2143.465324] should_fail.cold+0x5/0xa [ 2143.465850] ? create_object.isra.0+0x3a/0xa20 [ 2143.466475] should_failslab+0x5/0x20 [ 2143.467021] kmem_cache_alloc+0x5b/0x310 [ 2143.467583] create_object.isra.0+0x3a/0xa20 [ 2143.468183] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.468880] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2143.469572] ? skb_segment+0x9d8/0x3aa0 [ 2143.470122] __alloc_skb+0xb1/0x5b0 [ 2143.470646] skb_segment+0x9d8/0x3aa0 [ 2143.471171] ? __lock_acquire+0xbb1/0x5b00 [ 2143.471781] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.472461] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.473173] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.473734] __udp_gso_segment+0x11c6/0x1830 [ 2143.474339] ? __sk_receive_skb+0x830/0x830 [ 2143.474970] udp4_ufo_fragment+0x528/0x720 [ 2143.475554] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.476208] inet_gso_segment+0x4fb/0x11a0 [ 2143.476791] skb_mac_gso_segment+0x273/0x570 [ 2143.477392] ? inet_sock_destruct+0x840/0x840 [ 2143.478001] ? skb_network_protocol+0x650/0x650 [ 2143.478644] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.479258] ? lock_acquire+0x197/0x470 [ 2143.479800] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.480403] __skb_gso_segment+0x32d/0x6d0 [ 2143.480980] ? mark_lock+0xf5/0x2df0 [ 2143.481495] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.482204] ? lock_chain_count+0x20/0x20 [ 2143.482795] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.483423] __dev_queue_xmit+0x825/0x2690 [ 2143.484005] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.484702] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.485335] ? mark_held_locks+0x9e/0xe0 [ 2143.485896] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.486642] neigh_connected_output+0x382/0x4d0 [ 2143.487295] ip_finish_output2+0x6f1/0x21f0 [ 2143.487881] ? nf_hook_slow+0xfc/0x1e0 [ 2143.488417] ? ip_frag_next+0x9e0/0x9e0 [ 2143.488958] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.489644] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.490314] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.491004] ? netif_rx_ni+0xe7/0x300 [ 2143.491533] ip_mc_output+0x401/0xa30 [ 2143.492064] ip_send_skb+0xdd/0x260 [ 2143.492570] udp_send_skb+0x6da/0x11d0 [ 2143.493116] udp_sendmsg+0x139a/0x2160 [ 2143.493641] ? mark_lock+0xf5/0x2df0 [ 2143.494154] ? ip_frag_init+0x350/0x350 [ 2143.494713] ? lock_chain_count+0x20/0x20 [ 2143.495289] ? udp_setsockopt+0xc0/0xc0 [ 2143.495827] ? mark_lock+0xf5/0x2df0 [ 2143.496334] ? lock_acquire+0x197/0x470 [ 2143.496879] ? lock_chain_count+0x20/0x20 [ 2143.497442] ? mark_lock+0xf5/0x2df0 [ 2143.497959] ? mark_lock+0xf5/0x2df0 [ 2143.498468] ? lock_chain_count+0x20/0x20 [ 2143.499068] ? __lock_acquire+0xbb1/0x5b00 [ 2143.499647] ? lock_chain_count+0x20/0x20 [ 2143.500228] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.500947] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.501514] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.502090] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.502835] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.503505] ? mark_lock+0xf5/0x2df0 [ 2143.504015] ? lock_acquire+0x197/0x470 [ 2143.504563] ? find_held_lock+0x2c/0x110 [ 2143.505133] ? __might_fault+0xd3/0x180 [ 2143.505677] ? lock_downgrade+0x6d0/0x6d0 [ 2143.506246] ? lock_downgrade+0x6d0/0x6d0 [ 2143.506838] ? sock_has_perm+0x1ea/0x280 [ 2143.507402] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.508118] ? _copy_from_user+0xfb/0x1b0 [ 2143.508700] ? __import_iovec+0x458/0x590 [ 2143.509259] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.509964] inet6_sendmsg+0x105/0x140 [ 2143.510521] ? inet6_compat_ioctl+0x320/0x320 [ 2143.511139] __sock_sendmsg+0xf2/0x190 [ 2143.511671] ____sys_sendmsg+0x70d/0x870 [ 2143.512228] ? sock_write_iter+0x3d0/0x3d0 [ 2143.512803] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.513340] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.513892] ? lock_downgrade+0x6d0/0x6d0 09:47:34 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x541b, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2143.514460] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.515197] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.515760] ___sys_sendmsg+0xf3/0x170 [ 2143.516300] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.517237] ? __fget_files+0x2cf/0x520 [ 2143.517780] ? lock_downgrade+0x6d0/0x6d0 [ 2143.518350] ? find_held_lock+0x2c/0x110 [ 2143.518934] ? __fget_files+0x2f8/0x520 [ 2143.519485] ? __fget_light+0xea/0x290 [ 2143.520018] __sys_sendmsg+0xe5/0x1b0 [ 2143.520539] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.521129] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.521779] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.522502] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.523211] ? trace_hardirqs_on+0x5b/0x180 [ 2143.523810] do_syscall_64+0x33/0x40 [ 2143.524322] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.525025] RIP: 0033:0x7f6082bd7b19 [ 2143.525534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.528044] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.529073] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2143.530034] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2143.531035] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.532137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.533106] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 09:47:34 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 34) 09:47:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 35) 09:47:34 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:47:34 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2143.674221] FAULT_INJECTION: forcing a failure. [ 2143.674221] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.675840] CPU: 0 PID: 10210 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2143.676776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.677896] Call Trace: [ 2143.678270] dump_stack+0x107/0x167 [ 2143.678792] should_fail.cold+0x5/0xa [ 2143.679324] should_failslab+0x5/0x20 [ 2143.679849] __kmalloc_node_track_caller+0x74/0x3b0 [ 2143.680528] ? skb_segment+0x9d8/0x3aa0 [ 2143.681076] __alloc_skb+0xb1/0x5b0 [ 2143.681578] skb_segment+0x9d8/0x3aa0 [ 2143.682103] ? __lock_acquire+0xbb1/0x5b00 [ 2143.682748] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.683434] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.684143] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.684707] __udp_gso_segment+0x11c6/0x1830 [ 2143.685303] ? __sk_receive_skb+0x830/0x830 [ 2143.685902] udp4_ufo_fragment+0x528/0x720 [ 2143.686490] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.687189] inet_gso_segment+0x4fb/0x11a0 [ 2143.687791] skb_mac_gso_segment+0x273/0x570 [ 2143.688390] ? inet_sock_destruct+0x840/0x840 [ 2143.689005] ? skb_network_protocol+0x650/0x650 [ 2143.689649] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.690263] ? lock_acquire+0x197/0x470 [ 2143.690823] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.691425] __skb_gso_segment+0x32d/0x6d0 [ 2143.692004] ? mark_lock+0xf5/0x2df0 [ 2143.692530] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.693246] ? lock_chain_count+0x20/0x20 [ 2143.693806] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.694428] __dev_queue_xmit+0x825/0x2690 [ 2143.695038] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.695744] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.696377] ? mark_held_locks+0x9e/0xe0 [ 2143.696940] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.697655] neigh_connected_output+0x382/0x4d0 [ 2143.698303] ip_finish_output2+0x6f1/0x21f0 [ 2143.698908] ? nf_hook_slow+0xfc/0x1e0 [ 2143.699437] ? ip_frag_next+0x9e0/0x9e0 [ 2143.699981] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.700668] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.701343] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.702010] ? netif_rx_ni+0xe7/0x300 [ 2143.702546] ip_mc_output+0x401/0xa30 [ 2143.703073] ip_send_skb+0xdd/0x260 [ 2143.703581] udp_send_skb+0x6da/0x11d0 [ 2143.704125] udp_sendmsg+0x139a/0x2160 [ 2143.704671] ? mark_lock+0xf5/0x2df0 [ 2143.705185] ? ip_frag_init+0x350/0x350 [ 2143.705732] ? lock_chain_count+0x20/0x20 [ 2143.706300] ? udp_setsockopt+0xc0/0xc0 [ 2143.706850] ? mark_lock+0xf5/0x2df0 [ 2143.707354] ? lock_acquire+0x197/0x470 [ 2143.707898] ? lock_chain_count+0x20/0x20 [ 2143.708455] ? mark_lock+0xf5/0x2df0 [ 2143.708960] ? mark_lock+0xf5/0x2df0 [ 2143.709465] ? lock_chain_count+0x20/0x20 [ 2143.710026] ? __lock_acquire+0xbb1/0x5b00 [ 2143.710626] ? lock_chain_count+0x20/0x20 [ 2143.711204] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.711905] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.712468] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.713041] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.713737] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.714296] ? mark_lock+0xf5/0x2df0 [ 2143.714830] ? lock_acquire+0x197/0x470 [ 2143.715365] ? find_held_lock+0x2c/0x110 [ 2143.715923] ? __might_fault+0xd3/0x180 [ 2143.716461] ? lock_downgrade+0x6d0/0x6d0 [ 2143.717026] ? lock_downgrade+0x6d0/0x6d0 [ 2143.717592] ? sock_has_perm+0x1ea/0x280 [ 2143.718141] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.718865] ? _copy_from_user+0xfb/0x1b0 [ 2143.719442] ? __import_iovec+0x458/0x590 [ 2143.720008] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.720717] inet6_sendmsg+0x105/0x140 [ 2143.721247] ? inet6_compat_ioctl+0x320/0x320 [ 2143.721855] __sock_sendmsg+0xf2/0x190 [ 2143.722384] ____sys_sendmsg+0x70d/0x870 [ 2143.722958] ? sock_write_iter+0x3d0/0x3d0 [ 2143.723536] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.724073] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.724622] ? lock_downgrade+0x6d0/0x6d0 [ 2143.725187] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.725894] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.726452] ___sys_sendmsg+0xf3/0x170 [ 2143.727006] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.727633] ? __fget_files+0x2cf/0x520 [ 2143.728170] ? lock_downgrade+0x6d0/0x6d0 [ 2143.728742] ? find_held_lock+0x2c/0x110 [ 2143.729302] ? __fget_files+0x2f8/0x520 [ 2143.729852] ? __fget_light+0xea/0x290 [ 2143.730391] __sys_sendmsg+0xe5/0x1b0 [ 2143.730926] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.731510] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.732153] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.732857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.733554] ? trace_hardirqs_on+0x5b/0x180 [ 2143.734138] do_syscall_64+0x33/0x40 [ 2143.734670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.735360] RIP: 0033:0x7f251a6f7b19 [ 2143.735872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.738300] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.739341] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2143.740302] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2143.741265] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.742225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.743211] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2143.774186] FAULT_INJECTION: forcing a failure. [ 2143.774186] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.775601] CPU: 1 PID: 10212 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2143.776441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.777431] Call Trace: [ 2143.777756] dump_stack+0x107/0x167 [ 2143.778198] should_fail.cold+0x5/0xa [ 2143.778691] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2143.779309] ? create_object.isra.0+0x3a/0xa20 [ 2143.779862] should_failslab+0x5/0x20 [ 2143.780333] kmem_cache_alloc+0x5b/0x310 [ 2143.780844] ? mark_held_locks+0x9e/0xe0 [ 2143.781368] create_object.isra.0+0x3a/0xa20 [ 2143.781920] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.782585] kmem_cache_alloc_node+0x169/0x330 [ 2143.783167] __alloc_skb+0x6d/0x5b0 [ 2143.783634] skb_segment+0x9d8/0x3aa0 [ 2143.784118] ? __lock_acquire+0xbb1/0x5b00 [ 2143.784688] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.785319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.785977] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.786511] __udp_gso_segment+0x11c6/0x1830 [ 2143.787077] ? __sk_receive_skb+0x830/0x830 [ 2143.787639] udp4_ufo_fragment+0x528/0x720 [ 2143.788188] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.788831] inet_gso_segment+0x4fb/0x11a0 [ 2143.789381] skb_mac_gso_segment+0x273/0x570 [ 2143.789940] ? inet_sock_destruct+0x840/0x840 [ 2143.790519] ? skb_network_protocol+0x650/0x650 [ 2143.791102] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.791668] ? lock_acquire+0x197/0x470 [ 2143.792166] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.792727] __skb_gso_segment+0x32d/0x6d0 [ 2143.793261] ? mark_lock+0xf5/0x2df0 [ 2143.793735] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.794392] ? lock_chain_count+0x20/0x20 [ 2143.794921] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.795476] __dev_queue_xmit+0x825/0x2690 [ 2143.795980] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.796585] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.797128] ? mark_held_locks+0x9e/0xe0 [ 2143.797610] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.798233] neigh_connected_output+0x382/0x4d0 [ 2143.798841] ip_finish_output2+0x6f1/0x21f0 [ 2143.799388] ? nf_hook_slow+0xfc/0x1e0 [ 2143.799880] ? ip_frag_next+0x9e0/0x9e0 [ 2143.800381] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.801019] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.801638] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.802255] ? netif_rx_ni+0xe7/0x300 [ 2143.802812] ip_mc_output+0x401/0xa30 [ 2143.803330] ip_send_skb+0xdd/0x260 [ 2143.803796] udp_send_skb+0x6da/0x11d0 [ 2143.804299] udp_sendmsg+0x139a/0x2160 [ 2143.804895] ? mark_lock+0xf5/0x2df0 [ 2143.805370] ? ip_frag_init+0x350/0x350 [ 2143.805873] ? lock_chain_count+0x20/0x20 [ 2143.806402] ? udp_setsockopt+0xc0/0xc0 [ 2143.806917] ? mark_lock+0xf5/0x2df0 [ 2143.807392] ? lock_acquire+0x197/0x470 [ 2143.807916] ? lock_chain_count+0x20/0x20 [ 2143.808441] ? mark_lock+0xf5/0x2df0 [ 2143.808920] ? mark_lock+0xf5/0x2df0 [ 2143.809400] ? lock_chain_count+0x20/0x20 [ 2143.809923] ? __lock_acquire+0xbb1/0x5b00 [ 2143.810464] ? lock_chain_count+0x20/0x20 [ 2143.811025] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.811693] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.812217] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2143.812750] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.813403] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.813949] ? mark_lock+0xf5/0x2df0 [ 2143.814426] ? lock_acquire+0x197/0x470 [ 2143.814929] ? find_held_lock+0x2c/0x110 [ 2143.815421] ? __might_fault+0xd3/0x180 [ 2143.815897] ? lock_downgrade+0x6d0/0x6d0 [ 2143.816392] ? lock_downgrade+0x6d0/0x6d0 [ 2143.816893] ? sock_has_perm+0x1ea/0x280 [ 2143.817378] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2143.817994] ? _copy_from_user+0xfb/0x1b0 [ 2143.818509] ? __import_iovec+0x458/0x590 [ 2143.819043] ? udp_v6_push_pending_frames+0x360/0x360 [ 2143.819702] inet6_sendmsg+0x105/0x140 [ 2143.820199] ? inet6_compat_ioctl+0x320/0x320 [ 2143.820768] __sock_sendmsg+0xf2/0x190 [ 2143.821260] ____sys_sendmsg+0x70d/0x870 [ 2143.821784] ? sock_write_iter+0x3d0/0x3d0 [ 2143.822313] ? do_recvmmsg+0x6d0/0x6d0 [ 2143.822823] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.823332] ? lock_downgrade+0x6d0/0x6d0 [ 2143.823863] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.824519] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.825038] ___sys_sendmsg+0xf3/0x170 [ 2143.825531] ? sendmsg_copy_msghdr+0x160/0x160 [ 2143.826111] ? __fget_files+0x2cf/0x520 [ 2143.826628] ? lock_downgrade+0x6d0/0x6d0 [ 2143.827153] ? find_held_lock+0x2c/0x110 [ 2143.827678] ? __fget_files+0x2f8/0x520 [ 2143.828189] ? __fget_light+0xea/0x290 [ 2143.828690] __sys_sendmsg+0xe5/0x1b0 [ 2143.829178] ? __sys_sendmsg_sock+0x40/0x40 [ 2143.829703] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.830304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2143.830989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2143.831643] ? trace_hardirqs_on+0x5b/0x180 [ 2143.832195] do_syscall_64+0x33/0x40 [ 2143.832668] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2143.833302] RIP: 0033:0x7f3f9ec55b19 [ 2143.833763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.835988] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2143.836905] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2143.837769] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2143.838673] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.839590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.840511] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:47:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 36) 09:47:35 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfd', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:35 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2143.968778] FAULT_INJECTION: forcing a failure. [ 2143.968778] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.970255] CPU: 1 PID: 10224 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2143.971154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.972193] Call Trace: [ 2143.972534] dump_stack+0x107/0x167 [ 2143.973002] should_fail.cold+0x5/0xa [ 2143.973491] ? create_object.isra.0+0x3a/0xa20 [ 2143.974073] should_failslab+0x5/0x20 [ 2143.974574] kmem_cache_alloc+0x5b/0x310 [ 2143.975104] create_object.isra.0+0x3a/0xa20 [ 2143.975661] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.976308] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2143.976951] ? skb_segment+0x9d8/0x3aa0 [ 2143.977469] __alloc_skb+0xb1/0x5b0 [ 2143.977942] skb_segment+0x9d8/0x3aa0 [ 2143.978428] ? __lock_acquire+0xbb1/0x5b00 [ 2143.979030] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2143.979661] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2143.980313] ? SOFTIRQ_verbose+0x10/0x10 [ 2143.980854] __udp_gso_segment+0x11c6/0x1830 [ 2143.981427] ? __sk_receive_skb+0x830/0x830 [ 2143.982004] udp4_ufo_fragment+0x528/0x720 [ 2143.982590] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2143.983225] inet_gso_segment+0x4fb/0x11a0 [ 2143.983775] skb_mac_gso_segment+0x273/0x570 [ 2143.984449] ? inet_sock_destruct+0x840/0x840 [ 2143.985021] ? skb_network_protocol+0x650/0x650 [ 2143.985607] ? skb_crc32c_csum_help+0x80/0x80 [ 2143.986305] ? lock_acquire+0x197/0x470 [ 2143.986837] ? __dev_queue_xmit+0x1c6/0x2690 [ 2143.987400] __skb_gso_segment+0x32d/0x6d0 [ 2143.987946] ? mark_lock+0xf5/0x2df0 [ 2143.988429] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2143.989097] ? lock_chain_count+0x20/0x20 [ 2143.989627] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2143.990196] __dev_queue_xmit+0x825/0x2690 [ 2143.990763] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2143.991377] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2143.991925] ? mark_held_locks+0x9e/0xe0 [ 2143.992406] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2143.993025] neigh_connected_output+0x382/0x4d0 [ 2143.993592] ip_finish_output2+0x6f1/0x21f0 [ 2143.994199] ? nf_hook_slow+0xfc/0x1e0 [ 2143.994741] ? ip_frag_next+0x9e0/0x9e0 [ 2143.995247] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2143.995914] __ip_finish_output.part.0+0x5f3/0xb50 [ 2143.996608] ? ip_fragment.constprop.0+0x240/0x240 [ 2143.997242] ? netif_rx_ni+0xe7/0x300 [ 2143.997735] ip_mc_output+0x401/0xa30 [ 2143.998233] ip_send_skb+0xdd/0x260 [ 2143.998729] udp_send_skb+0x6da/0x11d0 [ 2143.999247] udp_sendmsg+0x139a/0x2160 [ 2143.999762] ? mark_lock+0xf5/0x2df0 [ 2144.000259] ? ip_frag_init+0x350/0x350 [ 2144.000776] ? lock_chain_count+0x20/0x20 [ 2144.001342] ? udp_setsockopt+0xc0/0xc0 [ 2144.001845] ? mark_lock+0xf5/0x2df0 [ 2144.002309] ? lock_acquire+0x197/0x470 [ 2144.002850] ? lock_chain_count+0x20/0x20 [ 2144.003384] ? mark_lock+0xf5/0x2df0 [ 2144.003879] ? mark_lock+0xf5/0x2df0 [ 2144.004362] ? lock_chain_count+0x20/0x20 [ 2144.004918] ? __lock_acquire+0xbb1/0x5b00 [ 2144.005461] ? lock_chain_count+0x20/0x20 [ 2144.005994] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2144.006648] ? SOFTIRQ_verbose+0x10/0x10 [ 2144.007168] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2144.007680] ? udp_v6_push_pending_frames+0x360/0x360 [ 2144.008325] ? SOFTIRQ_verbose+0x10/0x10 [ 2144.008847] ? mark_lock+0xf5/0x2df0 [ 2144.009328] ? lock_acquire+0x197/0x470 [ 2144.009832] ? find_held_lock+0x2c/0x110 [ 2144.010359] ? __might_fault+0xd3/0x180 [ 2144.010883] ? lock_downgrade+0x6d0/0x6d0 [ 2144.011413] ? lock_downgrade+0x6d0/0x6d0 [ 2144.011943] ? sock_has_perm+0x1ea/0x280 [ 2144.012458] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2144.013124] ? _copy_from_user+0xfb/0x1b0 [ 2144.013681] ? __import_iovec+0x458/0x590 [ 2144.014216] ? udp_v6_push_pending_frames+0x360/0x360 [ 2144.014904] inet6_sendmsg+0x105/0x140 [ 2144.015383] ? inet6_compat_ioctl+0x320/0x320 [ 2144.015925] __sock_sendmsg+0xf2/0x190 [ 2144.016406] ____sys_sendmsg+0x70d/0x870 [ 2144.016896] ? sock_write_iter+0x3d0/0x3d0 [ 2144.017413] ? do_recvmmsg+0x6d0/0x6d0 [ 2144.017910] ? SOFTIRQ_verbose+0x10/0x10 [ 2144.018420] ? lock_downgrade+0x6d0/0x6d0 [ 2144.018950] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2144.019572] ? SOFTIRQ_verbose+0x10/0x10 [ 2144.020064] ___sys_sendmsg+0xf3/0x170 [ 2144.020516] ? sendmsg_copy_msghdr+0x160/0x160 [ 2144.021058] ? __fget_files+0x2cf/0x520 [ 2144.021538] ? lock_downgrade+0x6d0/0x6d0 [ 2144.022033] ? find_held_lock+0x2c/0x110 [ 2144.022535] ? __fget_files+0x2f8/0x520 [ 2144.023025] ? __fget_light+0xea/0x290 [ 2144.023496] __sys_sendmsg+0xe5/0x1b0 [ 2144.023954] ? __sys_sendmsg_sock+0x40/0x40 [ 2144.024469] ? rcu_read_lock_any_held+0x75/0xa0 [ 2144.025028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2144.025646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2144.026250] ? trace_hardirqs_on+0x5b/0x180 [ 2144.026792] do_syscall_64+0x33/0x40 [ 2144.027232] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2144.027824] RIP: 0033:0x7f251a6f7b19 [ 2144.028253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2144.030518] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2144.031465] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2144.032392] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2144.033317] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2144.034235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2144.035192] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:47:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 33) 09:47:51 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x3e00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:47:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfd', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:47:51 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2160.007377] FAULT_INJECTION: forcing a failure. [ 2160.007377] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.008863] CPU: 0 PID: 10243 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2160.009758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2160.010823] Call Trace: [ 2160.011188] dump_stack+0x107/0x167 [ 2160.011669] should_fail.cold+0x5/0xa [ 2160.012182] ? create_object.isra.0+0x3a/0xa20 [ 2160.012801] should_failslab+0x5/0x20 [ 2160.013323] kmem_cache_alloc+0x5b/0x310 [ 2160.013892] create_object.isra.0+0x3a/0xa20 [ 2160.014499] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2160.015186] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2160.015891] ? skb_segment+0x9d8/0x3aa0 [ 2160.016447] __alloc_skb+0xb1/0x5b0 [ 2160.016950] skb_segment+0x9d8/0x3aa0 [ 2160.017479] ? __lock_acquire+0xbb1/0x5b00 [ 2160.018096] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2160.018775] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.019519] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.020092] __udp_gso_segment+0x11c6/0x1830 [ 2160.020657] ? __sk_receive_skb+0x830/0x830 [ 2160.021229] udp4_ufo_fragment+0x528/0x720 [ 2160.021811] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2160.022446] inet_gso_segment+0x4fb/0x11a0 [ 2160.022994] skb_mac_gso_segment+0x273/0x570 [ 2160.023600] ? inet_sock_destruct+0x840/0x840 [ 2160.024207] ? skb_network_protocol+0x650/0x650 [ 2160.024866] ? skb_crc32c_csum_help+0x80/0x80 [ 2160.025511] ? lock_acquire+0x197/0x470 [ 2160.026088] ? __dev_queue_xmit+0x1c6/0x2690 [ 2160.026700] __skb_gso_segment+0x32d/0x6d0 [ 2160.027257] ? mark_lock+0xf5/0x2df0 [ 2160.027794] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2160.028529] ? lock_chain_count+0x20/0x20 [ 2160.029089] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2160.029730] __dev_queue_xmit+0x825/0x2690 [ 2160.030326] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2160.031033] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2160.031666] ? mark_held_locks+0x9e/0xe0 [ 2160.032187] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2160.033011] neigh_connected_output+0x382/0x4d0 [ 2160.033684] ip_finish_output2+0x6f1/0x21f0 [ 2160.034282] ? nf_hook_slow+0xfc/0x1e0 [ 2160.035019] ? ip_frag_next+0x9e0/0x9e0 [ 2160.035635] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2160.036352] __ip_finish_output.part.0+0x5f3/0xb50 [ 2160.037043] ? ip_fragment.constprop.0+0x240/0x240 [ 2160.037719] ? netif_rx_ni+0xe7/0x300 [ 2160.038264] ip_mc_output+0x401/0xa30 [ 2160.038812] ip_send_skb+0xdd/0x260 [ 2160.039351] udp_send_skb+0x6da/0x11d0 [ 2160.039911] udp_sendmsg+0x139a/0x2160 [ 2160.040459] ? mark_lock+0xf5/0x2df0 [ 2160.040990] ? ip_frag_init+0x350/0x350 [ 2160.041533] ? lock_chain_count+0x20/0x20 [ 2160.042095] ? udp_setsockopt+0xc0/0xc0 [ 2160.042612] ? mark_lock+0xf5/0x2df0 [ 2160.043111] ? lock_acquire+0x197/0x470 [ 2160.043673] ? lock_chain_count+0x20/0x20 [ 2160.044247] ? mark_lock+0xf5/0x2df0 [ 2160.044773] ? mark_lock+0xf5/0x2df0 [ 2160.045290] ? lock_chain_count+0x20/0x20 [ 2160.045864] ? __lock_acquire+0xbb1/0x5b00 [ 2160.046449] ? lock_chain_count+0x20/0x20 [ 2160.047035] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.047796] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.048368] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2160.048947] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.049655] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.050219] ? mark_lock+0xf5/0x2df0 [ 2160.050743] ? lock_acquire+0x197/0x470 [ 2160.051299] ? find_held_lock+0x2c/0x110 [ 2160.051869] ? __might_fault+0xd3/0x180 [ 2160.052418] ? lock_downgrade+0x6d0/0x6d0 [ 2160.052995] ? lock_downgrade+0x6d0/0x6d0 [ 2160.053576] ? sock_has_perm+0x1ea/0x280 [ 2160.054137] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2160.054854] ? _copy_from_user+0xfb/0x1b0 [ 2160.055450] ? __import_iovec+0x458/0x590 [ 2160.056022] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.056737] inet6_sendmsg+0x105/0x140 [ 2160.057275] ? inet6_compat_ioctl+0x320/0x320 [ 2160.057891] __sock_sendmsg+0xf2/0x190 [ 2160.058433] ____sys_sendmsg+0x70d/0x870 [ 2160.058995] ? sock_write_iter+0x3d0/0x3d0 [ 2160.059594] ? do_recvmmsg+0x6d0/0x6d0 [ 2160.060135] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.060694] ? lock_downgrade+0x6d0/0x6d0 [ 2160.061270] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.061986] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.062556] ___sys_sendmsg+0xf3/0x170 [ 2160.063107] ? sendmsg_copy_msghdr+0x160/0x160 [ 2160.063751] ? __fget_files+0x2cf/0x520 [ 2160.064314] ? lock_downgrade+0x6d0/0x6d0 [ 2160.064908] ? find_held_lock+0x2c/0x110 [ 2160.065494] ? __fget_files+0x2f8/0x520 [ 2160.066065] ? __fget_light+0xea/0x290 [ 2160.066627] __sys_sendmsg+0xe5/0x1b0 [ 2160.068113] ? __sys_sendmsg_sock+0x40/0x40 [ 2160.069636] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.071156] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.071897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.072612] ? trace_hardirqs_on+0x5b/0x180 [ 2160.073220] do_syscall_64+0x33/0x40 [ 2160.073752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2160.074483] RIP: 0033:0x7f6082bd7b19 [ 2160.075014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.077528] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2160.078580] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2160.079512] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2160.080434] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.081382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.082330] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 09:47:51 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 35) 09:47:51 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:47:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 37) [ 2160.113121] FAULT_INJECTION: forcing a failure. [ 2160.113121] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.114779] CPU: 0 PID: 10253 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2160.115756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2160.116911] Call Trace: [ 2160.117289] dump_stack+0x107/0x167 [ 2160.117806] should_fail.cold+0x5/0xa [ 2160.118345] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2160.119099] ? create_object.isra.0+0x3a/0xa20 [ 2160.119750] should_failslab+0x5/0x20 [ 2160.120287] kmem_cache_alloc+0x5b/0x310 [ 2160.120860] ? mark_held_locks+0x9e/0xe0 [ 2160.121455] create_object.isra.0+0x3a/0xa20 [ 2160.122073] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2160.122790] kmem_cache_alloc_node+0x169/0x330 [ 2160.123454] __alloc_skb+0x6d/0x5b0 [ 2160.123978] skb_segment+0x9d8/0x3aa0 [ 2160.124517] ? __lock_acquire+0xbb1/0x5b00 [ 2160.125148] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2160.125859] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.126598] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.127188] __udp_gso_segment+0x11c6/0x1830 [ 2160.127800] ? __sk_receive_skb+0x830/0x830 [ 2160.128406] udp4_ufo_fragment+0x528/0x720 [ 2160.128995] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2160.129682] inet_gso_segment+0x4fb/0x11a0 [ 2160.130287] skb_mac_gso_segment+0x273/0x570 [ 2160.130904] ? inet_sock_destruct+0x840/0x840 [ 2160.131541] ? skb_network_protocol+0x650/0x650 [ 2160.132183] ? skb_crc32c_csum_help+0x80/0x80 [ 2160.132977] ? lock_acquire+0x197/0x470 [ 2160.133532] ? __dev_queue_xmit+0x1c6/0x2690 [ 2160.134152] __skb_gso_segment+0x32d/0x6d0 [ 2160.134741] ? mark_lock+0xf5/0x2df0 [ 2160.135301] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2160.136023] ? lock_chain_count+0x20/0x20 [ 2160.136593] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2160.137211] __dev_queue_xmit+0x825/0x2690 [ 2160.137811] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2160.138525] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2160.139190] ? mark_held_locks+0x9e/0xe0 [ 2160.139769] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2160.140510] neigh_connected_output+0x382/0x4d0 [ 2160.141181] ip_finish_output2+0x6f1/0x21f0 [ 2160.141789] ? nf_hook_slow+0xfc/0x1e0 [ 2160.142335] ? ip_frag_next+0x9e0/0x9e0 [ 2160.142888] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2160.143619] __ip_finish_output.part.0+0x5f3/0xb50 [ 2160.144302] ? ip_fragment.constprop.0+0x240/0x240 [ 2160.144988] ? netif_rx_ni+0xe7/0x300 [ 2160.145521] ip_mc_output+0x401/0xa30 [ 2160.146064] ip_send_skb+0xdd/0x260 [ 2160.146586] udp_send_skb+0x6da/0x11d0 [ 2160.147167] udp_sendmsg+0x139a/0x2160 [ 2160.147719] ? mark_lock+0xf5/0x2df0 [ 2160.148249] ? ip_frag_init+0x350/0x350 [ 2160.148818] ? lock_chain_count+0x20/0x20 [ 2160.149411] ? udp_setsockopt+0xc0/0xc0 [ 2160.149966] ? mark_lock+0xf5/0x2df0 [ 2160.150488] ? lock_acquire+0x197/0x470 [ 2160.151048] ? lock_chain_count+0x20/0x20 [ 2160.151649] ? mark_lock+0xf5/0x2df0 [ 2160.152171] ? mark_lock+0xf5/0x2df0 [ 2160.152699] ? lock_chain_count+0x20/0x20 [ 2160.153285] ? __lock_acquire+0xbb1/0x5b00 [ 2160.153887] ? lock_chain_count+0x20/0x20 [ 2160.154492] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.155257] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.155848] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2160.156444] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.157165] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.157744] ? mark_lock+0xf5/0x2df0 [ 2160.158277] ? lock_acquire+0x197/0x470 [ 2160.158836] ? find_held_lock+0x2c/0x110 [ 2160.159449] ? __might_fault+0xd3/0x180 [ 2160.160010] ? lock_downgrade+0x6d0/0x6d0 [ 2160.160604] ? lock_downgrade+0x6d0/0x6d0 [ 2160.161201] ? sock_has_perm+0x1ea/0x280 [ 2160.161780] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2160.162507] ? _copy_from_user+0xfb/0x1b0 [ 2160.163117] ? __import_iovec+0x458/0x590 [ 2160.163699] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.164429] inet6_sendmsg+0x105/0x140 [ 2160.164985] ? inet6_compat_ioctl+0x320/0x320 [ 2160.165611] __sock_sendmsg+0xf2/0x190 [ 2160.166166] ____sys_sendmsg+0x70d/0x870 [ 2160.166749] ? sock_write_iter+0x3d0/0x3d0 [ 2160.167363] ? do_recvmmsg+0x6d0/0x6d0 [ 2160.167919] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.168485] ? lock_downgrade+0x6d0/0x6d0 [ 2160.169067] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.169787] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.170360] ___sys_sendmsg+0xf3/0x170 [ 2160.170917] ? sendmsg_copy_msghdr+0x160/0x160 [ 2160.171576] ? __fget_files+0x2cf/0x520 [ 2160.172136] ? lock_downgrade+0x6d0/0x6d0 [ 2160.172708] ? find_held_lock+0x2c/0x110 [ 2160.173303] ? __fget_files+0x2f8/0x520 [ 2160.173898] ? __fget_light+0xea/0x290 [ 2160.174477] __sys_sendmsg+0xe5/0x1b0 [ 2160.175042] ? __sys_sendmsg_sock+0x40/0x40 [ 2160.175690] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.176361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.177105] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.177842] ? trace_hardirqs_on+0x5b/0x180 [ 2160.178454] do_syscall_64+0x33/0x40 [ 2160.178986] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2160.179809] RIP: 0033:0x7f3f9ec55b19 [ 2160.180395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.182927] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2160.184093] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2160.185083] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2160.186082] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.187069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.188076] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2160.214062] FAULT_INJECTION: forcing a failure. 09:47:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 34) [ 2160.214062] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.216075] CPU: 0 PID: 10252 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2160.217031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2160.218179] Call Trace: [ 2160.218559] dump_stack+0x107/0x167 [ 2160.219081] should_fail.cold+0x5/0xa [ 2160.219655] ? trace_hardirqs_on+0x5b/0x180 [ 2160.220268] ? __alloc_skb+0x6d/0x5b0 [ 2160.220825] should_failslab+0x5/0x20 [ 2160.221359] kmem_cache_alloc_node+0x55/0x330 [ 2160.221995] __alloc_skb+0x6d/0x5b0 [ 2160.222525] skb_segment+0x9d8/0x3aa0 [ 2160.223067] ? __lock_acquire+0xbb1/0x5b00 [ 2160.223713] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2160.224416] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.225156] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.225730] __udp_gso_segment+0x11c6/0x1830 [ 2160.226343] ? __sk_receive_skb+0x830/0x830 [ 2160.226966] udp4_ufo_fragment+0x528/0x720 [ 2160.227604] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2160.228306] inet_gso_segment+0x4fb/0x11a0 [ 2160.228923] skb_mac_gso_segment+0x273/0x570 [ 2160.229547] ? inet_sock_destruct+0x840/0x840 [ 2160.230169] ? skb_network_protocol+0x650/0x650 [ 2160.230814] ? skb_crc32c_csum_help+0x80/0x80 [ 2160.231469] ? lock_acquire+0x197/0x470 [ 2160.232030] ? __dev_queue_xmit+0x1c6/0x2690 [ 2160.232652] __skb_gso_segment+0x32d/0x6d0 [ 2160.233241] ? mark_lock+0xf5/0x2df0 [ 2160.233772] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2160.234508] ? lock_chain_count+0x20/0x20 [ 2160.235108] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2160.235750] __dev_queue_xmit+0x825/0x2690 [ 2160.236364] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2160.237096] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2160.237752] ? mark_held_locks+0x9e/0xe0 [ 2160.238329] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2160.239066] neigh_connected_output+0x382/0x4d0 [ 2160.239763] ip_finish_output2+0x6f1/0x21f0 [ 2160.240372] ? nf_hook_slow+0xfc/0x1e0 [ 2160.240915] ? ip_frag_next+0x9e0/0x9e0 [ 2160.241483] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2160.242194] __ip_finish_output.part.0+0x5f3/0xb50 [ 2160.242883] ? ip_fragment.constprop.0+0x240/0x240 [ 2160.243605] ? netif_rx_ni+0xe7/0x300 [ 2160.244148] ip_mc_output+0x401/0xa30 [ 2160.244689] ip_send_skb+0xdd/0x260 [ 2160.245213] udp_send_skb+0x6da/0x11d0 [ 2160.245775] udp_sendmsg+0x139a/0x2160 [ 2160.246322] ? mark_lock+0xf5/0x2df0 [ 2160.246852] ? ip_frag_init+0x350/0x350 [ 2160.247434] ? lock_chain_count+0x20/0x20 [ 2160.248019] ? udp_setsockopt+0xc0/0xc0 [ 2160.248578] ? mark_lock+0xf5/0x2df0 [ 2160.249103] ? lock_acquire+0x197/0x470 [ 2160.249670] ? lock_chain_count+0x20/0x20 [ 2160.250253] ? mark_lock+0xf5/0x2df0 [ 2160.250782] ? mark_lock+0xf5/0x2df0 [ 2160.251315] ? lock_chain_count+0x20/0x20 [ 2160.251903] ? __lock_acquire+0xbb1/0x5b00 [ 2160.252500] ? lock_chain_count+0x20/0x20 [ 2160.253086] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.253824] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.254406] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2160.255003] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.255752] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.256331] ? mark_lock+0xf5/0x2df0 [ 2160.256867] ? lock_acquire+0x197/0x470 [ 2160.257423] ? find_held_lock+0x2c/0x110 [ 2160.257996] ? __might_fault+0xd3/0x180 [ 2160.258565] ? lock_downgrade+0x6d0/0x6d0 [ 2160.259168] ? lock_downgrade+0x6d0/0x6d0 [ 2160.259761] ? sock_has_perm+0x1ea/0x280 [ 2160.260323] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2160.261062] ? _copy_from_user+0xfb/0x1b0 [ 2160.261660] ? __import_iovec+0x458/0x590 [ 2160.262254] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.262980] inet6_sendmsg+0x105/0x140 [ 2160.263566] ? inet6_compat_ioctl+0x320/0x320 [ 2160.264194] __sock_sendmsg+0xf2/0x190 [ 2160.264749] ____sys_sendmsg+0x70d/0x870 [ 2160.265328] ? sock_write_iter+0x3d0/0x3d0 [ 2160.265921] ? do_recvmmsg+0x6d0/0x6d0 [ 2160.266475] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.267044] ? lock_downgrade+0x6d0/0x6d0 [ 2160.267669] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.268409] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.268994] ___sys_sendmsg+0xf3/0x170 [ 2160.269553] ? sendmsg_copy_msghdr+0x160/0x160 [ 2160.270205] ? __fget_files+0x2cf/0x520 [ 2160.270764] ? lock_downgrade+0x6d0/0x6d0 [ 2160.271382] ? find_held_lock+0x2c/0x110 [ 2160.271968] ? __fget_files+0x2f8/0x520 [ 2160.272547] ? __fget_light+0xea/0x290 [ 2160.273096] __sys_sendmsg+0xe5/0x1b0 [ 2160.273622] ? __sys_sendmsg_sock+0x40/0x40 [ 2160.274217] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.274898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.275667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.276379] ? trace_hardirqs_on+0x5b/0x180 [ 2160.277001] do_syscall_64+0x33/0x40 [ 2160.277536] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2160.278262] RIP: 0033:0x7f251a6f7b19 [ 2160.278795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.281365] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2160.282441] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2160.283459] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2160.284450] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.285455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.286456] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:47:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x3f00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:47:51 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:47:51 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 36) [ 2160.377207] FAULT_INJECTION: forcing a failure. [ 2160.377207] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.378708] CPU: 1 PID: 10264 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2160.379579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2160.380620] Call Trace: [ 2160.380957] dump_stack+0x107/0x167 [ 2160.381417] should_fail.cold+0x5/0xa [ 2160.381908] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2160.382558] ? create_object.isra.0+0x3a/0xa20 [ 2160.383156] should_failslab+0x5/0x20 [ 2160.383647] kmem_cache_alloc+0x5b/0x310 [ 2160.384153] ? mark_held_locks+0x9e/0xe0 [ 2160.384665] create_object.isra.0+0x3a/0xa20 [ 2160.385210] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2160.385843] kmem_cache_alloc_node+0x169/0x330 [ 2160.386420] __alloc_skb+0x6d/0x5b0 [ 2160.386880] skb_segment+0x9d8/0x3aa0 [ 2160.387368] ? __lock_acquire+0xbb1/0x5b00 [ 2160.387922] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2160.388543] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.389192] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.389702] __udp_gso_segment+0x11c6/0x1830 [ 2160.390246] ? __sk_receive_skb+0x830/0x830 [ 2160.390789] udp4_ufo_fragment+0x528/0x720 [ 2160.391330] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2160.391950] inet_gso_segment+0x4fb/0x11a0 [ 2160.392498] skb_mac_gso_segment+0x273/0x570 [ 2160.393054] ? inet_sock_destruct+0x840/0x840 [ 2160.393608] ? skb_network_protocol+0x650/0x650 [ 2160.394180] ? skb_crc32c_csum_help+0x80/0x80 [ 2160.394744] ? lock_acquire+0x197/0x470 [ 2160.395252] ? __dev_queue_xmit+0x1c6/0x2690 [ 2160.395804] __skb_gso_segment+0x32d/0x6d0 [ 2160.396337] ? mark_lock+0xf5/0x2df0 [ 2160.396815] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2160.397486] ? lock_chain_count+0x20/0x20 [ 2160.398015] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2160.398585] __dev_queue_xmit+0x825/0x2690 [ 2160.399132] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2160.399784] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2160.400354] ? mark_held_locks+0x9e/0xe0 [ 2160.400868] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2160.401523] neigh_connected_output+0x382/0x4d0 [ 2160.402123] ip_finish_output2+0x6f1/0x21f0 [ 2160.402673] ? nf_hook_slow+0xfc/0x1e0 [ 2160.403170] ? ip_frag_next+0x9e0/0x9e0 [ 2160.403678] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2160.404302] __ip_finish_output.part.0+0x5f3/0xb50 [ 2160.404919] ? ip_fragment.constprop.0+0x240/0x240 [ 2160.405535] ? netif_rx_ni+0xe7/0x300 [ 2160.406022] ip_mc_output+0x401/0xa30 [ 2160.406499] ip_send_skb+0xdd/0x260 [ 2160.406960] udp_send_skb+0x6da/0x11d0 [ 2160.407466] udp_sendmsg+0x139a/0x2160 [ 2160.407959] ? clockevents_program_event+0x14b/0x360 [ 2160.408589] ? ip_frag_init+0x350/0x350 [ 2160.409081] ? lock_acquire+0x197/0x470 [ 2160.409575] ? find_held_lock+0x2c/0x110 [ 2160.410080] ? udp_setsockopt+0xc0/0xc0 [ 2160.410574] ? perf_event_update_userpage+0x4aa/0x7f0 [ 2160.411226] ? lock_downgrade+0x6d0/0x6d0 [ 2160.411745] ? mark_lock+0xf5/0x2df0 [ 2160.412209] ? mark_lock+0xf5/0x2df0 [ 2160.412672] ? lock_chain_count+0x20/0x20 [ 2160.413186] ? perf_event_task_disable+0x390/0x390 [ 2160.413795] ? lock_chain_count+0x20/0x20 [ 2160.414309] ? hrtimer_start_range_ns+0x3b2/0xb30 [ 2160.414909] ? mark_lock+0xf5/0x2df0 [ 2160.415392] ? mark_lock+0xf5/0x2df0 [ 2160.415856] ? lock_chain_count+0x20/0x20 [ 2160.416375] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2160.416891] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.417528] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.418034] ? mark_lock+0xf5/0x2df0 [ 2160.418501] ? lock_acquire+0x197/0x470 [ 2160.418991] ? find_held_lock+0x2c/0x110 [ 2160.419516] ? __might_fault+0xd3/0x180 [ 2160.420008] ? lock_downgrade+0x6d0/0x6d0 [ 2160.420526] ? lock_downgrade+0x6d0/0x6d0 [ 2160.421041] ? sock_has_perm+0x1ea/0x280 [ 2160.421545] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2160.422187] ? _copy_from_user+0xfb/0x1b0 [ 2160.422713] ? __import_iovec+0x458/0x590 [ 2160.423236] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.423879] inet6_sendmsg+0x105/0x140 [ 2160.424368] ? inet6_compat_ioctl+0x320/0x320 [ 2160.424927] __sock_sendmsg+0xf2/0x190 [ 2160.425416] ____sys_sendmsg+0x70d/0x870 [ 2160.425923] ? sock_write_iter+0x3d0/0x3d0 [ 2160.426444] ? do_recvmmsg+0x6d0/0x6d0 [ 2160.426930] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.427439] ? lock_downgrade+0x6d0/0x6d0 [ 2160.427956] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.428600] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.429106] ___sys_sendmsg+0xf3/0x170 [ 2160.429591] ? sendmsg_copy_msghdr+0x160/0x160 [ 2160.430163] ? __fget_files+0x2cf/0x520 [ 2160.430665] ? lock_downgrade+0x6d0/0x6d0 [ 2160.431188] ? find_held_lock+0x2c/0x110 [ 2160.431710] ? __fget_files+0x2f8/0x520 [ 2160.432210] ? __fget_light+0xea/0x290 [ 2160.432700] __sys_sendmsg+0xe5/0x1b0 [ 2160.433173] ? __sys_sendmsg_sock+0x40/0x40 [ 2160.433709] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.434298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.434946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.435610] ? trace_hardirqs_on+0x5b/0x180 [ 2160.436143] do_syscall_64+0x33/0x40 [ 2160.436607] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2160.437238] RIP: 0033:0x7f6082bd7b19 [ 2160.437701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.439978] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2160.440921] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2160.441798] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2160.442678] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.443575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.444453] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2160.477377] FAULT_INJECTION: forcing a failure. [ 2160.477377] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.478855] CPU: 1 PID: 10268 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2160.479830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2160.480847] Call Trace: [ 2160.481178] dump_stack+0x107/0x167 [ 2160.481632] should_fail.cold+0x5/0xa [ 2160.482102] ? create_object.isra.0+0x3a/0xa20 [ 2160.482666] should_failslab+0x5/0x20 [ 2160.483195] kmem_cache_alloc+0x5b/0x310 [ 2160.483703] create_object.isra.0+0x3a/0xa20 [ 2160.484261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2160.484897] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2160.485659] ? skb_segment+0x9d8/0x3aa0 [ 2160.486154] __alloc_skb+0xb1/0x5b0 [ 2160.486611] skb_segment+0x9d8/0x3aa0 [ 2160.487081] ? __lock_acquire+0xbb1/0x5b00 [ 2160.487686] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2160.488333] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.489005] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.489538] __udp_gso_segment+0x11c6/0x1830 [ 2160.490104] ? __sk_receive_skb+0x830/0x830 [ 2160.490668] udp4_ufo_fragment+0x528/0x720 [ 2160.491274] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2160.491905] inet_gso_segment+0x4fb/0x11a0 [ 2160.492435] skb_mac_gso_segment+0x273/0x570 [ 2160.492978] ? inet_sock_destruct+0x840/0x840 [ 2160.493528] ? skb_network_protocol+0x650/0x650 [ 2160.494098] ? skb_crc32c_csum_help+0x80/0x80 [ 2160.494649] ? lock_acquire+0x197/0x470 [ 2160.495149] ? __dev_queue_xmit+0x1c6/0x2690 [ 2160.495702] __skb_gso_segment+0x32d/0x6d0 [ 2160.496222] ? mark_lock+0xf5/0x2df0 [ 2160.496685] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2160.497329] ? lock_chain_count+0x20/0x20 [ 2160.497836] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2160.498398] __dev_queue_xmit+0x825/0x2690 [ 2160.498924] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2160.499580] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2160.500148] ? mark_held_locks+0x9e/0xe0 [ 2160.500659] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2160.501307] neigh_connected_output+0x382/0x4d0 [ 2160.501891] ip_finish_output2+0x6f1/0x21f0 [ 2160.502424] ? nf_hook_slow+0xfc/0x1e0 [ 2160.502909] ? ip_frag_next+0x9e0/0x9e0 [ 2160.503415] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2160.504038] __ip_finish_output.part.0+0x5f3/0xb50 [ 2160.504644] ? ip_fragment.constprop.0+0x240/0x240 [ 2160.505248] ? netif_rx_ni+0xe7/0x300 [ 2160.505723] ip_mc_output+0x401/0xa30 [ 2160.506199] ip_send_skb+0xdd/0x260 [ 2160.506652] udp_send_skb+0x6da/0x11d0 [ 2160.507149] udp_sendmsg+0x139a/0x2160 [ 2160.507632] ? mark_lock+0xf5/0x2df0 [ 2160.508092] ? ip_frag_init+0x350/0x350 [ 2160.508583] ? lock_chain_count+0x20/0x20 [ 2160.509096] ? udp_setsockopt+0xc0/0xc0 [ 2160.509586] ? mark_lock+0xf5/0x2df0 [ 2160.510044] ? lock_acquire+0x197/0x470 [ 2160.510539] ? lock_chain_count+0x20/0x20 [ 2160.511050] ? mark_lock+0xf5/0x2df0 [ 2160.511532] ? mark_lock+0xf5/0x2df0 [ 2160.511994] ? lock_chain_count+0x20/0x20 [ 2160.512513] ? __lock_acquire+0xbb1/0x5b00 [ 2160.513041] ? lock_chain_count+0x20/0x20 [ 2160.513564] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.514209] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.514720] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2160.515244] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.515885] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.516388] ? mark_lock+0xf5/0x2df0 [ 2160.516853] ? lock_acquire+0x197/0x470 [ 2160.517345] ? find_held_lock+0x2c/0x110 [ 2160.517851] ? __might_fault+0xd3/0x180 [ 2160.518341] ? lock_downgrade+0x6d0/0x6d0 [ 2160.518854] ? lock_downgrade+0x6d0/0x6d0 [ 2160.519410] ? sock_has_perm+0x1ea/0x280 [ 2160.519994] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2160.520738] ? _copy_from_user+0xfb/0x1b0 [ 2160.521344] ? __import_iovec+0x458/0x590 [ 2160.521940] ? udp_v6_push_pending_frames+0x360/0x360 [ 2160.522683] inet6_sendmsg+0x105/0x140 [ 2160.523244] ? inet6_compat_ioctl+0x320/0x320 [ 2160.523886] __sock_sendmsg+0xf2/0x190 [ 2160.524446] ____sys_sendmsg+0x70d/0x870 [ 2160.525034] ? sock_write_iter+0x3d0/0x3d0 [ 2160.525641] ? do_recvmmsg+0x6d0/0x6d0 [ 2160.526203] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.526784] ? lock_downgrade+0x6d0/0x6d0 [ 2160.527389] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2160.528140] ? SOFTIRQ_verbose+0x10/0x10 [ 2160.528722] ___sys_sendmsg+0xf3/0x170 [ 2160.529276] ? sendmsg_copy_msghdr+0x160/0x160 [ 2160.529938] ? __fget_files+0x2cf/0x520 [ 2160.530508] ? lock_downgrade+0x6d0/0x6d0 [ 2160.531108] ? find_held_lock+0x2c/0x110 [ 2160.531698] ? __fget_files+0x2f8/0x520 [ 2160.532273] ? __fget_light+0xea/0x290 [ 2160.532840] __sys_sendmsg+0xe5/0x1b0 [ 2160.533385] ? __sys_sendmsg_sock+0x40/0x40 [ 2160.534008] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.534692] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.535423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.536059] ? trace_hardirqs_on+0x5b/0x180 [ 2160.536598] do_syscall_64+0x33/0x40 [ 2160.537058] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2160.537690] RIP: 0033:0x7f3f9ec55b19 [ 2160.538151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.540414] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2160.541356] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2160.542232] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2160.543114] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.543993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2160.544871] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:48:07 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) [ 2176.060057] FAULT_INJECTION: forcing a failure. 09:48:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:07 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 37) 09:48:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 38) 09:48:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x7f00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:07 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x5450, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:07 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 35) [ 2176.060057] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.070024] CPU: 1 PID: 10287 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2176.070905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.072057] Call Trace: [ 2176.072418] dump_stack+0x107/0x167 [ 2176.072900] should_fail.cold+0x5/0xa [ 2176.073399] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2176.074067] ? create_object.isra.0+0x3a/0xa20 [ 2176.074656] should_failslab+0x5/0x20 [ 2176.075155] kmem_cache_alloc+0x5b/0x310 [ 2176.075701] ? mark_held_locks+0x9e/0xe0 [ 2176.076232] create_object.isra.0+0x3a/0xa20 [ 2176.076824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2176.077498] kmem_cache_alloc_node+0x169/0x330 [ 2176.078114] __alloc_skb+0x6d/0x5b0 [ 2176.078594] skb_segment+0x9d8/0x3aa0 [ 2176.078795] FAULT_INJECTION: forcing a failure. [ 2176.078795] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.079097] ? __lock_acquire+0xbb1/0x5b00 [ 2176.081237] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.081909] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.082594] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.083126] __udp_gso_segment+0x11c6/0x1830 [ 2176.087735] ? __sk_receive_skb+0x830/0x830 [ 2176.088294] udp4_ufo_fragment+0x528/0x720 [ 2176.088850] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.089486] inet_gso_segment+0x4fb/0x11a0 [ 2176.090054] skb_mac_gso_segment+0x273/0x570 [ 2176.090622] ? inet_sock_destruct+0x840/0x840 [ 2176.091194] ? skb_network_protocol+0x650/0x650 [ 2176.091809] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.092379] ? lock_acquire+0x197/0x470 [ 2176.092888] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.093451] __skb_gso_segment+0x32d/0x6d0 [ 2176.093996] ? mark_lock+0xf5/0x2df0 [ 2176.094474] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.095148] ? lock_chain_count+0x20/0x20 [ 2176.095698] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.096286] __dev_queue_xmit+0x825/0x2690 [ 2176.096843] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.097499] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.098096] ? mark_held_locks+0x9e/0xe0 [ 2176.098625] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.099297] neigh_connected_output+0x382/0x4d0 [ 2176.099932] ip_finish_output2+0x6f1/0x21f0 [ 2176.100488] ? nf_hook_slow+0xfc/0x1e0 [ 2176.100996] ? ip_frag_next+0x9e0/0x9e0 [ 2176.101501] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.102153] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.102789] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.103412] ? netif_rx_ni+0xe7/0x300 [ 2176.103929] ip_mc_output+0x401/0xa30 [ 2176.104420] ip_send_skb+0xdd/0x260 [ 2176.104899] udp_send_skb+0x6da/0x11d0 [ 2176.105408] udp_sendmsg+0x139a/0x2160 [ 2176.105914] ? mark_lock+0xf5/0x2df0 [ 2176.106393] ? ip_frag_init+0x350/0x350 [ 2176.106915] ? lock_chain_count+0x20/0x20 [ 2176.107440] ? mark_lock+0xf5/0x2df0 [ 2176.107939] ? udp_setsockopt+0xc0/0xc0 [ 2176.108461] ? __bad_area_nosemaphore+0xa1/0x310 [ 2176.109075] ? mark_lock+0xf5/0x2df0 [ 2176.109556] ? mark_lock+0xf5/0x2df0 [ 2176.110036] ? lock_chain_count+0x20/0x20 [ 2176.110568] ? lock_chain_count+0x20/0x20 [ 2176.111114] ? mark_lock+0xf5/0x2df0 [ 2176.111602] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.112156] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.112816] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.113341] ? mark_lock+0xf5/0x2df0 [ 2176.113828] ? lock_acquire+0x197/0x470 [ 2176.114334] ? find_held_lock+0x2c/0x110 [ 2176.114866] ? __might_fault+0xd3/0x180 [ 2176.115373] ? lock_downgrade+0x6d0/0x6d0 [ 2176.115934] ? lock_downgrade+0x6d0/0x6d0 [ 2176.116471] ? sock_has_perm+0x1ea/0x280 [ 2176.117001] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.117669] ? _copy_from_user+0xfb/0x1b0 [ 2176.118207] ? __import_iovec+0x458/0x590 [ 2176.118746] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.119411] inet6_sendmsg+0x105/0x140 [ 2176.119937] ? inet6_compat_ioctl+0x320/0x320 [ 2176.120509] __sock_sendmsg+0xf2/0x190 [ 2176.121015] ____sys_sendmsg+0x70d/0x870 [ 2176.121539] ? sock_write_iter+0x3d0/0x3d0 [ 2176.122086] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.122588] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.123112] ? lock_downgrade+0x6d0/0x6d0 [ 2176.123648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.124449] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.124983] ___sys_sendmsg+0xf3/0x170 [ 2176.125490] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.126087] ? __fget_files+0x2cf/0x520 [ 2176.126600] ? lock_downgrade+0x6d0/0x6d0 [ 2176.127137] ? find_held_lock+0x2c/0x110 [ 2176.127687] ? __fget_files+0x2f8/0x520 [ 2176.128224] ? __fget_light+0xea/0x290 [ 2176.128739] __sys_sendmsg+0xe5/0x1b0 [ 2176.129235] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.129787] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.130390] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.131061] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.131734] ? trace_hardirqs_on+0x5b/0x180 [ 2176.132294] do_syscall_64+0x33/0x40 [ 2176.132779] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.133431] RIP: 0033:0x7f251a6f7b19 [ 2176.133916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.136254] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.137214] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2176.138111] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2176.139012] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.139947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.140849] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2176.141790] CPU: 0 PID: 10290 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2176.142821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.143987] Call Trace: [ 2176.144364] dump_stack+0x107/0x167 [ 2176.144880] should_fail.cold+0x5/0xa [ 2176.145418] should_failslab+0x5/0x20 [ 2176.145962] __kmalloc_node_track_caller+0x74/0x3b0 [ 2176.146657] ? skb_segment+0x9d8/0x3aa0 [ 2176.147214] __alloc_skb+0xb1/0x5b0 [ 2176.147754] skb_segment+0x9d8/0x3aa0 [ 2176.148262] ? __lock_acquire+0xbb1/0x5b00 [ 2176.148838] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.149483] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.150201] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.150735] __udp_gso_segment+0x11c6/0x1830 [ 2176.151301] ? __sk_receive_skb+0x830/0x830 [ 2176.151919] udp4_ufo_fragment+0x528/0x720 [ 2176.152471] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.153132] inet_gso_segment+0x4fb/0x11a0 [ 2176.153681] skb_mac_gso_segment+0x273/0x570 [ 2176.160000] ? inet_sock_destruct+0x840/0x840 [ 2176.160766] ? skb_network_protocol+0x650/0x650 [ 2176.161472] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.162072] ? lock_acquire+0x197/0x470 [ 2176.162610] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.163212] __skb_gso_segment+0x32d/0x6d0 [ 2176.163782] ? mark_lock+0xf5/0x2df0 [ 2176.164264] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.164929] ? lock_chain_count+0x20/0x20 [ 2176.165479] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.166056] __dev_queue_xmit+0x825/0x2690 [ 2176.166599] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.167285] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.167932] ? mark_held_locks+0x9e/0xe0 [ 2176.168491] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.169198] neigh_connected_output+0x382/0x4d0 [ 2176.169865] ip_finish_output2+0x6f1/0x21f0 [ 2176.170485] ? nf_hook_slow+0xfc/0x1e0 [ 2176.171020] ? ip_frag_next+0x9e0/0x9e0 [ 2176.171548] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.172231] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.172887] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.173550] ? netif_rx_ni+0xe7/0x300 [ 2176.174039] ip_mc_output+0x401/0xa30 [ 2176.174530] ip_send_skb+0xdd/0x260 [ 2176.174991] udp_send_skb+0x6da/0x11d0 [ 2176.175510] udp_sendmsg+0x139a/0x2160 [ 2176.176066] ? mark_lock+0xf5/0x2df0 [ 2176.176578] ? ip_frag_init+0x350/0x350 [ 2176.177113] ? lock_chain_count+0x20/0x20 [ 2176.177687] ? udp_setsockopt+0xc0/0xc0 [ 2176.178220] ? mark_lock+0xf5/0x2df0 [ 2176.178731] ? lock_acquire+0x197/0x470 [ 2176.179266] ? lock_chain_count+0x20/0x20 [ 2176.179814] ? mark_lock+0xf5/0x2df0 [ 2176.180304] ? mark_lock+0xf5/0x2df0 [ 2176.180786] ? lock_chain_count+0x20/0x20 [ 2176.181321] ? __lock_acquire+0xbb1/0x5b00 09:48:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 39) [ 2176.181875] ? lock_chain_count+0x20/0x20 [ 2176.192098] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.192784] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.193332] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.193870] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.194566] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.195097] ? mark_lock+0xf5/0x2df0 [ 2176.195588] ? lock_acquire+0x197/0x470 [ 2176.196105] ? find_held_lock+0x2c/0x110 [ 2176.196647] ? __might_fault+0xd3/0x180 [ 2176.197169] ? lock_downgrade+0x6d0/0x6d0 [ 2176.197747] ? lock_downgrade+0x6d0/0x6d0 [ 2176.198310] ? sock_has_perm+0x1ea/0x280 [ 2176.198854] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.199562] ? _copy_from_user+0xfb/0x1b0 [ 2176.200153] ? __import_iovec+0x458/0x590 [ 2176.200699] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.201379] inet6_sendmsg+0x105/0x140 [ 2176.201895] ? inet6_compat_ioctl+0x320/0x320 [ 2176.202481] __sock_sendmsg+0xf2/0x190 [ 2176.202996] ____sys_sendmsg+0x70d/0x870 [ 2176.203531] ? sock_write_iter+0x3d0/0x3d0 [ 2176.204097] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.204605] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.205119] ? lock_downgrade+0x6d0/0x6d0 [ 2176.205676] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.206370] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.206888] ___sys_sendmsg+0xf3/0x170 [ 2176.207389] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.208105] ? __fget_files+0x2cf/0x520 [ 2176.208617] ? lock_downgrade+0x6d0/0x6d0 [ 2176.209137] ? find_held_lock+0x2c/0x110 [ 2176.209661] ? __fget_files+0x2f8/0x520 [ 2176.210169] ? __fget_light+0xea/0x290 [ 2176.210685] __sys_sendmsg+0xe5/0x1b0 [ 2176.211179] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.211757] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.212391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.213056] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.213704] ? trace_hardirqs_on+0x5b/0x180 [ 2176.214264] do_syscall_64+0x33/0x40 [ 2176.214744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.215393] RIP: 0033:0x7f6082bd7b19 [ 2176.219930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.222313] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.223262] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2176.224177] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2176.225089] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.226004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.226930] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2176.262896] FAULT_INJECTION: forcing a failure. [ 2176.262896] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.268567] CPU: 0 PID: 10286 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2176.269516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.270650] Call Trace: [ 2176.271031] dump_stack+0x107/0x167 [ 2176.271550] should_fail.cold+0x5/0xa [ 2176.276128] ? trace_hardirqs_on+0x5b/0x180 [ 2176.276723] ? __alloc_skb+0x6d/0x5b0 [ 2176.277253] should_failslab+0x5/0x20 [ 2176.277788] kmem_cache_alloc_node+0x55/0x330 [ 2176.278412] __alloc_skb+0x6d/0x5b0 [ 2176.279107] skb_segment+0x9d8/0x3aa0 [ 2176.279997] ? __lock_acquire+0xbb1/0x5b00 [ 2176.280608] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.281293] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.282636] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.283572] __udp_gso_segment+0x11c6/0x1830 [ 2176.284237] ? __sk_receive_skb+0x830/0x830 [ 2176.284953] udp4_ufo_fragment+0x528/0x720 [ 2176.285714] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.286587] inet_gso_segment+0x4fb/0x11a0 [ 2176.287343] skb_mac_gso_segment+0x273/0x570 [ 2176.288044] ? inet_sock_destruct+0x840/0x840 [ 2176.288715] ? skb_network_protocol+0x650/0x650 [ 2176.289344] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.289970] ? lock_acquire+0x197/0x470 [ 2176.290516] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.291133] __skb_gso_segment+0x32d/0x6d0 [ 2176.291727] ? mark_lock+0xf5/0x2df0 [ 2176.292255] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.293017] ? lock_chain_count+0x20/0x20 [ 2176.293644] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.294294] __dev_queue_xmit+0x825/0x2690 [ 2176.294908] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.295649] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.296978] ? mark_held_locks+0x9e/0xe0 [ 2176.298340] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.300092] neigh_connected_output+0x382/0x4d0 [ 2176.301641] ip_finish_output2+0x6f1/0x21f0 [ 2176.303090] ? nf_hook_slow+0xfc/0x1e0 [ 2176.303795] ? ip_frag_next+0x9e0/0x9e0 [ 2176.304417] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.305160] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.305890] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.306648] ? netif_rx_ni+0xe7/0x300 [ 2176.307185] ip_mc_output+0x401/0xa30 09:48:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 36) [ 2176.307744] ip_send_skb+0xdd/0x260 [ 2176.308270] udp_send_skb+0x6da/0x11d0 [ 2176.316311] udp_sendmsg+0x139a/0x2160 [ 2176.316852] ? mark_lock+0xf5/0x2df0 [ 2176.317365] ? ip_frag_init+0x350/0x350 [ 2176.317923] ? lock_chain_count+0x20/0x20 [ 2176.318502] ? udp_setsockopt+0xc0/0xc0 [ 2176.319120] ? mark_lock+0xf5/0x2df0 [ 2176.319641] ? lock_acquire+0x197/0x470 [ 2176.320253] ? lock_chain_count+0x20/0x20 [ 2176.320867] ? mark_lock+0xf5/0x2df0 [ 2176.321461] ? mark_lock+0xf5/0x2df0 [ 2176.322015] ? lock_chain_count+0x20/0x20 [ 2176.322657] ? __lock_acquire+0xbb1/0x5b00 [ 2176.323317] ? lock_chain_count+0x20/0x20 [ 2176.323945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.324663] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.325325] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.325934] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.326704] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.327305] ? mark_lock+0xf5/0x2df0 [ 2176.327849] ? lock_acquire+0x197/0x470 [ 2176.328434] ? find_held_lock+0x2c/0x110 [ 2176.329027] ? __might_fault+0xd3/0x180 [ 2176.329570] ? lock_downgrade+0x6d0/0x6d0 [ 2176.330148] ? lock_downgrade+0x6d0/0x6d0 [ 2176.330731] ? sock_has_perm+0x1ea/0x280 [ 2176.331293] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.332044] ? _copy_from_user+0xfb/0x1b0 [ 2176.332644] ? __import_iovec+0x458/0x590 [ 2176.333228] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.333954] inet6_sendmsg+0x105/0x140 [ 2176.334501] ? inet6_compat_ioctl+0x320/0x320 [ 2176.335125] __sock_sendmsg+0xf2/0x190 [ 2176.335689] ____sys_sendmsg+0x70d/0x870 [ 2176.336259] ? sock_write_iter+0x3d0/0x3d0 [ 2176.336854] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.337402] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.337976] ? lock_downgrade+0x6d0/0x6d0 [ 2176.338565] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.339298] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.339984] ___sys_sendmsg+0xf3/0x170 [ 2176.340538] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.341194] ? __fget_files+0x2cf/0x520 [ 2176.341765] ? lock_downgrade+0x6d0/0x6d0 [ 2176.342352] ? find_held_lock+0x2c/0x110 [ 2176.343138] ? __fget_files+0x2f8/0x520 [ 2176.344394] ? __fget_light+0xea/0x290 [ 2176.345474] __sys_sendmsg+0xe5/0x1b0 [ 2176.346531] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.347752] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.348429] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.349156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.349868] ? trace_hardirqs_on+0x5b/0x180 [ 2176.350479] do_syscall_64+0x33/0x40 [ 2176.351009] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.351742] RIP: 0033:0x7f3f9ec55b19 [ 2176.352273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.354880] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.355973] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2176.356964] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2176.357943] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.358925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.359981] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:48:07 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x5451, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xc805, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:07 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2176.592368] FAULT_INJECTION: forcing a failure. [ 2176.592368] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.601593] CPU: 0 PID: 10307 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2176.602550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.603692] Call Trace: [ 2176.604071] dump_stack+0x107/0x167 [ 2176.604574] should_fail.cold+0x5/0xa [ 2176.605102] ? create_object.isra.0+0x3a/0xa20 [ 2176.605732] should_failslab+0x5/0x20 [ 2176.606258] kmem_cache_alloc+0x5b/0x310 [ 2176.606835] create_object.isra.0+0x3a/0xa20 [ 2176.612380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2176.613021] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2176.613651] ? skb_segment+0x9d8/0x3aa0 [ 2176.614175] __alloc_skb+0xb1/0x5b0 [ 2176.614686] skb_segment+0x9d8/0x3aa0 [ 2176.615200] ? __lock_acquire+0xbb1/0x5b00 [ 2176.619807] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.620441] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.621096] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.621613] __udp_gso_segment+0x11c6/0x1830 [ 2176.622191] ? __sk_receive_skb+0x830/0x830 [ 2176.622744] udp4_ufo_fragment+0x528/0x720 [ 2176.623280] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.623937] inet_gso_segment+0x4fb/0x11a0 [ 2176.624479] skb_mac_gso_segment+0x273/0x570 [ 2176.625029] ? inet_sock_destruct+0x840/0x840 [ 2176.625590] ? skb_network_protocol+0x650/0x650 [ 2176.626171] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.626740] ? lock_acquire+0x197/0x470 [ 2176.627255] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.627844] __skb_gso_segment+0x32d/0x6d0 [ 2176.628391] ? mark_lock+0xf5/0x2df0 [ 2176.628417] FAULT_INJECTION: forcing a failure. [ 2176.628417] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.628862] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.628876] ? lock_chain_count+0x20/0x20 [ 2176.628887] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.628903] __dev_queue_xmit+0x825/0x2690 [ 2176.632589] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.633251] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.633843] ? mark_held_locks+0x9e/0xe0 [ 2176.634362] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.635039] neigh_connected_output+0x382/0x4d0 [ 2176.635649] ip_finish_output2+0x6f1/0x21f0 [ 2176.636211] ? nf_hook_slow+0xfc/0x1e0 [ 2176.636711] ? ip_frag_next+0x9e0/0x9e0 [ 2176.637212] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.637878] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.638547] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.639228] ? netif_rx_ni+0xe7/0x300 [ 2176.643812] ip_mc_output+0x401/0xa30 [ 2176.644314] ip_send_skb+0xdd/0x260 [ 2176.644826] udp_send_skb+0x6da/0x11d0 [ 2176.645378] udp_sendmsg+0x139a/0x2160 [ 2176.645952] ? mark_lock+0xf5/0x2df0 [ 2176.646515] ? ip_frag_init+0x350/0x350 [ 2176.647116] ? lock_chain_count+0x20/0x20 [ 2176.647727] ? udp_setsockopt+0xc0/0xc0 [ 2176.648241] ? mark_lock+0xf5/0x2df0 [ 2176.648740] ? lock_acquire+0x197/0x470 [ 2176.649256] ? lock_chain_count+0x20/0x20 [ 2176.649788] ? mark_lock+0xf5/0x2df0 [ 2176.650261] ? mark_lock+0xf5/0x2df0 [ 2176.650743] ? lock_chain_count+0x20/0x20 [ 2176.651318] ? __lock_acquire+0xbb1/0x5b00 [ 2176.651917] ? lock_chain_count+0x20/0x20 [ 2176.652496] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.653219] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.653776] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.654308] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.654966] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.655482] ? mark_lock+0xf5/0x2df0 [ 2176.655993] ? lock_acquire+0x197/0x470 [ 2176.656501] ? find_held_lock+0x2c/0x110 [ 2176.657033] ? __might_fault+0xd3/0x180 [ 2176.657571] ? lock_downgrade+0x6d0/0x6d0 [ 2176.658235] ? lock_downgrade+0x6d0/0x6d0 [ 2176.658885] ? sock_has_perm+0x1ea/0x280 [ 2176.659670] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.660463] ? _copy_from_user+0xfb/0x1b0 [ 2176.661142] ? __import_iovec+0x458/0x590 [ 2176.661831] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.662963] inet6_sendmsg+0x105/0x140 [ 2176.663810] ? inet6_compat_ioctl+0x320/0x320 [ 2176.664635] __sock_sendmsg+0xf2/0x190 [ 2176.665410] ____sys_sendmsg+0x70d/0x870 [ 2176.666256] ? sock_write_iter+0x3d0/0x3d0 [ 2176.670896] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.671457] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.672062] ? lock_downgrade+0x6d0/0x6d0 [ 2176.672649] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.673454] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.674148] ___sys_sendmsg+0xf3/0x170 [ 2176.674790] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.675427] ? __fget_files+0x2cf/0x520 [ 2176.675996] ? lock_downgrade+0x6d0/0x6d0 [ 2176.676585] ? find_held_lock+0x2c/0x110 [ 2176.677170] ? __fget_files+0x2f8/0x520 [ 2176.677751] ? __fget_light+0xea/0x290 [ 2176.678279] __sys_sendmsg+0xe5/0x1b0 [ 2176.678834] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.679500] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.680204] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.680919] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.681616] ? trace_hardirqs_on+0x5b/0x180 [ 2176.682200] do_syscall_64+0x33/0x40 [ 2176.682717] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.683419] RIP: 0033:0x7f6082bd7b19 [ 2176.683945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.686258] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.687237] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2176.688198] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2176.689101] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.690006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.690911] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2176.691863] CPU: 1 PID: 10308 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2176.692793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.693791] Call Trace: [ 2176.694121] dump_stack+0x107/0x167 [ 2176.694571] should_fail.cold+0x5/0xa [ 2176.695041] should_failslab+0x5/0x20 [ 2176.695505] __kmalloc_node_track_caller+0x74/0x3b0 [ 2176.696131] ? skb_segment+0x9d8/0x3aa0 [ 2176.696619] __alloc_skb+0xb1/0x5b0 [ 2176.697115] skb_segment+0x9d8/0x3aa0 [ 2176.697597] ? __lock_acquire+0xbb1/0x5b00 [ 2176.698146] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.698764] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.699398] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.699922] __udp_gso_segment+0x11c6/0x1830 [ 2176.700455] ? __sk_receive_skb+0x830/0x830 [ 2176.701007] udp4_ufo_fragment+0x528/0x720 [ 2176.701526] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.702237] inet_gso_segment+0x4fb/0x11a0 [ 2176.702837] skb_mac_gso_segment+0x273/0x570 [ 2176.703458] ? inet_sock_destruct+0x840/0x840 [ 2176.704065] ? skb_network_protocol+0x650/0x650 [ 2176.704627] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.705181] ? lock_acquire+0x197/0x470 [ 2176.705662] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.706199] __skb_gso_segment+0x32d/0x6d0 [ 2176.706712] ? mark_lock+0xf5/0x2df0 [ 2176.707168] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.707814] ? lock_chain_count+0x20/0x20 [ 2176.708321] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.708894] __dev_queue_xmit+0x825/0x2690 [ 2176.709412] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.710051] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.710620] ? mark_held_locks+0x9e/0xe0 [ 2176.711122] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.711787] neigh_connected_output+0x382/0x4d0 [ 2176.712364] ip_finish_output2+0x6f1/0x21f0 [ 2176.712923] ? nf_hook_slow+0xfc/0x1e0 [ 2176.713466] ? ip_frag_next+0x9e0/0x9e0 [ 2176.714047] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.714744] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.715458] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.716137] ? netif_rx_ni+0xe7/0x300 [ 2176.716615] ip_mc_output+0x401/0xa30 [ 2176.717082] ip_send_skb+0xdd/0x260 [ 2176.717530] udp_send_skb+0x6da/0x11d0 [ 2176.718070] udp_sendmsg+0x139a/0x2160 [ 2176.718616] ? mark_lock+0xf5/0x2df0 [ 2176.719160] ? ip_frag_init+0x350/0x350 [ 2176.719749] ? lock_chain_count+0x20/0x20 [ 2176.720258] ? udp_setsockopt+0xc0/0xc0 [ 2176.720741] ? mark_lock+0xf5/0x2df0 [ 2176.721193] ? lock_acquire+0x197/0x470 [ 2176.721717] ? lock_chain_count+0x20/0x20 [ 2176.722322] ? mark_lock+0xf5/0x2df0 [ 2176.722841] ? mark_lock+0xf5/0x2df0 [ 2176.723380] ? lock_chain_count+0x20/0x20 [ 2176.723962] ? __lock_acquire+0xbb1/0x5b00 [ 2176.724477] ? lock_chain_count+0x20/0x20 [ 2176.724993] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.725627] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.726211] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.726789] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.727529] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.728065] ? mark_lock+0xf5/0x2df0 [ 2176.728526] ? lock_acquire+0x197/0x470 [ 2176.729007] ? find_held_lock+0x2c/0x110 [ 2176.729515] ? __might_fault+0xd3/0x180 [ 2176.730023] ? lock_downgrade+0x6d0/0x6d0 [ 2176.730537] ? lock_downgrade+0x6d0/0x6d0 [ 2176.731042] ? sock_has_perm+0x1ea/0x280 [ 2176.731536] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.732181] ? _copy_from_user+0xfb/0x1b0 [ 2176.732696] ? __import_iovec+0x458/0x590 [ 2176.733195] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.733845] inet6_sendmsg+0x105/0x140 [ 2176.734332] ? inet6_compat_ioctl+0x320/0x320 [ 2176.734892] __sock_sendmsg+0xf2/0x190 [ 2176.735391] ____sys_sendmsg+0x70d/0x870 [ 2176.735908] ? sock_write_iter+0x3d0/0x3d0 [ 2176.736409] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.736896] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.737417] ? lock_downgrade+0x6d0/0x6d0 [ 2176.737956] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.738640] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.739141] ___sys_sendmsg+0xf3/0x170 [ 2176.739639] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.740232] ? __fget_files+0x2cf/0x520 [ 2176.740755] ? lock_downgrade+0x6d0/0x6d0 [ 2176.741276] ? find_held_lock+0x2c/0x110 [ 2176.741813] ? __fget_files+0x2f8/0x520 [ 2176.742283] ? __fget_light+0xea/0x290 [ 2176.742747] __sys_sendmsg+0xe5/0x1b0 [ 2176.743204] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.743754] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.744346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.744988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.745611] ? trace_hardirqs_on+0x5b/0x180 [ 2176.746139] do_syscall_64+0x33/0x40 [ 2176.746594] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.747218] RIP: 0033:0x7f251a6f7b19 [ 2176.747676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.749918] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.750844] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2176.751722] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2176.752597] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.753460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.754330] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:48:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 37) [ 2176.852694] FAULT_INJECTION: forcing a failure. [ 2176.852694] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.854173] CPU: 1 PID: 10324 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2176.855082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.856243] Call Trace: [ 2176.856619] dump_stack+0x107/0x167 [ 2176.857086] should_fail.cold+0x5/0xa [ 2176.857590] ? trace_hardirqs_on+0x5b/0x180 [ 2176.858148] ? __alloc_skb+0x6d/0x5b0 [ 2176.858638] should_failslab+0x5/0x20 [ 2176.859100] kmem_cache_alloc_node+0x55/0x330 [ 2176.859666] __alloc_skb+0x6d/0x5b0 [ 2176.860181] skb_segment+0x9d8/0x3aa0 [ 2176.860690] ? __lock_acquire+0xbb1/0x5b00 [ 2176.861263] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.861923] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.862618] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.863197] __udp_gso_segment+0x11c6/0x1830 [ 2176.863797] ? __sk_receive_skb+0x830/0x830 [ 2176.864408] udp4_ufo_fragment+0x528/0x720 [ 2176.864996] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.865651] inet_gso_segment+0x4fb/0x11a0 [ 2176.866244] skb_mac_gso_segment+0x273/0x570 [ 2176.866807] ? inet_sock_destruct+0x840/0x840 [ 2176.867380] ? skb_network_protocol+0x650/0x650 [ 2176.868017] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.868621] ? lock_acquire+0x197/0x470 [ 2176.869146] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.869753] __skb_gso_segment+0x32d/0x6d0 [ 2176.870339] ? mark_lock+0xf5/0x2df0 [ 2176.870858] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.871581] ? lock_chain_count+0x20/0x20 [ 2176.872163] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.872769] __dev_queue_xmit+0x825/0x2690 [ 2176.873340] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.874047] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.874689] ? mark_held_locks+0x9e/0xe0 [ 2176.875267] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.875996] neigh_connected_output+0x382/0x4d0 [ 2176.876603] ip_finish_output2+0x6f1/0x21f0 [ 2176.877169] ? nf_hook_slow+0xfc/0x1e0 [ 2176.877701] ? ip_frag_next+0x9e0/0x9e0 [ 2176.878237] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.878916] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.879545] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.880192] ? netif_rx_ni+0xe7/0x300 [ 2176.880723] ip_mc_output+0x401/0xa30 [ 2176.881254] ip_send_skb+0xdd/0x260 [ 2176.881760] udp_send_skb+0x6da/0x11d0 [ 2176.882310] udp_sendmsg+0x139a/0x2160 [ 2176.882848] ? mark_lock+0xf5/0x2df0 [ 2176.883357] ? ip_frag_init+0x350/0x350 [ 2176.883917] ? lock_chain_count+0x20/0x20 [ 2176.884477] ? udp_setsockopt+0xc0/0xc0 [ 2176.884987] ? mark_lock+0xf5/0x2df0 [ 2176.885487] ? lock_acquire+0x197/0x470 [ 2176.886019] ? lock_chain_count+0x20/0x20 [ 2176.886574] ? mark_lock+0xf5/0x2df0 [ 2176.887079] ? mark_lock+0xf5/0x2df0 [ 2176.887559] ? lock_chain_count+0x20/0x20 [ 2176.888085] ? __lock_acquire+0xbb1/0x5b00 [ 2176.888617] ? lock_chain_count+0x20/0x20 [ 2176.889129] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.889771] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.890285] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2176.890797] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.891460] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.891996] ? mark_lock+0xf5/0x2df0 [ 2176.892458] ? lock_acquire+0x197/0x470 [ 2176.892947] ? find_held_lock+0x2c/0x110 [ 2176.893453] ? __might_fault+0xd3/0x180 [ 2176.893986] ? lock_downgrade+0x6d0/0x6d0 [ 2176.894538] ? lock_downgrade+0x6d0/0x6d0 [ 2176.895076] ? sock_has_perm+0x1ea/0x280 [ 2176.895625] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2176.896317] ? _copy_from_user+0xfb/0x1b0 [ 2176.896852] ? __import_iovec+0x458/0x590 [ 2176.897409] ? udp_v6_push_pending_frames+0x360/0x360 [ 2176.898124] inet6_sendmsg+0x105/0x140 [ 2176.898637] ? inet6_compat_ioctl+0x320/0x320 [ 2176.899215] __sock_sendmsg+0xf2/0x190 [ 2176.899711] ____sys_sendmsg+0x70d/0x870 [ 2176.900249] ? sock_write_iter+0x3d0/0x3d0 [ 2176.900834] ? do_recvmmsg+0x6d0/0x6d0 [ 2176.901364] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.901903] ? lock_downgrade+0x6d0/0x6d0 [ 2176.902458] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.903144] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.903683] ___sys_sendmsg+0xf3/0x170 [ 2176.904230] ? sendmsg_copy_msghdr+0x160/0x160 [ 2176.904866] ? __fget_files+0x2cf/0x520 [ 2176.905405] ? lock_downgrade+0x6d0/0x6d0 [ 2176.905978] ? find_held_lock+0x2c/0x110 [ 2176.906551] ? __fget_files+0x2f8/0x520 [ 2176.907107] ? __fget_light+0xea/0x290 [ 2176.907638] __sys_sendmsg+0xe5/0x1b0 [ 2176.908187] ? __sys_sendmsg_sock+0x40/0x40 [ 2176.908782] ? rcu_read_lock_any_held+0x75/0xa0 [ 2176.909436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2176.910155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2176.910844] ? trace_hardirqs_on+0x5b/0x180 [ 2176.911403] do_syscall_64+0x33/0x40 [ 2176.911935] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2176.912623] RIP: 0033:0x7f6082bd7b19 [ 2176.913131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2176.915552] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2176.916532] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2176.917463] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2176.918389] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2176.919303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2176.920247] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2176.962184] FAULT_INJECTION: forcing a failure. [ 2176.962184] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.963755] CPU: 1 PID: 10327 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2176.964679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2176.965756] Call Trace: [ 2176.966126] dump_stack+0x107/0x167 [ 2176.966621] should_fail.cold+0x5/0xa [ 2176.967145] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2176.967852] ? create_object.isra.0+0x3a/0xa20 [ 2176.968452] should_failslab+0x5/0x20 [ 2176.968951] kmem_cache_alloc+0x5b/0x310 [ 2176.969504] ? mark_held_locks+0x9e/0xe0 [ 2176.970055] create_object.isra.0+0x3a/0xa20 [ 2176.970651] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2176.971350] kmem_cache_alloc_node+0x169/0x330 [ 2176.972011] __alloc_skb+0x6d/0x5b0 [ 2176.972518] skb_segment+0x9d8/0x3aa0 [ 2176.973043] ? __lock_acquire+0xbb1/0x5b00 [ 2176.973659] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2176.974343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2176.975006] ? SOFTIRQ_verbose+0x10/0x10 [ 2176.975531] __udp_gso_segment+0x11c6/0x1830 [ 2176.976102] ? __sk_receive_skb+0x830/0x830 [ 2176.976702] udp4_ufo_fragment+0x528/0x720 [ 2176.977294] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2176.977984] inet_gso_segment+0x4fb/0x11a0 [ 2176.978585] skb_mac_gso_segment+0x273/0x570 [ 2176.979196] ? inet_sock_destruct+0x840/0x840 [ 2176.979834] ? skb_network_protocol+0x650/0x650 [ 2176.980470] ? skb_crc32c_csum_help+0x80/0x80 [ 2176.981087] ? lock_acquire+0x197/0x470 [ 2176.981633] ? __dev_queue_xmit+0x1c6/0x2690 [ 2176.982247] __skb_gso_segment+0x32d/0x6d0 [ 2176.982830] ? mark_lock+0xf5/0x2df0 [ 2176.983350] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2176.984085] ? lock_chain_count+0x20/0x20 [ 2176.984650] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2176.985283] __dev_queue_xmit+0x825/0x2690 [ 2176.985876] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2176.986585] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2176.987209] ? mark_held_locks+0x9e/0xe0 [ 2176.987734] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2176.988447] neigh_connected_output+0x382/0x4d0 [ 2176.989080] ip_finish_output2+0x6f1/0x21f0 [ 2176.989647] ? nf_hook_slow+0xfc/0x1e0 [ 2176.990172] ? ip_frag_next+0x9e0/0x9e0 [ 2176.990714] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2176.991368] __ip_finish_output.part.0+0x5f3/0xb50 [ 2176.992030] ? ip_fragment.constprop.0+0x240/0x240 [ 2176.992698] ? netif_rx_ni+0xe7/0x300 [ 2176.993215] ip_mc_output+0x401/0xa30 [ 2176.993719] ip_send_skb+0xdd/0x260 [ 2176.994220] udp_send_skb+0x6da/0x11d0 [ 2176.994758] udp_sendmsg+0x139a/0x2160 [ 2176.995294] ? mark_lock+0xf5/0x2df0 [ 2176.995829] ? ip_frag_init+0x350/0x350 [ 2176.996377] ? lock_chain_count+0x20/0x20 [ 2176.996947] ? udp_setsockopt+0xc0/0xc0 [ 2176.997492] ? mark_lock+0xf5/0x2df0 [ 2176.997974] ? __lock_acquire+0x1657/0x5b00 [ 2176.998556] ? lock_chain_count+0x20/0x20 [ 2176.999088] ? mark_lock+0xf5/0x2df0 [ 2176.999582] ? mark_lock+0xf5/0x2df0 [ 2177.000111] ? lock_chain_count+0x20/0x20 [ 2177.000662] ? __lock_acquire+0xbb1/0x5b00 [ 2177.001229] ? lock_chain_count+0x20/0x20 [ 2177.001807] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2177.002468] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.003036] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2177.003612] ? udp_v6_push_pending_frames+0x360/0x360 [ 2177.004303] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.004856] ? mark_lock+0xf5/0x2df0 [ 2177.005357] ? lock_acquire+0x197/0x470 [ 2177.005901] ? find_held_lock+0x2c/0x110 [ 2177.006459] ? __might_fault+0xd3/0x180 [ 2177.006986] ? lock_downgrade+0x6d0/0x6d0 [ 2177.007556] ? sock_has_perm+0x1ea/0x280 [ 2177.008136] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2177.008845] ? _copy_from_user+0xfb/0x1b0 [ 2177.009402] ? __import_iovec+0x458/0x590 [ 2177.009966] ? udp_v6_push_pending_frames+0x360/0x360 [ 2177.010960] inet6_sendmsg+0x105/0x140 [ 2177.011481] ? inet6_compat_ioctl+0x320/0x320 [ 2177.012109] __sock_sendmsg+0xf2/0x190 [ 2177.012625] ____sys_sendmsg+0x70d/0x870 [ 2177.013161] ? sock_write_iter+0x3d0/0x3d0 [ 2177.013732] ? do_recvmmsg+0x6d0/0x6d0 [ 2177.014239] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.014774] ? lock_downgrade+0x6d0/0x6d0 [ 2177.015327] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2177.016067] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.016608] ___sys_sendmsg+0xf3/0x170 [ 2177.017077] ? sendmsg_copy_msghdr+0x160/0x160 [ 2177.017646] ? __fget_files+0x2cf/0x520 [ 2177.018160] ? lock_downgrade+0x6d0/0x6d0 [ 2177.018724] ? find_held_lock+0x2c/0x110 [ 2177.019288] ? __fget_files+0x2f8/0x520 [ 2177.019819] ? __fget_light+0xea/0x290 [ 2177.020296] __sys_sendmsg+0xe5/0x1b0 [ 2177.020812] ? __sys_sendmsg_sock+0x40/0x40 [ 2177.021383] ? rcu_read_lock_any_held+0x75/0xa0 [ 2177.021979] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2177.022675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2177.023357] ? trace_hardirqs_on+0x5b/0x180 [ 2177.023920] do_syscall_64+0x33/0x40 [ 2177.024479] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2177.025323] RIP: 0033:0x7f3f9ec55b19 [ 2177.025824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2177.028294] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2177.029261] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2177.030219] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2177.031125] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2177.032041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2177.033008] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:48:08 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 38) 09:48:08 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:08 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:08 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:08 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:48:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xe803, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:08 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 38) [ 2177.199742] FAULT_INJECTION: forcing a failure. [ 2177.199742] name failslab, interval 1, probability 0, space 0, times 0 [ 2177.201163] CPU: 0 PID: 10347 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2177.202026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2177.203061] Call Trace: [ 2177.203399] dump_stack+0x107/0x167 [ 2177.203881] should_fail.cold+0x5/0xa [ 2177.204365] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2177.205022] ? create_object.isra.0+0x3a/0xa20 [ 2177.205598] should_failslab+0x5/0x20 [ 2177.206072] kmem_cache_alloc+0x5b/0x310 [ 2177.206582] ? mark_held_locks+0x9e/0xe0 [ 2177.207096] create_object.isra.0+0x3a/0xa20 [ 2177.207647] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2177.208319] kmem_cache_alloc_node+0x169/0x330 [ 2177.208905] __alloc_skb+0x6d/0x5b0 [ 2177.209379] skb_segment+0x9d8/0x3aa0 [ 2177.209862] ? __lock_acquire+0xbb1/0x5b00 [ 2177.210420] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2177.211048] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2177.211721] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.212249] __udp_gso_segment+0x11c6/0x1830 [ 2177.212802] ? __sk_receive_skb+0x830/0x830 [ 2177.213348] udp4_ufo_fragment+0x528/0x720 [ 2177.213889] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2177.214525] inet_gso_segment+0x4fb/0x11a0 [ 2177.215073] skb_mac_gso_segment+0x273/0x570 [ 2177.215624] ? inet_sock_destruct+0x840/0x840 [ 2177.216210] ? skb_network_protocol+0x650/0x650 [ 2177.216792] ? skb_crc32c_csum_help+0x80/0x80 [ 2177.217354] ? lock_acquire+0x197/0x470 [ 2177.217850] ? __dev_queue_xmit+0x1c6/0x2690 [ 2177.218409] __skb_gso_segment+0x32d/0x6d0 [ 2177.218940] ? mark_lock+0xf5/0x2df0 [ 2177.219412] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2177.220079] ? lock_chain_count+0x20/0x20 [ 2177.220602] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2177.221177] __dev_queue_xmit+0x825/0x2690 [ 2177.221719] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2177.222369] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2177.222954] ? mark_held_locks+0x9e/0xe0 [ 2177.223469] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2177.224163] neigh_connected_output+0x382/0x4d0 [ 2177.224759] ip_finish_output2+0x6f1/0x21f0 [ 2177.225305] ? nf_hook_slow+0xfc/0x1e0 [ 2177.225799] ? ip_frag_next+0x9e0/0x9e0 [ 2177.226298] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2177.226940] __ip_finish_output.part.0+0x5f3/0xb50 [ 2177.227565] ? ip_fragment.constprop.0+0x240/0x240 [ 2177.228207] ? netif_rx_ni+0xe7/0x300 [ 2177.228695] ip_mc_output+0x401/0xa30 [ 2177.229182] ip_send_skb+0xdd/0x260 [ 2177.229650] udp_send_skb+0x6da/0x11d0 [ 2177.230150] udp_sendmsg+0x139a/0x2160 [ 2177.230642] ? mark_lock+0xf5/0x2df0 [ 2177.231114] ? ip_frag_init+0x350/0x350 [ 2177.231629] ? lock_chain_count+0x20/0x20 [ 2177.232176] ? udp_setsockopt+0xc0/0xc0 [ 2177.232686] ? mark_lock+0xf5/0x2df0 [ 2177.233164] ? lock_acquire+0x197/0x470 [ 2177.233679] ? lock_chain_count+0x20/0x20 [ 2177.234214] ? mark_lock+0xf5/0x2df0 [ 2177.234694] ? mark_lock+0xf5/0x2df0 [ 2177.235169] ? lock_chain_count+0x20/0x20 [ 2177.235713] ? __lock_acquire+0xbb1/0x5b00 [ 2177.236281] ? lock_chain_count+0x20/0x20 [ 2177.236823] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2177.237497] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.238039] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2177.238581] ? udp_v6_push_pending_frames+0x360/0x360 [ 2177.239245] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.239791] ? mark_lock+0xf5/0x2df0 [ 2177.240273] ? lock_acquire+0x197/0x470 [ 2177.240778] ? find_held_lock+0x2c/0x110 [ 2177.241308] ? __might_fault+0xd3/0x180 [ 2177.241820] ? lock_downgrade+0x6d0/0x6d0 [ 2177.242357] ? lock_downgrade+0x6d0/0x6d0 [ 2177.242891] ? sock_has_perm+0x1ea/0x280 [ 2177.243419] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2177.244103] ? _copy_from_user+0xfb/0x1b0 [ 2177.244649] ? __import_iovec+0x458/0x590 [ 2177.245184] ? udp_v6_push_pending_frames+0x360/0x360 [ 2177.245858] inet6_sendmsg+0x105/0x140 [ 2177.246355] ? inet6_compat_ioctl+0x320/0x320 [ 2177.246928] __sock_sendmsg+0xf2/0x190 [ 2177.247427] ____sys_sendmsg+0x70d/0x870 [ 2177.247970] ? sock_write_iter+0x3d0/0x3d0 [ 2177.248502] ? do_recvmmsg+0x6d0/0x6d0 [ 2177.249001] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.249516] ? lock_downgrade+0x6d0/0x6d0 [ 2177.250051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2177.250712] ? SOFTIRQ_verbose+0x10/0x10 [ 2177.251251] ___sys_sendmsg+0xf3/0x170 [ 2177.251815] ? sendmsg_copy_msghdr+0x160/0x160 [ 2177.252473] ? __fget_files+0x2cf/0x520 [ 2177.253033] ? lock_downgrade+0x6d0/0x6d0 [ 2177.253613] ? find_held_lock+0x2c/0x110 [ 2177.254185] ? __fget_files+0x2f8/0x520 [ 2177.254748] ? __fget_light+0xea/0x290 [ 2177.255287] __sys_sendmsg+0xe5/0x1b0 [ 2177.255828] ? __sys_sendmsg_sock+0x40/0x40 [ 2177.256432] ? rcu_read_lock_any_held+0x75/0xa0 [ 2177.257104] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2177.257840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2177.258552] ? trace_hardirqs_on+0x5b/0x180 [ 2177.259148] do_syscall_64+0x33/0x40 [ 2177.259678] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2177.260406] RIP: 0033:0x7f6082bd7b19 [ 2177.260924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2177.263293] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2177.264285] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2177.265192] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2177.266095] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2177.267004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2177.267925] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 09:48:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 40) 09:48:23 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:48:23 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xf401, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:23 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:23 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 39) 09:48:23 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 39) [ 2192.658892] FAULT_INJECTION: forcing a failure. [ 2192.658892] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.672436] CPU: 1 PID: 10370 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2192.673327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2192.674425] Call Trace: [ 2192.674786] dump_stack+0x107/0x167 [ 2192.675273] should_fail.cold+0x5/0xa [ 2192.675793] should_failslab+0x5/0x20 [ 2192.676319] __kmalloc_node_track_caller+0x74/0x3b0 [ 2192.676980] ? skb_segment+0x9d8/0x3aa0 [ 2192.677494] __alloc_skb+0xb1/0x5b0 [ 2192.677976] skb_segment+0x9d8/0x3aa0 [ 2192.678465] ? __lock_acquire+0xbb1/0x5b00 [ 2192.679051] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2192.679703] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.684406] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.684938] __udp_gso_segment+0x11c6/0x1830 [ 2192.704481] ? __sk_receive_skb+0x830/0x830 [ 2192.705051] udp4_ufo_fragment+0x528/0x720 [ 2192.705591] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2192.706225] inet_gso_segment+0x4fb/0x11a0 [ 2192.706778] skb_mac_gso_segment+0x273/0x570 [ 2192.707337] ? inet_sock_destruct+0x840/0x840 [ 2192.707907] ? skb_network_protocol+0x650/0x650 [ 2192.708524] ? skb_crc32c_csum_help+0x80/0x80 [ 2192.709102] ? lock_acquire+0x197/0x470 [ 2192.709606] ? __dev_queue_xmit+0x1c6/0x2690 [ 2192.710172] __skb_gso_segment+0x32d/0x6d0 [ 2192.710730] ? mark_lock+0xf5/0x2df0 [ 2192.711227] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2192.711912] ? lock_chain_count+0x20/0x20 [ 2192.715717] FAULT_INJECTION: forcing a failure. [ 2192.715717] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.720498] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2192.720517] __dev_queue_xmit+0x825/0x2690 [ 2192.720541] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2192.720557] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2192.720583] ? mark_held_locks+0x9e/0xe0 [ 2192.720604] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2192.720625] neigh_connected_output+0x382/0x4d0 [ 2192.720655] ip_finish_output2+0x6f1/0x21f0 [ 2192.726638] ? nf_hook_slow+0xfc/0x1e0 [ 2192.727122] ? ip_frag_next+0x9e0/0x9e0 [ 2192.727616] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2192.728233] __ip_finish_output.part.0+0x5f3/0xb50 [ 2192.728895] ? ip_fragment.constprop.0+0x240/0x240 [ 2192.729513] ? netif_rx_ni+0xe7/0x300 [ 2192.730013] ip_mc_output+0x401/0xa30 [ 2192.730510] ip_send_skb+0xdd/0x260 [ 2192.730992] udp_send_skb+0x6da/0x11d0 [ 2192.731508] udp_sendmsg+0x139a/0x2160 [ 2192.731993] ? mark_lock+0xf5/0x2df0 [ 2192.732484] ? ip_frag_init+0x350/0x350 [ 2192.732995] ? lock_chain_count+0x20/0x20 [ 2192.733564] ? udp_setsockopt+0xc0/0xc0 [ 2192.734111] ? mark_lock+0xf5/0x2df0 [ 2192.734627] ? lock_acquire+0x197/0x470 [ 2192.735172] ? lock_chain_count+0x20/0x20 [ 2192.735744] ? mark_lock+0xf5/0x2df0 [ 2192.736251] ? mark_lock+0xf5/0x2df0 [ 2192.736792] ? lock_chain_count+0x20/0x20 [ 2192.737353] ? __lock_acquire+0xbb1/0x5b00 [ 2192.737937] ? lock_chain_count+0x20/0x20 [ 2192.738514] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.739208] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.739741] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2192.740275] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.740935] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.741450] ? mark_lock+0xf5/0x2df0 [ 2192.741935] ? lock_acquire+0x197/0x470 [ 2192.742436] ? find_held_lock+0x2c/0x110 [ 2192.742970] ? __might_fault+0xd3/0x180 [ 2192.743467] ? lock_downgrade+0x6d0/0x6d0 [ 2192.743988] ? lock_downgrade+0x6d0/0x6d0 [ 2192.744517] ? sock_has_perm+0x1ea/0x280 [ 2192.745022] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2192.745667] ? _copy_from_user+0xfb/0x1b0 [ 2192.746185] ? __import_iovec+0x458/0x590 [ 2192.746704] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.747337] inet6_sendmsg+0x105/0x140 [ 2192.747823] ? inet6_compat_ioctl+0x320/0x320 [ 2192.748387] __sock_sendmsg+0xf2/0x190 [ 2192.748879] ____sys_sendmsg+0x70d/0x870 [ 2192.749380] ? sock_write_iter+0x3d0/0x3d0 [ 2192.749908] ? do_recvmmsg+0x6d0/0x6d0 [ 2192.750387] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.750893] ? lock_downgrade+0x6d0/0x6d0 [ 2192.751404] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.752056] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.752601] ___sys_sendmsg+0xf3/0x170 [ 2192.753089] ? sendmsg_copy_msghdr+0x160/0x160 [ 2192.753664] ? __fget_files+0x2cf/0x520 [ 2192.754151] ? lock_downgrade+0x6d0/0x6d0 [ 2192.754671] ? find_held_lock+0x2c/0x110 [ 2192.755175] ? __fget_files+0x2f8/0x520 [ 2192.755680] ? __fget_light+0xea/0x290 [ 2192.756162] __sys_sendmsg+0xe5/0x1b0 [ 2192.756684] ? __sys_sendmsg_sock+0x40/0x40 [ 2192.757215] ? rcu_read_lock_any_held+0x75/0xa0 [ 2192.757810] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2192.758453] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2192.759095] ? trace_hardirqs_on+0x5b/0x180 [ 2192.759635] do_syscall_64+0x33/0x40 [ 2192.760095] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2192.760774] RIP: 0033:0x7f6082bd7b19 [ 2192.761237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.763512] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.764476] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2192.765356] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2192.766235] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.767115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.767995] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 [ 2192.768934] CPU: 0 PID: 10367 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2192.769891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2192.770974] Call Trace: [ 2192.771328] dump_stack+0x107/0x167 [ 2192.771818] should_fail.cold+0x5/0xa [ 2192.772337] ? create_object.isra.0+0x3a/0xa20 [ 2192.772943] should_failslab+0x5/0x20 [ 2192.773441] kmem_cache_alloc+0x5b/0x310 [ 2192.773976] create_object.isra.0+0x3a/0xa20 [ 2192.774548] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2192.775211] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2192.775876] ? skb_segment+0x9d8/0x3aa0 [ 2192.776432] __alloc_skb+0xb1/0x5b0 [ 2192.776922] skb_segment+0x9d8/0x3aa0 [ 2192.777422] ? __lock_acquire+0xbb1/0x5b00 [ 2192.777998] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2192.778657] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.779337] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.779877] __udp_gso_segment+0x11c6/0x1830 [ 2192.780478] ? __sk_receive_skb+0x830/0x830 [ 2192.781051] udp4_ufo_fragment+0x528/0x720 [ 2192.781608] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2192.782262] inet_gso_segment+0x4fb/0x11a0 [ 2192.782824] skb_mac_gso_segment+0x273/0x570 [ 2192.783398] ? inet_sock_destruct+0x840/0x840 [ 2192.783982] ? skb_network_protocol+0x650/0x650 [ 2192.784605] ? skb_crc32c_csum_help+0x80/0x80 [ 2192.785191] ? lock_acquire+0x197/0x470 [ 2192.785709] ? __dev_queue_xmit+0x1c6/0x2690 [ 2192.786288] __skb_gso_segment+0x32d/0x6d0 [ 2192.786838] ? mark_lock+0xf5/0x2df0 [ 2192.787338] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2192.788020] ? lock_chain_count+0x20/0x20 [ 2192.788579] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2192.789177] __dev_queue_xmit+0x825/0x2690 [ 2192.789736] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2192.790406] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2192.791019] ? mark_held_locks+0x9e/0xe0 [ 2192.791556] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2192.792243] neigh_connected_output+0x382/0x4d0 [ 2192.792877] ip_finish_output2+0x6f1/0x21f0 [ 2192.793445] ? nf_hook_slow+0xfc/0x1e0 [ 2192.793958] ? ip_frag_next+0x9e0/0x9e0 [ 2192.794478] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2192.795133] __ip_finish_output.part.0+0x5f3/0xb50 [ 2192.795777] ? ip_fragment.constprop.0+0x240/0x240 [ 2192.796435] ? netif_rx_ni+0xe7/0x300 [ 2192.796936] ip_mc_output+0x401/0xa30 [ 2192.797437] ip_send_skb+0xdd/0x260 [ 2192.797915] udp_send_skb+0x6da/0x11d0 [ 2192.798429] udp_sendmsg+0x139a/0x2160 [ 2192.798936] ? mark_lock+0xf5/0x2df0 [ 2192.799421] ? ip_frag_init+0x350/0x350 [ 2192.799942] ? lock_chain_count+0x20/0x20 [ 2192.800503] ? udp_setsockopt+0xc0/0xc0 [ 2192.801021] ? mark_lock+0xf5/0x2df0 [ 2192.801504] ? lock_acquire+0x197/0x470 [ 2192.802025] ? lock_chain_count+0x20/0x20 [ 2192.802565] ? mark_lock+0xf5/0x2df0 [ 2192.803054] ? mark_lock+0xf5/0x2df0 [ 2192.803538] ? lock_chain_count+0x20/0x20 [ 2192.804090] ? __lock_acquire+0xbb1/0x5b00 [ 2192.804672] ? lock_chain_count+0x20/0x20 [ 2192.805221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.805903] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.806443] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2192.806990] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.807664] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.808195] ? mark_lock+0xf5/0x2df0 [ 2192.808705] ? lock_acquire+0x197/0x470 [ 2192.809219] ? find_held_lock+0x2c/0x110 [ 2192.809756] ? __might_fault+0xd3/0x180 [ 2192.810273] ? lock_downgrade+0x6d0/0x6d0 [ 2192.810819] ? lock_downgrade+0x6d0/0x6d0 [ 2192.811363] ? sock_has_perm+0x1ea/0x280 [ 2192.811895] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2192.812611] ? _copy_from_user+0xfb/0x1b0 [ 2192.813165] ? __import_iovec+0x458/0x590 [ 2192.813706] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.814385] inet6_sendmsg+0x105/0x140 [ 2192.814893] ? inet6_compat_ioctl+0x320/0x320 [ 2192.815482] __sock_sendmsg+0xf2/0x190 [ 2192.815994] ____sys_sendmsg+0x70d/0x870 [ 2192.816551] ? sock_write_iter+0x3d0/0x3d0 [ 2192.817099] ? do_recvmmsg+0x6d0/0x6d0 [ 2192.817613] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.818139] ? lock_downgrade+0x6d0/0x6d0 [ 2192.818688] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.819371] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.819908] ___sys_sendmsg+0xf3/0x170 [ 2192.820434] ? sendmsg_copy_msghdr+0x160/0x160 [ 2192.821039] ? __fget_files+0x2cf/0x520 [ 2192.821559] ? lock_downgrade+0x6d0/0x6d0 [ 2192.822104] ? find_held_lock+0x2c/0x110 [ 2192.822641] ? __fget_files+0x2f8/0x520 [ 2192.823175] ? __fget_light+0xea/0x290 [ 2192.823689] __sys_sendmsg+0xe5/0x1b0 [ 2192.824189] ? __sys_sendmsg_sock+0x40/0x40 [ 2192.824769] ? rcu_read_lock_any_held+0x75/0xa0 [ 2192.825390] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2192.826073] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2192.826746] ? trace_hardirqs_on+0x5b/0x180 [ 2192.827309] do_syscall_64+0x33/0x40 [ 2192.827796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2192.828480] RIP: 0033:0x7f251a6f7b19 [ 2192.828971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.831355] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.832358] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2192.833283] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2192.834210] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.835139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.836066] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2192.842906] FAULT_INJECTION: forcing a failure. [ 2192.842906] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.844357] CPU: 1 PID: 10381 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2192.845232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2192.846269] Call Trace: [ 2192.846602] dump_stack+0x107/0x167 [ 2192.847059] should_fail.cold+0x5/0xa [ 2192.847540] should_failslab+0x5/0x20 [ 2192.848013] __kmalloc_node_track_caller+0x74/0x3b0 [ 2192.848647] ? skb_segment+0x9d8/0x3aa0 [ 2192.849145] __alloc_skb+0xb1/0x5b0 [ 2192.849871] skb_segment+0x9d8/0x3aa0 [ 2192.850346] ? __lock_acquire+0xbb1/0x5b00 [ 2192.850893] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2192.851507] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.852145] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.853782] __udp_gso_segment+0x11c6/0x1830 [ 2192.854325] ? __sk_receive_skb+0x830/0x830 [ 2192.854861] udp4_ufo_fragment+0x528/0x720 [ 2192.855383] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2192.855994] inet_gso_segment+0x4fb/0x11a0 09:48:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 40) [ 2192.856554] skb_mac_gso_segment+0x273/0x570 [ 2192.876686] ? inet_sock_destruct+0x840/0x840 [ 2192.877256] ? skb_network_protocol+0x650/0x650 [ 2192.877854] ? skb_crc32c_csum_help+0x80/0x80 [ 2192.878422] ? lock_acquire+0x197/0x470 [ 2192.878934] ? __dev_queue_xmit+0x1c6/0x2690 [ 2192.879511] __skb_gso_segment+0x32d/0x6d0 [ 2192.880056] ? mark_lock+0xf5/0x2df0 [ 2192.880566] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2192.881242] ? lock_chain_count+0x20/0x20 [ 2192.881777] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2192.882364] __dev_queue_xmit+0x825/0x2690 [ 2192.882923] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2192.883592] ? netdev_core_pick_tx+0x2f0/0x2f0 09:48:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x80000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2192.884184] ? mark_held_locks+0x9e/0xe0 [ 2192.884746] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2192.887962] neigh_connected_output+0x382/0x4d0 [ 2192.888599] ip_finish_output2+0x6f1/0x21f0 [ 2192.889133] ? nf_hook_slow+0xfc/0x1e0 [ 2192.889613] ? ip_frag_next+0x9e0/0x9e0 [ 2192.890100] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2192.890718] __ip_finish_output.part.0+0x5f3/0xb50 [ 2192.891321] ? ip_fragment.constprop.0+0x240/0x240 [ 2192.891922] ? netif_rx_ni+0xe7/0x300 [ 2192.892438] ip_mc_output+0x401/0xa30 [ 2192.892921] ip_send_skb+0xdd/0x260 [ 2192.893380] udp_send_skb+0x6da/0x11d0 [ 2192.893877] udp_sendmsg+0x139a/0x2160 [ 2192.894364] ? mark_lock+0xf5/0x2df0 [ 2192.894831] ? ip_frag_init+0x350/0x350 [ 2192.895329] ? lock_chain_count+0x20/0x20 [ 2192.895850] ? udp_setsockopt+0xc0/0xc0 [ 2192.900367] ? mark_lock+0xf5/0x2df0 [ 2192.900828] ? lock_acquire+0x197/0x470 [ 2192.901323] ? lock_chain_count+0x20/0x20 [ 2192.901835] ? mark_lock+0xf5/0x2df0 [ 2192.902294] ? mark_lock+0xf5/0x2df0 [ 2192.902753] ? lock_chain_count+0x20/0x20 [ 2192.903260] ? __lock_acquire+0xbb1/0x5b00 [ 2192.903779] ? lock_chain_count+0x20/0x20 [ 2192.904308] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.904953] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.905460] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2192.905971] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.906605] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.907107] ? mark_lock+0xf5/0x2df0 [ 2192.907568] ? lock_acquire+0x197/0x470 [ 2192.908055] ? find_held_lock+0x2c/0x110 [ 2192.908581] ? __might_fault+0xd3/0x180 [ 2192.909069] ? lock_downgrade+0x6d0/0x6d0 [ 2192.909580] ? lock_downgrade+0x6d0/0x6d0 [ 2192.910091] ? sock_has_perm+0x1ea/0x280 [ 2192.910589] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2192.911229] ? _copy_from_user+0xfb/0x1b0 [ 2192.911746] ? __import_iovec+0x458/0x590 [ 2192.912256] ? udp_v6_push_pending_frames+0x360/0x360 [ 2192.912909] inet6_sendmsg+0x105/0x140 [ 2192.913387] ? inet6_compat_ioctl+0x320/0x320 [ 2192.913936] __sock_sendmsg+0xf2/0x190 [ 2192.914414] ____sys_sendmsg+0x70d/0x870 [ 2192.914913] ? sock_write_iter+0x3d0/0x3d0 [ 2192.915436] ? do_recvmmsg+0x6d0/0x6d0 [ 2192.915916] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.916435] ? lock_downgrade+0x6d0/0x6d0 [ 2192.916947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2192.917591] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.918091] ___sys_sendmsg+0xf3/0x170 [ 2192.918571] ? sendmsg_copy_msghdr+0x160/0x160 [ 2192.919136] ? __fget_files+0x2cf/0x520 [ 2192.919622] ? lock_downgrade+0x6d0/0x6d0 [ 2192.920131] ? find_held_lock+0x2c/0x110 [ 2192.920664] ? __fget_files+0x2f8/0x520 [ 2192.921158] ? __fget_light+0xea/0x290 [ 2192.921642] __sys_sendmsg+0xe5/0x1b0 [ 2192.922110] ? __sys_sendmsg_sock+0x40/0x40 [ 2192.922638] ? rcu_read_lock_any_held+0x75/0xa0 [ 2192.923222] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2192.923866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2192.924517] ? trace_hardirqs_on+0x5b/0x180 [ 2192.925048] do_syscall_64+0x33/0x40 [ 2192.925507] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2192.926136] RIP: 0033:0x7f3f9ec55b19 [ 2192.926594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.928864] RSP: 002b:00007f3f9c1aa188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.929799] RAX: ffffffffffffffda RBX: 00007f3f9ed69020 RCX: 00007f3f9ec55b19 [ 2192.930671] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2192.931543] RBP: 00007f3f9c1aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.932443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.933316] R13: 00007ffc3dc4976f R14: 00007f3f9c1aa300 R15: 0000000000022000 09:48:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2193.015323] FAULT_INJECTION: forcing a failure. [ 2193.015323] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.017063] CPU: 0 PID: 10384 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2193.017976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.019078] Call Trace: [ 2193.019433] dump_stack+0x107/0x167 [ 2193.019926] should_fail.cold+0x5/0xa [ 2193.020471] ? create_object.isra.0+0x3a/0xa20 [ 2193.021089] should_failslab+0x5/0x20 [ 2193.021593] kmem_cache_alloc+0x5b/0x310 [ 2193.022132] create_object.isra.0+0x3a/0xa20 [ 2193.022709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2193.023378] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2193.024051] ? skb_segment+0x9d8/0x3aa0 [ 2193.024616] __alloc_skb+0xb1/0x5b0 [ 2193.025116] skb_segment+0x9d8/0x3aa0 [ 2193.025648] ? __lock_acquire+0xbb1/0x5b00 [ 2193.026253] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2193.026921] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.027616] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.028157] __udp_gso_segment+0x11c6/0x1830 [ 2193.028761] ? __sk_receive_skb+0x830/0x830 [ 2193.029334] udp4_ufo_fragment+0x528/0x720 [ 2193.029904] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2193.030565] inet_gso_segment+0x4fb/0x11a0 [ 2193.031135] skb_mac_gso_segment+0x273/0x570 [ 2193.031728] ? inet_sock_destruct+0x840/0x840 [ 2193.032332] ? skb_network_protocol+0x650/0x650 [ 2193.032960] ? skb_crc32c_csum_help+0x80/0x80 [ 2193.033553] ? lock_acquire+0x197/0x470 [ 2193.034079] ? __dev_queue_xmit+0x1c6/0x2690 [ 2193.034667] __skb_gso_segment+0x32d/0x6d0 [ 2193.035226] ? mark_lock+0xf5/0x2df0 [ 2193.035721] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2193.036434] ? lock_chain_count+0x20/0x20 [ 2193.036980] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2193.037586] __dev_queue_xmit+0x825/0x2690 [ 2193.038150] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2193.038829] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2193.039451] ? mark_held_locks+0x9e/0xe0 [ 2193.039992] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2193.040710] neigh_connected_output+0x382/0x4d0 [ 2193.041333] ip_finish_output2+0x6f1/0x21f0 [ 2193.041905] ? nf_hook_slow+0xfc/0x1e0 [ 2193.042418] ? ip_frag_next+0x9e0/0x9e0 [ 2193.042942] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2193.043606] __ip_finish_output.part.0+0x5f3/0xb50 [ 2193.044286] ? ip_fragment.constprop.0+0x240/0x240 [ 2193.044970] ? netif_rx_ni+0xe7/0x300 [ 2193.045496] ip_mc_output+0x401/0xa30 [ 2193.046025] ip_send_skb+0xdd/0x260 [ 2193.046517] udp_send_skb+0x6da/0x11d0 [ 2193.047040] udp_sendmsg+0x139a/0x2160 [ 2193.047564] ? mark_lock+0xf5/0x2df0 [ 2193.048057] ? ip_frag_init+0x350/0x350 [ 2193.048603] ? lock_chain_count+0x20/0x20 [ 2193.049151] ? udp_setsockopt+0xc0/0xc0 [ 2193.049676] ? mark_lock+0xf5/0x2df0 [ 2193.050166] ? lock_acquire+0x197/0x470 [ 2193.050695] ? lock_chain_count+0x20/0x20 [ 2193.051247] ? mark_lock+0xf5/0x2df0 [ 2193.051750] ? mark_lock+0xf5/0x2df0 [ 2193.052241] ? lock_chain_count+0x20/0x20 [ 2193.052808] ? __lock_acquire+0xbb1/0x5b00 [ 2193.053373] ? lock_chain_count+0x20/0x20 [ 2193.053944] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.054631] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.055187] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2193.055755] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.056470] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.057007] ? mark_lock+0xf5/0x2df0 [ 2193.057518] ? lock_acquire+0x197/0x470 [ 2193.058051] ? find_held_lock+0x2c/0x110 [ 2193.058595] ? __might_fault+0xd3/0x180 [ 2193.059116] ? lock_downgrade+0x6d0/0x6d0 [ 2193.059664] ? lock_downgrade+0x6d0/0x6d0 [ 2193.060212] ? sock_has_perm+0x1ea/0x280 [ 2193.060768] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2193.061449] ? _copy_from_user+0xfb/0x1b0 [ 2193.062006] ? __import_iovec+0x458/0x590 [ 2193.062555] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.063239] inet6_sendmsg+0x105/0x140 [ 2193.063760] ? inet6_compat_ioctl+0x320/0x320 [ 2193.064363] __sock_sendmsg+0xf2/0x190 [ 2193.064881] ____sys_sendmsg+0x70d/0x870 [ 2193.065419] ? sock_write_iter+0x3d0/0x3d0 [ 2193.065977] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.066499] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.067033] ? lock_downgrade+0x6d0/0x6d0 [ 2193.067582] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.068279] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.068825] ___sys_sendmsg+0xf3/0x170 [ 2193.069342] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.069948] ? __fget_files+0x2cf/0x520 [ 2193.070474] ? lock_downgrade+0x6d0/0x6d0 [ 2193.071020] ? find_held_lock+0x2c/0x110 [ 2193.071582] ? __fget_files+0x2f8/0x520 [ 2193.072114] ? __fget_light+0xea/0x290 [ 2193.072664] __sys_sendmsg+0xe5/0x1b0 [ 2193.073166] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.073745] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.074370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.075071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.075763] ? trace_hardirqs_on+0x5b/0x180 [ 2193.076353] do_syscall_64+0x33/0x40 [ 2193.076854] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2193.077529] RIP: 0033:0x7f6082bd7b19 [ 2193.078030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.080481] RSP: 002b:00007f608014d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.081485] RAX: ffffffffffffffda RBX: 00007f6082ceaf60 RCX: 00007f6082bd7b19 [ 2193.082425] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000005 [ 2193.083369] RBP: 00007f608014d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.084325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.085269] R13: 00007ffcb87b7aff R14: 00007f608014d300 R15: 0000000000022000 09:48:24 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 41) 09:48:24 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 40) 09:48:24 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x40081271, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2193.150732] FAULT_INJECTION: forcing a failure. [ 2193.150732] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.152242] CPU: 1 PID: 10393 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2193.153213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.168318] Call Trace: [ 2193.168679] dump_stack+0x107/0x167 [ 2193.169146] should_fail.cold+0x5/0xa [ 2193.169667] should_failslab+0x5/0x20 [ 2193.170197] __kmalloc_node_track_caller+0x74/0x3b0 [ 2193.170892] ? skb_segment+0x9d8/0x3aa0 [ 2193.171401] ? __alloc_skb+0x30a/0x5b0 [ 2193.171911] __alloc_skb+0xb1/0x5b0 [ 2193.176460] skb_segment+0x9d8/0x3aa0 [ 2193.177027] ? __lock_acquire+0xbb1/0x5b00 [ 2193.177642] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2193.178328] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.179012] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.179568] __udp_gso_segment+0x11c6/0x1830 [ 2193.180165] ? __sk_receive_skb+0x830/0x830 [ 2193.180783] udp4_ufo_fragment+0x528/0x720 [ 2193.181366] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2193.182033] inet_gso_segment+0x4fb/0x11a0 [ 2193.182604] skb_mac_gso_segment+0x273/0x570 [ 2193.183183] ? inet_sock_destruct+0x840/0x840 [ 2193.183792] ? skb_network_protocol+0x650/0x650 [ 2193.184472] ? skb_crc32c_csum_help+0x80/0x80 [ 2193.185081] ? lock_acquire+0x197/0x470 [ 2193.185621] ? __dev_queue_xmit+0x1c6/0x2690 [ 2193.186227] __skb_gso_segment+0x32d/0x6d0 [ 2193.186811] ? mark_lock+0xf5/0x2df0 [ 2193.187289] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2193.187952] ? lock_chain_count+0x20/0x20 [ 2193.188527] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2193.189150] __dev_queue_xmit+0x825/0x2690 [ 2193.189741] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2193.190431] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2193.191023] ? mark_held_locks+0x9e/0xe0 [ 2193.191550] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2193.192266] neigh_connected_output+0x382/0x4d0 [ 2193.192960] ip_finish_output2+0x6f1/0x21f0 [ 2193.193562] ? nf_hook_slow+0xfc/0x1e0 [ 2193.194089] ? ip_frag_next+0x9e0/0x9e0 [ 2193.194594] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2193.195267] __ip_finish_output.part.0+0x5f3/0xb50 [ 2193.195927] ? ip_fragment.constprop.0+0x240/0x240 [ 2193.196641] ? netif_rx_ni+0xe7/0x300 [ 2193.197168] ip_mc_output+0x401/0xa30 [ 2193.197685] ip_send_skb+0xdd/0x260 [ 2193.198159] udp_send_skb+0x6da/0x11d0 [ 2193.198664] udp_sendmsg+0x139a/0x2160 [ 2193.199185] ? mark_lock+0xf5/0x2df0 [ 2193.199652] ? ip_frag_init+0x350/0x350 [ 2193.200151] ? lock_chain_count+0x20/0x20 [ 2193.200715] ? udp_setsockopt+0xc0/0xc0 [ 2193.201237] ? mark_lock+0xf5/0x2df0 [ 2193.201755] ? lock_acquire+0x197/0x470 [ 2193.202300] ? lock_chain_count+0x20/0x20 [ 2193.202865] ? mark_lock+0xf5/0x2df0 [ 2193.203387] ? mark_lock+0xf5/0x2df0 [ 2193.203902] ? lock_chain_count+0x20/0x20 [ 2193.204513] ? __lock_acquire+0xbb1/0x5b00 [ 2193.205077] ? lock_chain_count+0x20/0x20 [ 2193.205631] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.206361] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.206946] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2193.207503] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.208079] FAULT_INJECTION: forcing a failure. [ 2193.208079] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.208204] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.208228] ? mark_lock+0xf5/0x2df0 [ 2193.210720] ? lock_acquire+0x197/0x470 [ 2193.211263] ? find_held_lock+0x2c/0x110 [ 2193.211836] ? __might_fault+0xd3/0x180 [ 2193.212409] ? lock_downgrade+0x6d0/0x6d0 [ 2193.212988] ? lock_downgrade+0x6d0/0x6d0 [ 2193.213566] ? sock_has_perm+0x1ea/0x280 [ 2193.214113] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2193.214816] ? _copy_from_user+0xfb/0x1b0 [ 2193.215368] ? __import_iovec+0x458/0x590 [ 2193.215942] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.217217] inet6_sendmsg+0x105/0x140 [ 2193.218283] ? inet6_compat_ioctl+0x320/0x320 [ 2193.219517] __sock_sendmsg+0xf2/0x190 [ 2193.220504] ____sys_sendmsg+0x70d/0x870 [ 2193.221077] ? sock_write_iter+0x3d0/0x3d0 [ 2193.221668] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.222207] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.222777] ? lock_downgrade+0x6d0/0x6d0 [ 2193.223352] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.224081] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.224712] ___sys_sendmsg+0xf3/0x170 [ 2193.225251] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.225897] ? __fget_files+0x2cf/0x520 [ 2193.226446] ? lock_downgrade+0x6d0/0x6d0 [ 2193.227036] ? find_held_lock+0x2c/0x110 [ 2193.227612] ? __fget_files+0x2f8/0x520 [ 2193.228165] ? __fget_light+0xea/0x290 [ 2193.228747] __sys_sendmsg+0xe5/0x1b0 [ 2193.229273] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.229877] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.230533] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.231259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.231969] ? trace_hardirqs_on+0x5b/0x180 [ 2193.232597] do_syscall_64+0x33/0x40 [ 2193.233115] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2193.233832] RIP: 0033:0x7f3f9ec55b19 [ 2193.234313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.236764] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.237795] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2193.238737] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2193.239702] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.240664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.241624] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2193.242633] CPU: 0 PID: 10399 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2193.243560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.244673] Call Trace: [ 2193.245028] dump_stack+0x107/0x167 [ 2193.245507] should_fail.cold+0x5/0xa [ 2193.246012] ? trace_hardirqs_on+0x5b/0x180 [ 2193.246636] ? __alloc_skb+0x6d/0x5b0 [ 2193.247138] should_failslab+0x5/0x20 [ 2193.247637] kmem_cache_alloc_node+0x55/0x330 [ 2193.248225] __alloc_skb+0x6d/0x5b0 [ 2193.248734] skb_segment+0x9d8/0x3aa0 [ 2193.249235] ? __lock_acquire+0xbb1/0x5b00 [ 2193.249815] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2193.250468] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.251148] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.251685] __udp_gso_segment+0x11c6/0x1830 [ 2193.252258] ? __sk_receive_skb+0x830/0x830 [ 2193.252850] udp4_ufo_fragment+0x528/0x720 [ 2193.253407] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2193.254057] inet_gso_segment+0x4fb/0x11a0 [ 2193.254621] skb_mac_gso_segment+0x273/0x570 [ 2193.255195] ? inet_sock_destruct+0x840/0x840 [ 2193.255778] ? skb_network_protocol+0x650/0x650 [ 2193.256457] ? skb_crc32c_csum_help+0x80/0x80 [ 2193.257056] ? lock_acquire+0x197/0x470 [ 2193.257575] ? __dev_queue_xmit+0x1c6/0x2690 [ 2193.258155] __skb_gso_segment+0x32d/0x6d0 [ 2193.258708] ? mark_lock+0xf5/0x2df0 [ 2193.259199] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2193.259884] ? lock_chain_count+0x20/0x20 [ 2193.260627] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2193.261263] __dev_queue_xmit+0x825/0x2690 [ 2193.261826] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2193.262499] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2193.263104] ? mark_held_locks+0x9e/0xe0 [ 2193.263639] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2193.264410] neigh_connected_output+0x382/0x4d0 [ 2193.265035] ip_finish_output2+0x6f1/0x21f0 [ 2193.265604] ? nf_hook_slow+0xfc/0x1e0 [ 2193.266115] ? ip_frag_next+0x9e0/0x9e0 [ 2193.266639] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2193.267299] __ip_finish_output.part.0+0x5f3/0xb50 [ 2193.267950] ? ip_fragment.constprop.0+0x240/0x240 [ 2193.268642] ? netif_rx_ni+0xe7/0x300 [ 2193.269157] ip_mc_output+0x401/0xa30 [ 2193.269672] ip_send_skb+0xdd/0x260 [ 2193.270164] udp_send_skb+0x6da/0x11d0 [ 2193.270688] udp_sendmsg+0x139a/0x2160 [ 2193.271196] ? mark_lock+0xf5/0x2df0 [ 2193.271688] ? ip_frag_init+0x350/0x350 [ 2193.272207] ? lock_chain_count+0x20/0x20 [ 2193.272769] ? udp_setsockopt+0xc0/0xc0 [ 2193.273286] ? mark_lock+0xf5/0x2df0 [ 2193.273777] ? lock_acquire+0x197/0x470 [ 2193.274303] ? lock_chain_count+0x20/0x20 [ 2193.274851] ? mark_lock+0xf5/0x2df0 [ 2193.275340] ? mark_lock+0xf5/0x2df0 [ 2193.275830] ? lock_chain_count+0x20/0x20 [ 2193.276430] ? __lock_acquire+0xbb1/0x5b00 [ 2193.276988] ? lock_chain_count+0x20/0x20 [ 2193.277543] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.278229] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.278771] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2193.279316] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.279988] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.280546] ? mark_lock+0xf5/0x2df0 [ 2193.281037] ? lock_acquire+0x197/0x470 [ 2193.281558] ? find_held_lock+0x2c/0x110 [ 2193.282093] ? __might_fault+0xd3/0x180 [ 2193.282617] ? lock_downgrade+0x6d0/0x6d0 [ 2193.283170] ? lock_downgrade+0x6d0/0x6d0 [ 2193.283717] ? sock_has_perm+0x1ea/0x280 [ 2193.284248] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2193.284944] ? _copy_from_user+0xfb/0x1b0 [ 2193.285497] ? __import_iovec+0x458/0x590 [ 2193.286041] ? udp_v6_push_pending_frames+0x360/0x360 [ 2193.286721] inet6_sendmsg+0x105/0x140 [ 2193.287233] ? inet6_compat_ioctl+0x320/0x320 [ 2193.287822] __sock_sendmsg+0xf2/0x190 [ 2193.288346] ____sys_sendmsg+0x70d/0x870 [ 2193.288882] ? sock_write_iter+0x3d0/0x3d0 [ 2193.289434] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.289947] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.290477] ? lock_downgrade+0x6d0/0x6d0 [ 2193.291021] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2193.291705] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.292239] ___sys_sendmsg+0xf3/0x170 [ 2193.292765] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.293369] ? __fget_files+0x2cf/0x520 [ 2193.293891] ? lock_downgrade+0x6d0/0x6d0 [ 2193.294435] ? find_held_lock+0x2c/0x110 [ 2193.294977] ? __fget_files+0x2f8/0x520 [ 2193.295506] ? __fget_light+0xea/0x290 [ 2193.296022] __sys_sendmsg+0xe5/0x1b0 [ 2193.296579] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.297144] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.297769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.298456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.299126] ? trace_hardirqs_on+0x5b/0x180 [ 2193.299693] do_syscall_64+0x33/0x40 [ 2193.300180] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2193.300881] RIP: 0033:0x7f251a6f7b19 [ 2193.301370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.303767] RSP: 002b:00007f2517c4c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.304785] RAX: ffffffffffffffda RBX: 00007f251a80b020 RCX: 00007f251a6f7b19 [ 2193.305715] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2193.306644] RBP: 00007f2517c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.307577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.308530] R13: 00007ffd117a841f R14: 00007f2517c4c300 R15: 0000000000022000 09:48:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x1000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:48:39 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 41) 09:48:39 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:39 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:39 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 41) 09:48:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x2000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 42) [ 2208.761779] FAULT_INJECTION: forcing a failure. [ 2208.761779] name failslab, interval 1, probability 0, space 0, times 0 [ 2208.763238] CPU: 0 PID: 10420 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2208.764103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2208.765168] Call Trace: [ 2208.765517] dump_stack+0x107/0x167 [ 2208.765984] should_fail.cold+0x5/0xa [ 2208.766472] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2208.767132] ? create_object.isra.0+0x3a/0xa20 [ 2208.767711] should_failslab+0x5/0x20 [ 2208.768188] kmem_cache_alloc+0x5b/0x310 [ 2208.768708] ? mark_held_locks+0x9e/0xe0 [ 2208.769295] create_object.isra.0+0x3a/0xa20 [ 2208.769891] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2208.770611] kmem_cache_alloc_node+0x169/0x330 [ 2208.771262] __alloc_skb+0x6d/0x5b0 [ 2208.771787] skb_segment+0x9d8/0x3aa0 [ 2208.772325] ? __lock_acquire+0xbb1/0x5b00 [ 2208.772952] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2208.773592] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2208.774250] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.774772] __udp_gso_segment+0x11c6/0x1830 [ 2208.775324] ? __sk_receive_skb+0x830/0x830 [ 2208.775882] udp4_ufo_fragment+0x528/0x720 [ 2208.776443] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2208.777411] inet_gso_segment+0x4fb/0x11a0 [ 2208.778522] skb_mac_gso_segment+0x273/0x570 [ 2208.779664] ? inet_sock_destruct+0x840/0x840 [ 2208.781962] ? skb_network_protocol+0x650/0x650 [ 2208.783109] ? skb_crc32c_csum_help+0x80/0x80 [ 2208.784209] ? lock_acquire+0x197/0x470 [ 2208.785081] ? __dev_queue_xmit+0x1c6/0x2690 [ 2208.785672] __skb_gso_segment+0x32d/0x6d0 [ 2208.786240] ? mark_lock+0xf5/0x2df0 [ 2208.786723] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2208.787427] ? lock_chain_count+0x20/0x20 [ 2208.788019] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2208.788670] __dev_queue_xmit+0x825/0x2690 [ 2208.789340] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2208.790048] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2208.790638] ? mark_held_locks+0x9e/0xe0 [ 2208.791157] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2208.791826] neigh_connected_output+0x382/0x4d0 [ 2208.792420] ip_finish_output2+0x6f1/0x21f0 [ 2208.793082] ? nf_hook_slow+0xfc/0x1e0 [ 2208.793612] ? ip_frag_next+0x9e0/0x9e0 [ 2208.794145] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2208.794789] __ip_finish_output.part.0+0x5f3/0xb50 [ 2208.795405] ? ip_fragment.constprop.0+0x240/0x240 [ 2208.796034] ? netif_rx_ni+0xe7/0x300 [ 2208.796523] ip_mc_output+0x401/0xa30 [ 2208.797059] ip_send_skb+0xdd/0x260 [ 2208.797539] udp_send_skb+0x6da/0x11d0 [ 2208.798076] udp_sendmsg+0x139a/0x2160 [ 2208.798578] ? mark_lock+0xf5/0x2df0 [ 2208.799054] ? ip_frag_init+0x350/0x350 [ 2208.799568] ? lock_chain_count+0x20/0x20 [ 2208.800100] ? udp_setsockopt+0xc0/0xc0 [ 2208.800627] ? mark_lock+0xf5/0x2df0 [ 2208.801194] ? lock_acquire+0x197/0x470 [ 2208.801742] ? lock_chain_count+0x20/0x20 [ 2208.802288] ? mark_lock+0xf5/0x2df0 [ 2208.802775] ? mark_lock+0xf5/0x2df0 [ 2208.803025] FAULT_INJECTION: forcing a failure. [ 2208.803025] name failslab, interval 1, probability 0, space 0, times 0 [ 2208.803278] ? lock_chain_count+0x20/0x20 [ 2208.803298] ? __lock_acquire+0xbb1/0x5b00 [ 2208.805815] ? lock_chain_count+0x20/0x20 [ 2208.806348] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2208.807011] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.807536] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2208.808063] ? udp_v6_push_pending_frames+0x360/0x360 [ 2208.808740] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.809306] ? mark_lock+0xf5/0x2df0 [ 2208.809787] ? lock_acquire+0x197/0x470 [ 2208.810278] ? find_held_lock+0x2c/0x110 [ 2208.810834] ? __might_fault+0xd3/0x180 [ 2208.811334] ? lock_downgrade+0x6d0/0x6d0 [ 2208.811867] ? lock_downgrade+0x6d0/0x6d0 [ 2208.812389] ? sock_has_perm+0x1ea/0x280 [ 2208.812953] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2208.813622] ? _copy_from_user+0xfb/0x1b0 [ 2208.814163] ? __import_iovec+0x458/0x590 [ 2208.814701] ? udp_v6_push_pending_frames+0x360/0x360 [ 2208.815348] inet6_sendmsg+0x105/0x140 [ 2208.815851] ? inet6_compat_ioctl+0x320/0x320 [ 2208.816413] __sock_sendmsg+0xf2/0x190 [ 2208.816934] ____sys_sendmsg+0x70d/0x870 [ 2208.817460] ? sock_write_iter+0x3d0/0x3d0 [ 2208.818000] ? do_recvmmsg+0x6d0/0x6d0 [ 2208.818493] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.819009] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2208.819688] ? asm_sysvec_call_function_single+0x12/0x20 [ 2208.820368] ? trace_hardirqs_on+0x5b/0x180 [ 2208.820971] ___sys_sendmsg+0xf3/0x170 [ 2208.821480] ? sendmsg_copy_msghdr+0x160/0x160 [ 2208.822069] ? __fget_files+0x2cf/0x520 [ 2208.822580] ? lock_downgrade+0x6d0/0x6d0 [ 2208.823107] ? find_held_lock+0x2c/0x110 [ 2208.823637] ? __fget_files+0x2f8/0x520 [ 2208.824154] ? __fget_light+0xea/0x290 [ 2208.824666] __sys_sendmsg+0xe5/0x1b0 [ 2208.825207] ? __sys_sendmsg_sock+0x40/0x40 [ 2208.825813] ? rcu_read_lock_any_held+0x75/0xa0 [ 2208.826467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2208.827170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2208.827862] ? trace_hardirqs_on+0x5b/0x180 [ 2208.828444] do_syscall_64+0x33/0x40 [ 2208.829001] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2208.829703] RIP: 0033:0x7f251a6f7b19 [ 2208.830205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2208.832593] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2208.833638] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2208.834546] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2208.835472] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2208.836389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2208.837343] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2208.838281] CPU: 1 PID: 10423 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2208.839228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2208.840259] Call Trace: [ 2208.840605] dump_stack+0x107/0x167 [ 2208.841250] should_fail.cold+0x5/0xa [ 2208.842199] ? trace_hardirqs_on+0x5b/0x180 [ 2208.843268] ? __alloc_skb+0x6d/0x5b0 [ 2208.844214] should_failslab+0x5/0x20 [ 2208.845059] kmem_cache_alloc_node+0x55/0x330 [ 2208.845631] __alloc_skb+0x6d/0x5b0 [ 2208.846100] skb_segment+0x9d8/0x3aa0 [ 2208.846587] ? __lock_acquire+0xbb1/0x5b00 [ 2208.847157] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2208.847790] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2208.848447] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.849008] __udp_gso_segment+0x11c6/0x1830 [ 2208.849558] ? __sk_receive_skb+0x830/0x830 [ 2208.850104] udp4_ufo_fragment+0x528/0x720 [ 2208.850648] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2208.851273] inet_gso_segment+0x4fb/0x11a0 [ 2208.851821] skb_mac_gso_segment+0x273/0x570 [ 2208.852378] ? inet_sock_destruct+0x840/0x840 [ 2208.852966] ? skb_network_protocol+0x650/0x650 [ 2208.853557] ? skb_crc32c_csum_help+0x80/0x80 [ 2208.854122] ? lock_acquire+0x197/0x470 [ 2208.854624] ? __dev_queue_xmit+0x1c6/0x2690 [ 2208.855183] __skb_gso_segment+0x32d/0x6d0 [ 2208.855719] ? mark_lock+0xf5/0x2df0 [ 2208.856192] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2208.856870] ? lock_chain_count+0x20/0x20 [ 2208.857419] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2208.857991] __dev_queue_xmit+0x825/0x2690 [ 2208.858536] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2208.859192] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2208.859791] ? mark_held_locks+0x9e/0xe0 [ 2208.860310] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2208.861010] neigh_connected_output+0x382/0x4d0 [ 2208.861609] ip_finish_output2+0x6f1/0x21f0 [ 2208.862149] ? nf_hook_slow+0xfc/0x1e0 [ 2208.862651] ? ip_frag_next+0x9e0/0x9e0 [ 2208.863157] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2208.863811] __ip_finish_output.part.0+0x5f3/0xb50 [ 2208.864432] ? ip_fragment.constprop.0+0x240/0x240 [ 2208.865084] ? netif_rx_ni+0xe7/0x300 [ 2208.865577] ip_mc_output+0x401/0xa30 [ 2208.866067] ip_send_skb+0xdd/0x260 [ 2208.866537] udp_send_skb+0x6da/0x11d0 [ 2208.867043] udp_sendmsg+0x139a/0x2160 [ 2208.867537] ? mark_lock+0xf5/0x2df0 [ 2208.868011] ? ip_frag_init+0x350/0x350 [ 2208.868526] ? lock_chain_count+0x20/0x20 [ 2208.869086] ? udp_setsockopt+0xc0/0xc0 [ 2208.869597] ? mark_lock+0xf5/0x2df0 [ 2208.870069] ? lock_acquire+0x197/0x470 [ 2208.870577] ? lock_chain_count+0x20/0x20 [ 2208.871103] ? mark_lock+0xf5/0x2df0 [ 2208.871581] ? mark_lock+0xf5/0x2df0 [ 2208.872057] ? lock_chain_count+0x20/0x20 [ 2208.872602] ? __lock_acquire+0xbb1/0x5b00 [ 2208.873156] ? lock_chain_count+0x20/0x20 [ 2208.873705] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2208.874388] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.874943] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2208.875484] ? udp_v6_push_pending_frames+0x360/0x360 [ 2208.876145] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.876679] ? mark_lock+0xf5/0x2df0 [ 2208.877183] ? lock_acquire+0x197/0x470 [ 2208.877690] ? find_held_lock+0x2c/0x110 [ 2208.878213] ? __might_fault+0xd3/0x180 [ 2208.878736] ? lock_downgrade+0x6d0/0x6d0 [ 2208.879281] ? lock_downgrade+0x6d0/0x6d0 [ 2208.879818] ? sock_has_perm+0x1ea/0x280 [ 2208.880351] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2208.881028] ? _copy_from_user+0xfb/0x1b0 [ 2208.881556] ? __import_iovec+0x458/0x590 [ 2208.882074] ? udp_v6_push_pending_frames+0x360/0x360 [ 2208.882723] inet6_sendmsg+0x105/0x140 [ 2208.883218] ? inet6_compat_ioctl+0x320/0x320 [ 2208.883785] __sock_sendmsg+0xf2/0x190 [ 2208.884279] ____sys_sendmsg+0x70d/0x870 [ 2208.884799] ? sock_write_iter+0x3d0/0x3d0 [ 2208.885347] ? do_recvmmsg+0x6d0/0x6d0 [ 2208.885851] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.886371] ? lock_downgrade+0x6d0/0x6d0 [ 2208.886917] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2208.887599] ? SOFTIRQ_verbose+0x10/0x10 [ 2208.888121] ___sys_sendmsg+0xf3/0x170 [ 2208.888621] ? sendmsg_copy_msghdr+0x160/0x160 [ 2208.889221] ? __fget_files+0x2cf/0x520 [ 2208.889730] ? lock_downgrade+0x6d0/0x6d0 [ 2208.890256] ? find_held_lock+0x2c/0x110 [ 2208.890783] ? __fget_files+0x2f8/0x520 [ 2208.891285] ? __fget_light+0xea/0x290 [ 2208.891791] __sys_sendmsg+0xe5/0x1b0 [ 2208.892266] ? __sys_sendmsg_sock+0x40/0x40 [ 2208.892814] ? rcu_read_lock_any_held+0x75/0xa0 [ 2208.893439] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2208.894106] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2208.894760] ? trace_hardirqs_on+0x5b/0x180 [ 2208.895310] do_syscall_64+0x33/0x40 [ 2208.895784] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2208.896442] RIP: 0033:0x7f3f9ec55b19 [ 2208.896950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2208.899255] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2208.900221] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2208.901140] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2208.902031] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2208.902926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2208.903807] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:48:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:48:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x3000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:40 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:40 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:40 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 43) 09:48:40 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 42) [ 2209.204797] FAULT_INJECTION: forcing a failure. [ 2209.204797] name failslab, interval 1, probability 0, space 0, times 0 [ 2209.206429] CPU: 0 PID: 10456 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2209.207356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2209.208520] Call Trace: [ 2209.208914] dump_stack+0x107/0x167 [ 2209.209422] should_fail.cold+0x5/0xa [ 2209.209791] FAULT_INJECTION: forcing a failure. [ 2209.209791] name failslab, interval 1, probability 0, space 0, times 0 [ 2209.209949] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2209.209972] ? create_object.isra.0+0x3a/0xa20 [ 2209.212705] should_failslab+0x5/0x20 [ 2209.213246] kmem_cache_alloc+0x5b/0x310 [ 2209.213805] ? mark_held_locks+0x9e/0xe0 [ 2209.214360] create_object.isra.0+0x3a/0xa20 [ 2209.214964] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2209.215669] kmem_cache_alloc_node+0x169/0x330 [ 2209.216298] __alloc_skb+0x6d/0x5b0 [ 2209.216810] skb_segment+0x9d8/0x3aa0 [ 2209.217337] ? __lock_acquire+0xbb1/0x5b00 [ 2209.217958] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2209.218649] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.219357] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.219923] __udp_gso_segment+0x11c6/0x1830 [ 2209.220523] ? __sk_receive_skb+0x830/0x830 [ 2209.221156] udp4_ufo_fragment+0x528/0x720 [ 2209.221745] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2209.222422] inet_gso_segment+0x4fb/0x11a0 [ 2209.223018] skb_mac_gso_segment+0x273/0x570 [ 2209.223623] ? inet_sock_destruct+0x840/0x840 [ 2209.224230] ? skb_network_protocol+0x650/0x650 [ 2209.224878] ? skb_crc32c_csum_help+0x80/0x80 [ 2209.225497] ? lock_acquire+0x197/0x470 [ 2209.226043] ? __dev_queue_xmit+0x1c6/0x2690 [ 2209.226653] __skb_gso_segment+0x32d/0x6d0 [ 2209.227227] ? mark_lock+0xf5/0x2df0 [ 2209.227747] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2209.228464] ? lock_chain_count+0x20/0x20 [ 2209.229062] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2209.229694] __dev_queue_xmit+0x825/0x2690 [ 2209.230274] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2209.230983] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2209.231619] ? mark_held_locks+0x9e/0xe0 [ 2209.232178] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2209.232910] neigh_connected_output+0x382/0x4d0 [ 2209.233567] ip_finish_output2+0x6f1/0x21f0 [ 2209.234165] ? nf_hook_slow+0xfc/0x1e0 [ 2209.234707] ? ip_frag_next+0x9e0/0x9e0 [ 2209.235249] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2209.235944] __ip_finish_output.part.0+0x5f3/0xb50 [ 2209.236619] ? ip_fragment.constprop.0+0x240/0x240 [ 2209.237310] ? netif_rx_ni+0xe7/0x300 [ 2209.237846] ip_mc_output+0x401/0xa30 [ 2209.238369] ip_send_skb+0xdd/0x260 [ 2209.238877] udp_send_skb+0x6da/0x11d0 [ 2209.239420] udp_sendmsg+0x139a/0x2160 [ 2209.239960] ? mark_lock+0xf5/0x2df0 [ 2209.240474] ? ip_frag_init+0x350/0x350 [ 2209.241041] ? lock_chain_count+0x20/0x20 [ 2209.241620] ? udp_setsockopt+0xc0/0xc0 [ 2209.242159] ? mark_lock+0xf5/0x2df0 [ 2209.242674] ? lock_acquire+0x197/0x470 [ 2209.243219] ? lock_chain_count+0x20/0x20 [ 2209.243796] ? mark_lock+0xf5/0x2df0 [ 2209.244306] ? mark_lock+0xf5/0x2df0 [ 2209.244819] ? lock_chain_count+0x20/0x20 [ 2209.245406] ? __lock_acquire+0xbb1/0x5b00 [ 2209.245996] ? lock_chain_count+0x20/0x20 [ 2209.246581] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.247298] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.247880] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2209.248452] ? udp_v6_push_pending_frames+0x360/0x360 [ 2209.249177] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.249748] ? mark_lock+0xf5/0x2df0 [ 2209.250270] ? lock_acquire+0x197/0x470 [ 2209.250825] ? find_held_lock+0x2c/0x110 [ 2209.251389] ? __might_fault+0xd3/0x180 [ 2209.251943] ? lock_downgrade+0x6d0/0x6d0 [ 2209.252511] ? lock_downgrade+0x6d0/0x6d0 [ 2209.253104] ? sock_has_perm+0x1ea/0x280 [ 2209.253664] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2209.254368] ? _copy_from_user+0xfb/0x1b0 [ 2209.254958] ? __import_iovec+0x458/0x590 [ 2209.255534] ? udp_v6_push_pending_frames+0x360/0x360 [ 2209.256250] inet6_sendmsg+0x105/0x140 [ 2209.256802] ? inet6_compat_ioctl+0x320/0x320 [ 2209.257434] __sock_sendmsg+0xf2/0x190 [ 2209.257972] ____sys_sendmsg+0x70d/0x870 [ 2209.258530] ? sock_write_iter+0x3d0/0x3d0 [ 2209.259109] ? do_recvmmsg+0x6d0/0x6d0 [ 2209.259649] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.260197] ? lock_downgrade+0x6d0/0x6d0 [ 2209.260773] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.261509] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.262072] ___sys_sendmsg+0xf3/0x170 [ 2209.262615] ? sendmsg_copy_msghdr+0x160/0x160 [ 2209.263250] ? __fget_files+0x2cf/0x520 [ 2209.263804] ? lock_downgrade+0x6d0/0x6d0 [ 2209.264374] ? find_held_lock+0x2c/0x110 [ 2209.264969] ? __fget_files+0x2f8/0x520 [ 2209.265522] ? __fget_light+0xea/0x290 [ 2209.266070] __sys_sendmsg+0xe5/0x1b0 [ 2209.266602] ? __sys_sendmsg_sock+0x40/0x40 [ 2209.267193] ? rcu_read_lock_any_held+0x75/0xa0 [ 2209.267853] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2209.268574] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2209.269295] ? trace_hardirqs_on+0x5b/0x180 [ 2209.269894] do_syscall_64+0x33/0x40 [ 2209.270400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2209.271103] RIP: 0033:0x7f3f9ec55b19 [ 2209.271624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2209.274118] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2209.275155] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2209.276130] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2209.277126] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2209.278097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2209.279071] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2209.280077] CPU: 1 PID: 10452 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2209.281050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2209.282100] Call Trace: [ 2209.282448] dump_stack+0x107/0x167 [ 2209.282923] should_fail.cold+0x5/0xa [ 2209.283417] should_failslab+0x5/0x20 [ 2209.283906] __kmalloc_node_track_caller+0x74/0x3b0 [ 2209.284538] ? skb_segment+0x9d8/0x3aa0 [ 2209.285064] __alloc_skb+0xb1/0x5b0 [ 2209.285534] skb_segment+0x9d8/0x3aa0 [ 2209.286028] ? __lock_acquire+0xbb1/0x5b00 [ 2209.286609] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2209.287243] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.287907] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.288430] __udp_gso_segment+0x11c6/0x1830 [ 2209.289029] ? __sk_receive_skb+0x830/0x830 [ 2209.289590] udp4_ufo_fragment+0x528/0x720 [ 2209.290133] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2209.290772] inet_gso_segment+0x4fb/0x11a0 [ 2209.291323] skb_mac_gso_segment+0x273/0x570 [ 2209.291888] ? inet_sock_destruct+0x840/0x840 [ 2209.292453] ? skb_network_protocol+0x650/0x650 [ 2209.293062] ? skb_crc32c_csum_help+0x80/0x80 [ 2209.293627] ? lock_acquire+0x197/0x470 [ 2209.294134] ? __dev_queue_xmit+0x1c6/0x2690 [ 2209.294695] __skb_gso_segment+0x32d/0x6d0 [ 2209.295237] ? mark_lock+0xf5/0x2df0 [ 2209.295714] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2209.296374] ? lock_chain_count+0x20/0x20 [ 2209.296917] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2209.297499] __dev_queue_xmit+0x825/0x2690 [ 2209.298041] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2209.298695] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2209.299282] ? mark_held_locks+0x9e/0xe0 [ 2209.299807] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2209.300474] neigh_connected_output+0x382/0x4d0 [ 2209.301117] ip_finish_output2+0x6f1/0x21f0 [ 2209.301681] ? nf_hook_slow+0xfc/0x1e0 [ 2209.302188] ? ip_frag_next+0x9e0/0x9e0 [ 2209.302699] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2209.303339] __ip_finish_output.part.0+0x5f3/0xb50 [ 2209.303967] ? ip_fragment.constprop.0+0x240/0x240 [ 2209.304588] ? netif_rx_ni+0xe7/0x300 [ 2209.305107] ip_mc_output+0x401/0xa30 [ 2209.305596] ip_send_skb+0xdd/0x260 [ 2209.306059] udp_send_skb+0x6da/0x11d0 [ 2209.306567] udp_sendmsg+0x139a/0x2160 [ 2209.307055] ? mark_lock+0xf5/0x2df0 [ 2209.307530] ? ip_frag_init+0x350/0x350 [ 2209.308036] ? lock_chain_count+0x20/0x20 [ 2209.308565] ? udp_setsockopt+0xc0/0xc0 [ 2209.309085] ? mark_lock+0xf5/0x2df0 [ 2209.309563] ? lock_acquire+0x197/0x470 [ 2209.310072] ? lock_chain_count+0x20/0x20 [ 2209.310601] ? mark_lock+0xf5/0x2df0 [ 2209.311080] ? mark_lock+0xf5/0x2df0 [ 2209.311554] ? lock_chain_count+0x20/0x20 [ 2209.312079] ? __lock_acquire+0xbb1/0x5b00 [ 2209.312622] ? lock_chain_count+0x20/0x20 [ 2209.313179] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.313841] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.314370] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2209.314915] ? udp_v6_push_pending_frames+0x360/0x360 [ 2209.315567] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.316086] ? mark_lock+0xf5/0x2df0 [ 2209.316568] ? lock_acquire+0x197/0x470 [ 2209.317085] ? find_held_lock+0x2c/0x110 [ 2209.317597] ? __might_fault+0xd3/0x180 [ 2209.318098] ? lock_downgrade+0x6d0/0x6d0 [ 2209.318628] ? lock_downgrade+0x6d0/0x6d0 [ 2209.319156] ? sock_has_perm+0x1ea/0x280 [ 2209.319675] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2209.320330] ? _copy_from_user+0xfb/0x1b0 [ 2209.320879] ? __import_iovec+0x458/0x590 [ 2209.321412] ? udp_v6_push_pending_frames+0x360/0x360 [ 2209.322070] inet6_sendmsg+0x105/0x140 [ 2209.322568] ? inet6_compat_ioctl+0x320/0x320 [ 2209.323136] __sock_sendmsg+0xf2/0x190 [ 2209.323635] ____sys_sendmsg+0x70d/0x870 [ 2209.324151] ? sock_write_iter+0x3d0/0x3d0 [ 2209.324686] ? do_recvmmsg+0x6d0/0x6d0 [ 2209.325206] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.325721] ? lock_downgrade+0x6d0/0x6d0 [ 2209.326247] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2209.326910] ? SOFTIRQ_verbose+0x10/0x10 [ 2209.327432] ___sys_sendmsg+0xf3/0x170 [ 2209.327925] ? sendmsg_copy_msghdr+0x160/0x160 [ 2209.328498] ? __fget_files+0x2cf/0x520 [ 2209.329019] ? lock_downgrade+0x6d0/0x6d0 [ 2209.329544] ? find_held_lock+0x2c/0x110 [ 2209.330069] ? __fget_files+0x2f8/0x520 [ 2209.330582] ? __fget_light+0xea/0x290 [ 2209.331079] __sys_sendmsg+0xe5/0x1b0 [ 2209.331569] ? __sys_sendmsg_sock+0x40/0x40 [ 2209.332115] ? rcu_read_lock_any_held+0x75/0xa0 [ 2209.332721] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2209.333404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2209.334053] ? trace_hardirqs_on+0x5b/0x180 [ 2209.334602] do_syscall_64+0x33/0x40 [ 2209.335075] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2209.335721] RIP: 0033:0x7f251a6f7b19 [ 2209.336196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2209.338497] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2209.339449] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2209.340341] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2209.341253] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2209.342145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2209.343041] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:48:56 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:48:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:48:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 44) 09:48:56 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 43) 09:48:56 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:48:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:48:56 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:48:56 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2224.924682] FAULT_INJECTION: forcing a failure. [ 2224.924682] name failslab, interval 1, probability 0, space 0, times 0 [ 2224.926293] CPU: 0 PID: 10485 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2224.927280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2224.928467] Call Trace: [ 2224.928859] dump_stack+0x107/0x167 [ 2224.929389] should_fail.cold+0x5/0xa [ 2224.929941] ? create_object.isra.0+0x3a/0xa20 [ 2224.930608] should_failslab+0x5/0x20 [ 2224.931180] kmem_cache_alloc+0x5b/0x310 [ 2224.931784] create_object.isra.0+0x3a/0xa20 [ 2224.932427] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 09:48:56 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2224.933171] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2224.942116] ? skb_segment+0x9d8/0x3aa0 [ 2224.942700] __alloc_skb+0xb1/0x5b0 [ 2224.943263] skb_segment+0x9d8/0x3aa0 [ 2224.943837] ? __lock_acquire+0xbb1/0x5b00 [ 2224.944444] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2224.945120] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2224.945839] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.946405] __udp_gso_segment+0x11c6/0x1830 [ 2224.947009] ? __sk_receive_skb+0x830/0x830 [ 2224.947596] udp4_ufo_fragment+0x528/0x720 [ 2224.948194] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2224.948880] inet_gso_segment+0x4fb/0x11a0 [ 2224.949508] skb_mac_gso_segment+0x273/0x570 [ 2224.950114] ? inet_sock_destruct+0x840/0x840 [ 2224.950768] ? skb_network_protocol+0x650/0x650 [ 2224.951404] ? skb_crc32c_csum_help+0x80/0x80 [ 2224.952023] ? lock_acquire+0x197/0x470 [ 2224.952557] ? __dev_queue_xmit+0x1c6/0x2690 [ 2224.953126] __skb_gso_segment+0x32d/0x6d0 [ 2224.953728] ? mark_lock+0xf5/0x2df0 [ 2224.954258] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2224.955027] ? lock_chain_count+0x20/0x20 [ 2224.955616] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2224.956240] __dev_queue_xmit+0x825/0x2690 [ 2224.956821] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2224.957589] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2224.958274] ? mark_held_locks+0x9e/0xe0 [ 2224.958860] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2224.959615] neigh_connected_output+0x382/0x4d0 [ 2224.960270] ip_finish_output2+0x6f1/0x21f0 [ 2224.960897] ? nf_hook_slow+0xfc/0x1e0 [ 2224.965509] ? ip_frag_next+0x9e0/0x9e0 [ 2224.966083] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2224.966807] __ip_finish_output.part.0+0x5f3/0xb50 [ 2224.967510] ? ip_fragment.constprop.0+0x240/0x240 [ 2224.968211] ? netif_rx_ni+0xe7/0x300 [ 2224.968773] ip_mc_output+0x401/0xa30 [ 2224.969337] ip_send_skb+0xdd/0x260 [ 2224.969900] udp_send_skb+0x6da/0x11d0 [ 2224.970476] udp_sendmsg+0x139a/0x2160 [ 2224.971010] ? mark_lock+0xf5/0x2df0 [ 2224.971544] ? ip_frag_init+0x350/0x350 [ 2224.972127] ? lock_chain_count+0x20/0x20 [ 2224.972737] ? udp_setsockopt+0xc0/0xc0 [ 2224.973313] ? mark_lock+0xf5/0x2df0 [ 2224.973853] ? lock_acquire+0x197/0x470 [ 2224.974367] ? lock_chain_count+0x20/0x20 [ 2224.974939] ? mark_lock+0xf5/0x2df0 [ 2224.975480] ? mark_lock+0xf5/0x2df0 [ 2224.976022] ? lock_chain_count+0x20/0x20 [ 2224.976616] ? __lock_acquire+0xbb1/0x5b00 [ 2224.977196] ? lock_chain_count+0x20/0x20 [ 2224.977835] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2224.978544] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.979128] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2224.979722] ? udp_v6_push_pending_frames+0x360/0x360 [ 2224.980447] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.981017] ? mark_lock+0xf5/0x2df0 [ 2224.981536] ? lock_acquire+0x197/0x470 [ 2224.982046] ? find_held_lock+0x2c/0x110 [ 2224.982589] ? __might_fault+0xd3/0x180 [ 2224.983105] ? lock_downgrade+0x6d0/0x6d0 [ 2224.983640] ? lock_downgrade+0x6d0/0x6d0 [ 2224.984181] ? sock_has_perm+0x1ea/0x280 [ 2224.984711] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2224.985411] ? _copy_from_user+0xfb/0x1b0 [ 2224.990157] ? __import_iovec+0x458/0x590 [ 2224.990766] ? udp_v6_push_pending_frames+0x360/0x360 [ 2224.991496] inet6_sendmsg+0x105/0x140 [ 2224.992045] ? inet6_compat_ioctl+0x320/0x320 [ 2224.992647] __sock_sendmsg+0xf2/0x190 [ 2224.993203] ____sys_sendmsg+0x70d/0x870 [ 2224.993821] ? sock_write_iter+0x3d0/0x3d0 [ 2224.994398] ? do_recvmmsg+0x6d0/0x6d0 [ 2224.994943] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.995492] ? lock_downgrade+0x6d0/0x6d0 [ 2224.996080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2224.996821] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.997405] ___sys_sendmsg+0xf3/0x170 [ 2224.998001] ? sendmsg_copy_msghdr+0x160/0x160 [ 2224.998686] ? __fget_files+0x2cf/0x520 [ 2224.999263] ? lock_downgrade+0x6d0/0x6d0 [ 2224.999848] ? find_held_lock+0x2c/0x110 [ 2225.000444] ? __fget_files+0x2f8/0x520 [ 2225.001028] ? __fget_light+0xea/0x290 [ 2225.001625] __sys_sendmsg+0xe5/0x1b0 [ 2225.002178] ? __sys_sendmsg_sock+0x40/0x40 [ 2225.002799] ? rcu_read_lock_any_held+0x75/0xa0 [ 2225.003450] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2225.004205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2225.004937] ? trace_hardirqs_on+0x5b/0x180 [ 2225.005581] do_syscall_64+0x33/0x40 [ 2225.006111] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2225.006853] RIP: 0033:0x7f251a6f7b19 [ 2225.007361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2225.013904] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2225.014995] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2225.016009] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2225.016999] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2225.018021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2225.019023] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2225.045842] FAULT_INJECTION: forcing a failure. [ 2225.045842] name failslab, interval 1, probability 0, space 0, times 0 [ 2225.047252] CPU: 1 PID: 10484 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2225.048104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2225.049119] Call Trace: [ 2225.049459] dump_stack+0x107/0x167 [ 2225.049917] should_fail.cold+0x5/0xa [ 2225.050393] should_failslab+0x5/0x20 [ 2225.050870] __kmalloc_node_track_caller+0x74/0x3b0 [ 2225.051483] ? skb_segment+0x9d8/0x3aa0 [ 2225.051978] __alloc_skb+0xb1/0x5b0 [ 2225.052430] skb_segment+0x9d8/0x3aa0 [ 2225.052902] ? __lock_acquire+0xbb1/0x5b00 [ 2225.053465] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2225.054108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2225.054751] ? SOFTIRQ_verbose+0x10/0x10 [ 2225.055268] __udp_gso_segment+0x11c6/0x1830 [ 2225.055821] ? __sk_receive_skb+0x830/0x830 [ 2225.056359] udp4_ufo_fragment+0x528/0x720 [ 2225.056883] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2225.057525] inet_gso_segment+0x4fb/0x11a0 [ 2225.058054] skb_mac_gso_segment+0x273/0x570 [ 2225.058591] ? inet_sock_destruct+0x840/0x840 [ 2225.059136] ? skb_network_protocol+0x650/0x650 [ 2225.059700] ? skb_crc32c_csum_help+0x80/0x80 [ 2225.060246] ? lock_acquire+0x197/0x470 [ 2225.060729] ? __dev_queue_xmit+0x1c6/0x2690 [ 2225.061268] __skb_gso_segment+0x32d/0x6d0 [ 2225.065824] ? mark_lock+0xf5/0x2df0 [ 2225.066285] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2225.077893] ? lock_chain_count+0x20/0x20 [ 2225.078416] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2225.078977] __dev_queue_xmit+0x825/0x2690 [ 2225.079500] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2225.080131] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2225.080696] ? mark_held_locks+0x9e/0xe0 [ 2225.081195] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2225.081865] neigh_connected_output+0x382/0x4d0 [ 2225.082444] ip_finish_output2+0x6f1/0x21f0 [ 2225.082975] ? nf_hook_slow+0xfc/0x1e0 [ 2225.083451] ? ip_frag_next+0x9e0/0x9e0 [ 2225.083936] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2225.084552] __ip_finish_output.part.0+0x5f3/0xb50 [ 2225.085152] ? ip_fragment.constprop.0+0x240/0x240 [ 2225.085766] ? netif_rx_ni+0xe7/0x300 [ 2225.086237] ip_mc_output+0x401/0xa30 [ 2225.086708] ip_send_skb+0xdd/0x260 [ 2225.087158] udp_send_skb+0x6da/0x11d0 [ 2225.087644] udp_sendmsg+0x139a/0x2160 [ 2225.088118] ? mark_lock+0xf5/0x2df0 [ 2225.088574] ? ip_frag_init+0x350/0x350 [ 2225.089062] ? lock_chain_count+0x20/0x20 [ 2225.093560] ? udp_setsockopt+0xc0/0xc0 [ 2225.094046] ? mark_lock+0xf5/0x2df0 [ 2225.094507] ? lock_acquire+0x197/0x470 [ 2225.095000] ? lock_chain_count+0x20/0x20 [ 2225.095507] ? mark_lock+0xf5/0x2df0 [ 2225.095967] ? mark_lock+0xf5/0x2df0 [ 2225.096424] ? lock_chain_count+0x20/0x20 [ 2225.096936] ? __lock_acquire+0xbb1/0x5b00 [ 2225.097462] ? lock_chain_count+0x20/0x20 [ 2225.097991] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2225.098632] ? SOFTIRQ_verbose+0x10/0x10 [ 2225.099141] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2225.099652] ? udp_v6_push_pending_frames+0x360/0x360 [ 2225.100284] ? SOFTIRQ_verbose+0x10/0x10 [ 2225.100786] ? mark_lock+0xf5/0x2df0 [ 2225.101249] ? lock_acquire+0x197/0x470 [ 2225.101763] ? find_held_lock+0x2c/0x110 [ 2225.102267] ? __might_fault+0xd3/0x180 [ 2225.102758] ? lock_downgrade+0x6d0/0x6d0 [ 2225.103267] ? lock_downgrade+0x6d0/0x6d0 [ 2225.103785] ? sock_has_perm+0x1ea/0x280 [ 2225.104281] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2225.104916] ? _copy_from_user+0xfb/0x1b0 [ 2225.105446] ? __import_iovec+0x458/0x590 [ 2225.105984] ? udp_v6_push_pending_frames+0x360/0x360 [ 2225.106622] inet6_sendmsg+0x105/0x140 [ 2225.107100] ? inet6_compat_ioctl+0x320/0x320 [ 2225.107652] __sock_sendmsg+0xf2/0x190 [ 2225.108130] ____sys_sendmsg+0x70d/0x870 [ 2225.108632] ? sock_write_iter+0x3d0/0x3d0 [ 2225.109151] ? do_recvmmsg+0x6d0/0x6d0 [ 2225.109647] ? SOFTIRQ_verbose+0x10/0x10 [ 2225.110143] ? lock_downgrade+0x6d0/0x6d0 [ 2225.110658] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2225.111296] ? SOFTIRQ_verbose+0x10/0x10 [ 2225.111794] ___sys_sendmsg+0xf3/0x170 [ 2225.112270] ? sendmsg_copy_msghdr+0x160/0x160 [ 2225.112832] ? __fget_files+0x2cf/0x520 [ 2225.113317] ? lock_downgrade+0x6d0/0x6d0 [ 2225.113837] ? find_held_lock+0x2c/0x110 [ 2225.125836] ? __fget_files+0x2f8/0x520 [ 2225.126330] ? __fget_light+0xea/0x290 [ 2225.126822] __sys_sendmsg+0xe5/0x1b0 [ 2225.127287] ? __sys_sendmsg_sock+0x40/0x40 [ 2225.127812] ? rcu_read_lock_any_held+0x75/0xa0 [ 2225.128392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2225.129032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2225.129678] ? trace_hardirqs_on+0x5b/0x180 [ 2225.130207] do_syscall_64+0x33/0x40 [ 2225.130664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2225.131289] RIP: 0033:0x7f3f9ec55b19 [ 2225.131745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2225.134005] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2225.134935] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2225.135811] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2225.136681] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2225.137578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2225.138448] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2240.686463] FAULT_INJECTION: forcing a failure. [ 2240.686463] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.688077] CPU: 1 PID: 10513 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2240.688937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2240.689957] Call Trace: [ 2240.690311] dump_stack+0x107/0x167 [ 2240.690763] should_fail.cold+0x5/0xa [ 2240.691236] ? create_object.isra.0+0x3a/0xa20 [ 2240.691804] should_failslab+0x5/0x20 [ 2240.692275] kmem_cache_alloc+0x5b/0x310 09:49:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x8000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:11 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:49:11 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 44) 09:49:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:11 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80081270, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 45) 09:49:11 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:11 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2240.692782] create_object.isra.0+0x3a/0xa20 [ 2240.702367] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2240.703025] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2240.703676] ? skb_segment+0x9d8/0x3aa0 [ 2240.704168] __alloc_skb+0xb1/0x5b0 [ 2240.704622] skb_segment+0x9d8/0x3aa0 [ 2240.705095] ? __lock_acquire+0xbb1/0x5b00 [ 2240.705648] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2240.706280] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2240.706929] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.707432] __udp_gso_segment+0x11c6/0x1830 [ 2240.707972] ? __sk_receive_skb+0x830/0x830 [ 2240.708510] udp4_ufo_fragment+0x528/0x720 [ 2240.709037] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2240.709671] inet_gso_segment+0x4fb/0x11a0 [ 2240.710230] skb_mac_gso_segment+0x273/0x570 [ 2240.710769] ? inet_sock_destruct+0x840/0x840 [ 2240.711320] ? skb_network_protocol+0x650/0x650 [ 2240.711885] ? skb_crc32c_csum_help+0x80/0x80 [ 2240.712438] ? lock_acquire+0x197/0x470 [ 2240.712924] ? __dev_queue_xmit+0x1c6/0x2690 [ 2240.713465] __skb_gso_segment+0x32d/0x6d0 09:49:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2240.713991] ? mark_lock+0xf5/0x2df0 [ 2240.714487] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2240.715139] ? lock_chain_count+0x20/0x20 [ 2240.715648] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2240.716214] __dev_queue_xmit+0x825/0x2690 [ 2240.716748] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2240.717397] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2240.722719] ? mark_held_locks+0x9e/0xe0 [ 2240.723231] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2240.723886] neigh_connected_output+0x382/0x4d0 [ 2240.724465] ip_finish_output2+0x6f1/0x21f0 [ 2240.725006] ? nf_hook_slow+0xfc/0x1e0 [ 2240.725490] ? ip_frag_next+0x9e0/0x9e0 [ 2240.725998] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2240.726629] __ip_finish_output.part.0+0x5f3/0xb50 [ 2240.727231] ? ip_fragment.constprop.0+0x240/0x240 [ 2240.727836] ? netif_rx_ni+0xe7/0x300 [ 2240.728307] ip_mc_output+0x401/0xa30 [ 2240.728784] ip_send_skb+0xdd/0x260 [ 2240.729235] udp_send_skb+0x6da/0x11d0 [ 2240.729721] udp_sendmsg+0x139a/0x2160 [ 2240.730211] ? mark_lock+0xf5/0x2df0 [ 2240.730674] ? ip_frag_init+0x350/0x350 [ 2240.731163] ? lock_chain_count+0x20/0x20 [ 2240.731683] ? udp_setsockopt+0xc0/0xc0 [ 2240.732167] ? mark_lock+0xf5/0x2df0 [ 2240.732644] ? lock_acquire+0x197/0x470 [ 2240.733134] ? lock_chain_count+0x20/0x20 [ 2240.733649] ? mark_lock+0xf5/0x2df0 [ 2240.734142] ? mark_lock+0xf5/0x2df0 [ 2240.734598] ? lock_chain_count+0x20/0x20 [ 2240.735104] ? __lock_acquire+0xbb1/0x5b00 [ 2240.735621] ? lock_chain_count+0x20/0x20 [ 2240.736138] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2240.736781] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.737288] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2240.737797] ? udp_v6_push_pending_frames+0x360/0x360 [ 2240.738456] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.738970] ? mark_lock+0xf5/0x2df0 [ 2240.739444] ? lock_acquire+0x197/0x470 [ 2240.739930] ? find_held_lock+0x2c/0x110 [ 2240.740433] ? __might_fault+0xd3/0x180 [ 2240.740922] ? lock_downgrade+0x6d0/0x6d0 [ 2240.741431] ? lock_downgrade+0x6d0/0x6d0 [ 2240.741946] ? sock_has_perm+0x1ea/0x280 [ 2240.742461] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2240.743110] ? _copy_from_user+0xfb/0x1b0 [ 2240.743639] ? __import_iovec+0x458/0x590 [ 2240.744151] ? udp_v6_push_pending_frames+0x360/0x360 [ 2240.744819] inet6_sendmsg+0x105/0x140 [ 2240.745321] ? inet6_compat_ioctl+0x320/0x320 [ 2240.745887] __sock_sendmsg+0xf2/0x190 [ 2240.750406] ____sys_sendmsg+0x70d/0x870 [ 2240.750910] ? sock_write_iter+0x3d0/0x3d0 [ 2240.751429] ? do_recvmmsg+0x6d0/0x6d0 [ 2240.751909] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.752410] ? lock_downgrade+0x6d0/0x6d0 [ 2240.752920] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2240.753558] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.754086] ___sys_sendmsg+0xf3/0x170 [ 2240.754573] ? sendmsg_copy_msghdr+0x160/0x160 [ 2240.755138] ? __fget_files+0x2cf/0x520 [ 2240.755633] ? lock_downgrade+0x6d0/0x6d0 [ 2240.756142] ? find_held_lock+0x2c/0x110 [ 2240.756650] ? __fget_files+0x2f8/0x520 [ 2240.757145] ? __fget_light+0xea/0x290 [ 2240.757631] __sys_sendmsg+0xe5/0x1b0 [ 2240.758164] ? __sys_sendmsg_sock+0x40/0x40 [ 2240.758694] ? rcu_read_lock_any_held+0x75/0xa0 [ 2240.759279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2240.759925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2240.760556] ? trace_hardirqs_on+0x5b/0x180 [ 2240.761085] do_syscall_64+0x33/0x40 [ 2240.761547] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2240.762205] RIP: 0033:0x7f3f9ec55b19 [ 2240.762674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2240.764927] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2240.765874] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2240.766806] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2240.767727] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2240.768676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2240.769620] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:49:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xa000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:12 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80081272, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2240.919113] FAULT_INJECTION: forcing a failure. [ 2240.919113] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.920637] CPU: 0 PID: 10530 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2240.921552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2240.922666] Call Trace: [ 2240.923021] dump_stack+0x107/0x167 [ 2240.923504] should_fail.cold+0x5/0xa [ 2240.924013] ? create_object.isra.0+0x3a/0xa20 [ 2240.924618] should_failslab+0x5/0x20 [ 2240.925123] kmem_cache_alloc+0x5b/0x310 [ 2240.925662] create_object.isra.0+0x3a/0xa20 [ 2240.930281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2240.930959] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2240.931629] ? skb_segment+0x9d8/0x3aa0 [ 2240.932155] __alloc_skb+0xb1/0x5b0 [ 2240.932644] skb_segment+0x9d8/0x3aa0 [ 2240.933147] ? __lock_acquire+0xbb1/0x5b00 [ 2240.933738] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2240.934441] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2240.935168] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.935745] __udp_gso_segment+0x11c6/0x1830 [ 2240.936354] ? __sk_receive_skb+0x830/0x830 [ 2240.936972] udp4_ufo_fragment+0x528/0x720 [ 2240.937571] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2240.938289] inet_gso_segment+0x4fb/0x11a0 [ 2240.938897] skb_mac_gso_segment+0x273/0x570 [ 2240.939508] ? inet_sock_destruct+0x840/0x840 [ 2240.940126] ? skb_network_protocol+0x650/0x650 [ 2240.940767] ? skb_crc32c_csum_help+0x80/0x80 [ 2240.941388] ? lock_acquire+0x197/0x470 [ 2240.941938] ? __dev_queue_xmit+0x1c6/0x2690 [ 2240.942570] __skb_gso_segment+0x32d/0x6d0 [ 2240.943159] ? mark_lock+0xf5/0x2df0 [ 2240.943674] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2240.944378] ? lock_chain_count+0x20/0x20 [ 2240.944934] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2240.945561] __dev_queue_xmit+0x825/0x2690 [ 2240.946284] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2240.946937] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2240.947520] ? mark_held_locks+0x9e/0xe0 [ 2240.948034] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2240.948698] neigh_connected_output+0x382/0x4d0 [ 2240.949292] ip_finish_output2+0x6f1/0x21f0 [ 2240.949837] ? nf_hook_slow+0xfc/0x1e0 [ 2240.950365] ? ip_frag_next+0x9e0/0x9e0 [ 2240.950892] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2240.951554] __ip_finish_output.part.0+0x5f3/0xb50 [ 2240.952200] ? ip_fragment.constprop.0+0x240/0x240 [ 2240.952850] ? netif_rx_ni+0xe7/0x300 [ 2240.953353] ip_mc_output+0x401/0xa30 [ 2240.953861] ip_send_skb+0xdd/0x260 [ 2240.954696] udp_send_skb+0x6da/0x11d0 [ 2240.955707] udp_sendmsg+0x139a/0x2160 [ 2240.956730] ? mark_lock+0xf5/0x2df0 [ 2240.957684] ? ip_frag_init+0x350/0x350 [ 2240.958790] ? lock_chain_count+0x20/0x20 [ 2240.959869] ? lock_chain_count+0x20/0x20 [ 2240.960945] ? mark_lock+0xf5/0x2df0 [ 2240.961890] ? udp_setsockopt+0xc0/0xc0 [ 2240.962966] ? mark_lock+0xf5/0x2df0 [ 2240.963932] ? lock_chain_count+0x20/0x20 [ 2240.965007] ? lock_chain_count+0x20/0x20 [ 2240.966118] ? lock_chain_count+0x20/0x20 [ 2240.974528] ? mark_lock+0xf5/0x2df0 [ 2240.975007] ? mark_lock+0xf5/0x2df0 [ 2240.975477] ? lock_chain_count+0x20/0x20 [ 2240.976002] ? lock_chain_count+0x20/0x20 [ 2240.976537] ? mark_lock+0xf5/0x2df0 [ 2240.977021] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2240.977548] ? udp_v6_push_pending_frames+0x360/0x360 [ 2240.978225] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.978743] ? mark_lock+0xf5/0x2df0 [ 2240.979221] ? lock_acquire+0x197/0x470 [ 2240.979724] ? find_held_lock+0x2c/0x110 [ 2240.980253] ? __might_fault+0xd3/0x180 [ 2240.980756] ? lock_downgrade+0x6d0/0x6d0 [ 2240.981282] ? lock_downgrade+0x6d0/0x6d0 [ 2240.981809] ? sock_has_perm+0x1ea/0x280 [ 2240.982380] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2240.983041] ? _copy_from_user+0xfb/0x1b0 [ 2240.983579] ? __import_iovec+0x458/0x590 [ 2240.984105] ? udp_v6_push_pending_frames+0x360/0x360 [ 2240.984766] inet6_sendmsg+0x105/0x140 [ 2240.985294] ? inet6_compat_ioctl+0x320/0x320 [ 2240.985904] __sock_sendmsg+0xf2/0x190 [ 2240.986447] ____sys_sendmsg+0x70d/0x870 [ 2240.987009] ? sock_write_iter+0x3d0/0x3d0 [ 2240.987554] ? do_recvmmsg+0x6d0/0x6d0 [ 2240.988056] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.988567] ? lock_downgrade+0x6d0/0x6d0 [ 2240.989095] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2240.989749] ? SOFTIRQ_verbose+0x10/0x10 [ 2240.990290] ___sys_sendmsg+0xf3/0x170 [ 2240.990781] ? sendmsg_copy_msghdr+0x160/0x160 [ 2240.991362] ? __fget_files+0x2cf/0x520 [ 2240.991863] ? lock_downgrade+0x6d0/0x6d0 [ 2240.992387] ? find_held_lock+0x2c/0x110 [ 2240.992908] ? __fget_files+0x2f8/0x520 [ 2240.993412] ? __fget_light+0xea/0x290 [ 2240.993909] __sys_sendmsg+0xe5/0x1b0 [ 2240.998419] ? __sys_sendmsg_sock+0x40/0x40 [ 2240.998967] ? rcu_read_lock_any_held+0x75/0xa0 [ 2240.999566] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2241.000228] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2241.000878] ? trace_hardirqs_on+0x5b/0x180 [ 2241.001422] do_syscall_64+0x33/0x40 [ 2241.001900] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2241.002572] RIP: 0033:0x7f251a6f7b19 [ 2241.003046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2241.005340] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2241.006345] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2241.007248] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2241.008155] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.009061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2241.009969] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:49:12 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 45) 09:49:12 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:49:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xe000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2241.142972] FAULT_INJECTION: forcing a failure. [ 2241.142972] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.144498] CPU: 0 PID: 10544 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2241.145412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2241.150550] Call Trace: [ 2241.150904] dump_stack+0x107/0x167 [ 2241.151385] should_fail.cold+0x5/0xa [ 2241.151885] ? trace_hardirqs_on+0x5b/0x180 [ 2241.152452] ? __alloc_skb+0x6d/0x5b0 [ 2241.152956] should_failslab+0x5/0x20 [ 2241.153469] kmem_cache_alloc_node+0x55/0x330 [ 2241.154072] __alloc_skb+0x6d/0x5b0 [ 2241.154558] skb_segment+0x9d8/0x3aa0 [ 2241.155062] ? __lock_acquire+0xbb1/0x5b00 [ 2241.155644] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2241.156309] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.156993] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.157534] __udp_gso_segment+0x11c6/0x1830 [ 2241.158118] ? __sk_receive_skb+0x830/0x830 [ 2241.158694] udp4_ufo_fragment+0x528/0x720 [ 2241.159254] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2241.159909] inet_gso_segment+0x4fb/0x11a0 [ 2241.160473] skb_mac_gso_segment+0x273/0x570 [ 2241.161050] ? inet_sock_destruct+0x840/0x840 [ 2241.161637] ? skb_network_protocol+0x650/0x650 [ 2241.166273] ? skb_crc32c_csum_help+0x80/0x80 [ 2241.166867] ? lock_acquire+0x197/0x470 [ 2241.167386] ? __dev_queue_xmit+0x1c6/0x2690 [ 2241.167971] __skb_gso_segment+0x32d/0x6d0 [ 2241.168535] ? mark_lock+0xf5/0x2df0 [ 2241.169038] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2241.169727] ? lock_chain_count+0x20/0x20 [ 2241.170284] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2241.170888] __dev_queue_xmit+0x825/0x2690 [ 2241.171453] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2241.172131] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2241.172741] ? mark_held_locks+0x9e/0xe0 [ 2241.173287] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2241.173986] neigh_connected_output+0x382/0x4d0 [ 2241.174622] ip_finish_output2+0x6f1/0x21f0 [ 2241.175188] ? nf_hook+0x3f3/0x510 [ 2241.175656] ? nf_hook+0x13c/0x510 [ 2241.176132] ? ip_frag_next+0x9e0/0x9e0 [ 2241.176658] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2241.177325] __ip_finish_output.part.0+0x5f3/0xb50 [ 2241.177975] ? ip_fragment.constprop.0+0x240/0x240 [ 2241.178658] ? netif_rx_ni+0xe7/0x300 [ 2241.179168] ip_mc_output+0x401/0xa30 [ 2241.179676] ip_send_skb+0xdd/0x260 [ 2241.180165] udp_send_skb+0x6da/0x11d0 [ 2241.180686] udp_sendmsg+0x139a/0x2160 [ 2241.181206] ? mark_lock+0xf5/0x2df0 [ 2241.181700] ? ip_frag_init+0x350/0x350 [ 2241.182235] ? lock_chain_count+0x20/0x20 [ 2241.182783] ? udp_setsockopt+0xc0/0xc0 [ 2241.183303] ? mark_lock+0xf5/0x2df0 [ 2241.183791] ? lock_acquire+0x197/0x470 [ 2241.184329] ? lock_chain_count+0x20/0x20 [ 2241.184872] ? mark_lock+0xf5/0x2df0 [ 2241.185364] ? mark_lock+0xf5/0x2df0 [ 2241.185853] ? lock_chain_count+0x20/0x20 [ 2241.190499] ? __lock_acquire+0xbb1/0x5b00 [ 2241.191057] ? lock_chain_count+0x20/0x20 [ 2241.191615] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.192301] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.192847] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2241.193394] ? udp_v6_push_pending_frames+0x360/0x360 [ 2241.194131] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.194748] ? mark_lock+0xf5/0x2df0 [ 2241.195244] ? lock_acquire+0x197/0x470 [ 2241.195837] ? find_held_lock+0x2c/0x110 [ 2241.196388] ? __might_fault+0xd3/0x180 [ 2241.196918] ? lock_downgrade+0x6d0/0x6d0 [ 2241.197499] ? lock_downgrade+0x6d0/0x6d0 [ 2241.198089] ? sock_has_perm+0x1ea/0x280 [ 2241.199180] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2241.200734] ? _copy_from_user+0xfb/0x1b0 [ 2241.201865] ? __import_iovec+0x458/0x590 [ 2241.203117] ? udp_v6_push_pending_frames+0x360/0x360 [ 2241.203827] inet6_sendmsg+0x105/0x140 [ 2241.204373] ? inet6_compat_ioctl+0x320/0x320 [ 2241.204999] __sock_sendmsg+0xf2/0x190 [ 2241.205567] ____sys_sendmsg+0x70d/0x870 [ 2241.206125] ? sock_write_iter+0x3d0/0x3d0 [ 2241.207224] ? do_recvmmsg+0x6d0/0x6d0 [ 2241.208238] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.209292] ? lock_downgrade+0x6d0/0x6d0 [ 2241.210243] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.210937] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.211492] ___sys_sendmsg+0xf3/0x170 [ 2241.212053] ? sendmsg_copy_msghdr+0x160/0x160 [ 2241.212667] ? __fget_files+0x2cf/0x520 [ 2241.213207] ? lock_downgrade+0x6d0/0x6d0 [ 2241.213756] ? find_held_lock+0x2c/0x110 [ 2241.214322] ? __fget_files+0x2f8/0x520 [ 2241.214859] ? __fget_light+0xea/0x290 [ 2241.215391] __sys_sendmsg+0xe5/0x1b0 [ 2241.215896] ? __sys_sendmsg_sock+0x40/0x40 [ 2241.216479] ? rcu_read_lock_any_held+0x75/0xa0 [ 2241.217118] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2241.217811] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2241.222555] ? trace_hardirqs_on+0x5b/0x180 [ 2241.223124] do_syscall_64+0x33/0x40 [ 2241.223618] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2241.224291] RIP: 0033:0x7f3f9ec55b19 [ 2241.224784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2241.227289] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2241.228348] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2241.229286] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2241.230262] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.231222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2241.232130] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:49:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 46) [ 2241.292804] FAULT_INJECTION: forcing a failure. [ 2241.292804] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.294251] CPU: 1 PID: 10549 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2241.295097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2241.296114] Call Trace: [ 2241.296449] dump_stack+0x107/0x167 [ 2241.296903] should_fail.cold+0x5/0xa [ 2241.297375] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2241.298040] ? create_object.isra.0+0x3a/0xa20 [ 2241.298598] should_failslab+0x5/0x20 [ 2241.299041] kmem_cache_alloc+0x5b/0x310 [ 2241.299516] ? mark_held_locks+0x9e/0xe0 [ 2241.300004] create_object.isra.0+0x3a/0xa20 [ 2241.300547] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2241.301168] kmem_cache_alloc_node+0x169/0x330 [ 2241.301718] __alloc_skb+0x6d/0x5b0 [ 2241.302170] skb_segment+0x9d8/0x3aa0 [ 2241.302631] ? __lock_acquire+0xbb1/0x5b00 [ 2241.303149] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2241.303745] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.304348] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.304868] __udp_gso_segment+0x11c6/0x1830 [ 2241.305384] ? __sk_receive_skb+0x830/0x830 [ 2241.305911] udp4_ufo_fragment+0x528/0x720 [ 2241.306431] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2241.307031] inet_gso_segment+0x4fb/0x11a0 [ 2241.307539] skb_mac_gso_segment+0x273/0x570 [ 2241.308057] ? inet_sock_destruct+0x840/0x840 [ 2241.308589] ? skb_network_protocol+0x650/0x650 [ 2241.309130] ? skb_crc32c_csum_help+0x80/0x80 [ 2241.309654] ? lock_acquire+0x197/0x470 [ 2241.310141] ? __dev_queue_xmit+0x1c6/0x2690 [ 2241.310662] __skb_gso_segment+0x32d/0x6d0 [ 2241.311162] ? mark_lock+0xf5/0x2df0 [ 2241.311613] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2241.312231] ? lock_chain_count+0x20/0x20 [ 2241.312711] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2241.313254] __dev_queue_xmit+0x825/0x2690 [ 2241.313763] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2241.314410] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2241.314979] ? mark_held_locks+0x9e/0xe0 [ 2241.315486] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2241.316130] neigh_connected_output+0x382/0x4d0 [ 2241.316710] ip_finish_output2+0x6f1/0x21f0 [ 2241.317240] ? nf_hook_slow+0xfc/0x1e0 [ 2241.317717] ? ip_frag_next+0x9e0/0x9e0 [ 2241.318220] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2241.318851] __ip_finish_output.part.0+0x5f3/0xb50 [ 2241.319465] ? ip_fragment.constprop.0+0x240/0x240 [ 2241.320075] ? netif_rx_ni+0xe7/0x300 [ 2241.320565] ip_mc_output+0x401/0xa30 [ 2241.321067] ip_send_skb+0xdd/0x260 [ 2241.321543] udp_send_skb+0x6da/0x11d0 [ 2241.322066] udp_sendmsg+0x139a/0x2160 [ 2241.322550] ? mark_lock+0xf5/0x2df0 [ 2241.323014] ? ip_frag_init+0x350/0x350 [ 2241.323505] ? lock_chain_count+0x20/0x20 [ 2241.324027] ? udp_setsockopt+0xc0/0xc0 [ 2241.324516] ? mark_lock+0xf5/0x2df0 [ 2241.324982] ? lock_acquire+0x197/0x470 [ 2241.325472] ? lock_chain_count+0x20/0x20 [ 2241.325996] ? mark_lock+0xf5/0x2df0 [ 2241.326477] ? mark_lock+0xf5/0x2df0 [ 2241.326944] ? lock_chain_count+0x20/0x20 [ 2241.327451] ? __lock_acquire+0xbb1/0x5b00 [ 2241.327982] ? lock_chain_count+0x20/0x20 [ 2241.328501] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.329151] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.329660] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2241.330195] ? udp_v6_push_pending_frames+0x360/0x360 [ 2241.330830] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.331381] ? mark_lock+0xf5/0x2df0 [ 2241.331846] ? lock_acquire+0x197/0x470 [ 2241.332388] ? find_held_lock+0x2c/0x110 [ 2241.332895] ? __might_fault+0xd3/0x180 [ 2241.333407] ? lock_downgrade+0x6d0/0x6d0 [ 2241.333918] ? lock_downgrade+0x6d0/0x6d0 [ 2241.334442] ? sock_has_perm+0x1ea/0x280 [ 2241.334920] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2241.335526] ? _copy_from_user+0xfb/0x1b0 [ 2241.336018] ? __import_iovec+0x458/0x590 [ 2241.336504] ? udp_v6_push_pending_frames+0x360/0x360 [ 2241.337108] inet6_sendmsg+0x105/0x140 [ 2241.337637] ? inet6_compat_ioctl+0x320/0x320 [ 2241.338391] __sock_sendmsg+0xf2/0x190 [ 2241.338864] ____sys_sendmsg+0x70d/0x870 [ 2241.339377] ? sock_write_iter+0x3d0/0x3d0 [ 2241.339900] ? do_recvmmsg+0x6d0/0x6d0 [ 2241.340368] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.340849] ? lock_downgrade+0x6d0/0x6d0 [ 2241.341349] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.342023] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.342534] ___sys_sendmsg+0xf3/0x170 [ 2241.343033] ? sendmsg_copy_msghdr+0x160/0x160 [ 2241.343623] ? __fget_files+0x2cf/0x520 [ 2241.344119] ? lock_downgrade+0x6d0/0x6d0 [ 2241.344648] ? find_held_lock+0x2c/0x110 [ 2241.345162] ? __fget_files+0x2f8/0x520 [ 2241.345674] ? __fget_light+0xea/0x290 [ 2241.346200] __sys_sendmsg+0xe5/0x1b0 [ 2241.346685] ? __sys_sendmsg_sock+0x40/0x40 [ 2241.347246] ? rcu_read_lock_any_held+0x75/0xa0 [ 2241.347845] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2241.348523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2241.349183] ? trace_hardirqs_on+0x5b/0x180 [ 2241.349731] do_syscall_64+0x33/0x40 [ 2241.350227] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2241.350858] RIP: 0033:0x7f251a6f7b19 [ 2241.351316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2241.353636] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2241.354604] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2241.355476] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2241.356352] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.357227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2241.358113] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:49:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 47) 09:49:27 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 46) 09:49:27 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:27 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x10000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:49:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2256.318308] FAULT_INJECTION: forcing a failure. [ 2256.318308] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.323847] CPU: 0 PID: 10560 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2256.324749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.325832] Call Trace: [ 2256.326189] dump_stack+0x107/0x167 [ 2256.326685] should_fail.cold+0x5/0xa [ 2256.327189] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2256.327878] ? create_object.isra.0+0x3a/0xa20 [ 2256.328479] should_failslab+0x5/0x20 [ 2256.328977] kmem_cache_alloc+0x5b/0x310 [ 2256.329511] ? mark_held_locks+0x9e/0xe0 [ 2256.330047] create_object.isra.0+0x3a/0xa20 [ 2256.330644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2256.331288] kmem_cache_alloc_node+0x169/0x330 [ 2256.331862] __alloc_skb+0x6d/0x5b0 [ 2256.332327] skb_segment+0x9d8/0x3aa0 [ 2256.332805] ? __lock_acquire+0xbb1/0x5b00 [ 2256.333396] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2256.334077] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.334825] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.335368] __udp_gso_segment+0x11c6/0x1830 [ 2256.335947] ? __sk_receive_skb+0x830/0x830 [ 2256.336520] udp4_ufo_fragment+0x528/0x720 [ 2256.337082] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2256.337742] inet_gso_segment+0x4fb/0x11a0 [ 2256.338318] skb_mac_gso_segment+0x273/0x570 [ 2256.338904] ? inet_sock_destruct+0x840/0x840 [ 2256.339524] ? skb_network_protocol+0x650/0x650 [ 2256.340110] ? skb_crc32c_csum_help+0x80/0x80 [ 2256.340695] ? lock_acquire+0x197/0x470 [ 2256.341205] ? __dev_queue_xmit+0x1c6/0x2690 [ 2256.341770] __skb_gso_segment+0x32d/0x6d0 [ 2256.342318] ? mark_lock+0xf5/0x2df0 [ 2256.342842] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2256.343528] ? lock_chain_count+0x20/0x20 [ 2256.344067] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2256.344665] __dev_queue_xmit+0x825/0x2690 [ 2256.345227] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2256.345900] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2256.346503] ? mark_held_locks+0x9e/0xe0 [ 2256.347056] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2256.347744] neigh_connected_output+0x382/0x4d0 [ 2256.348370] ip_finish_output2+0x6f1/0x21f0 [ 2256.348936] ? nf_hook_slow+0xfc/0x1e0 [ 2256.349445] ? ip_frag_next+0x9e0/0x9e0 [ 2256.349964] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2256.350643] __ip_finish_output.part.0+0x5f3/0xb50 [ 2256.351293] ? ip_fragment.constprop.0+0x240/0x240 [ 2256.351934] ? netif_rx_ni+0xe7/0x300 [ 2256.352437] ip_mc_output+0x401/0xa30 [ 2256.352939] ip_send_skb+0xdd/0x260 [ 2256.353419] udp_send_skb+0x6da/0x11d0 [ 2256.353937] udp_sendmsg+0x139a/0x2160 [ 2256.354449] ? mark_lock+0xf5/0x2df0 [ 2256.354963] ? ip_frag_init+0x350/0x350 [ 2256.355483] ? lock_chain_count+0x20/0x20 [ 2256.356029] ? udp_setsockopt+0xc0/0xc0 [ 2256.356544] ? mark_lock+0xf5/0x2df0 [ 2256.357030] ? lock_acquire+0x197/0x470 [ 2256.357551] ? lock_chain_count+0x20/0x20 [ 2256.358092] ? mark_lock+0xf5/0x2df0 [ 2256.358591] ? mark_lock+0xf5/0x2df0 [ 2256.359088] ? lock_chain_count+0x20/0x20 [ 2256.359629] ? __lock_acquire+0xbb1/0x5b00 [ 2256.360182] ? lock_chain_count+0x20/0x20 [ 2256.360733] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.361415] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.361957] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2256.362500] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.363217] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.363752] ? mark_lock+0xf5/0x2df0 [ 2256.364244] ? lock_acquire+0x197/0x470 [ 2256.364762] ? find_held_lock+0x2c/0x110 [ 2256.365297] ? __might_fault+0xd3/0x180 [ 2256.365816] ? lock_downgrade+0x6d0/0x6d0 [ 2256.366360] ? lock_downgrade+0x6d0/0x6d0 [ 2256.366924] ? sock_has_perm+0x1ea/0x280 [ 2256.367456] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2256.368133] ? _copy_from_user+0xfb/0x1b0 [ 2256.368686] ? __import_iovec+0x458/0x590 [ 2256.369229] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.369850] FAULT_INJECTION: forcing a failure. [ 2256.369850] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.369906] inet6_sendmsg+0x105/0x140 [ 2256.371790] ? inet6_compat_ioctl+0x320/0x320 [ 2256.372377] __sock_sendmsg+0xf2/0x190 [ 2256.372886] ____sys_sendmsg+0x70d/0x870 [ 2256.373425] ? sock_write_iter+0x3d0/0x3d0 [ 2256.373976] ? do_recvmmsg+0x6d0/0x6d0 [ 2256.374488] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.375043] ? lock_downgrade+0x6d0/0x6d0 [ 2256.375587] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.376270] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.376804] ___sys_sendmsg+0xf3/0x170 [ 2256.377321] ? sendmsg_copy_msghdr+0x160/0x160 [ 2256.377924] ? __fget_files+0x2cf/0x520 [ 2256.378467] ? lock_downgrade+0x6d0/0x6d0 [ 2256.379030] ? find_held_lock+0x2c/0x110 [ 2256.379570] ? __fget_files+0x2f8/0x520 [ 2256.380095] ? __fget_light+0xea/0x290 [ 2256.380616] __sys_sendmsg+0xe5/0x1b0 [ 2256.381115] ? __sys_sendmsg_sock+0x40/0x40 [ 2256.381679] ? rcu_read_lock_any_held+0x75/0xa0 [ 2256.382300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2256.383000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2256.383671] ? trace_hardirqs_on+0x5b/0x180 [ 2256.384235] do_syscall_64+0x33/0x40 [ 2256.384722] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.385390] RIP: 0033:0x7f3f9ec55b19 [ 2256.385876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.388294] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2256.389291] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2256.390219] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2256.391166] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.392100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2256.393029] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2256.393980] CPU: 1 PID: 10559 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2256.398856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.399858] Call Trace: [ 2256.400181] dump_stack+0x107/0x167 [ 2256.400623] should_fail.cold+0x5/0xa [ 2256.401090] should_failslab+0x5/0x20 [ 2256.401551] __kmalloc_node_track_caller+0x74/0x3b0 [ 2256.402152] ? skb_segment+0x9d8/0x3aa0 [ 2256.402657] __alloc_skb+0xb1/0x5b0 [ 2256.403104] skb_segment+0x9d8/0x3aa0 [ 2256.403566] ? __lock_acquire+0xbb1/0x5b00 [ 2256.404107] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2256.404714] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.405346] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.405843] __udp_gso_segment+0x11c6/0x1830 [ 2256.406376] ? __sk_receive_skb+0x830/0x830 [ 2256.406928] udp4_ufo_fragment+0x528/0x720 [ 2256.407446] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2256.408049] inet_gso_segment+0x4fb/0x11a0 [ 2256.408575] skb_mac_gso_segment+0x273/0x570 [ 2256.409107] ? inet_sock_destruct+0x840/0x840 [ 2256.409647] ? skb_network_protocol+0x650/0x650 [ 2256.410207] ? skb_crc32c_csum_help+0x80/0x80 [ 2256.410761] ? lock_acquire+0x197/0x470 [ 2256.411240] ? __dev_queue_xmit+0x1c6/0x2690 [ 2256.411775] __skb_gso_segment+0x32d/0x6d0 [ 2256.412285] ? mark_lock+0xf5/0x2df0 [ 2256.412739] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2256.413370] ? lock_chain_count+0x20/0x20 [ 2256.413870] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2256.414423] __dev_queue_xmit+0x825/0x2690 [ 2256.414959] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2256.415588] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2256.416147] ? mark_held_locks+0x9e/0xe0 [ 2256.416642] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2256.417279] neigh_connected_output+0x382/0x4d0 [ 2256.417853] ip_finish_output2+0x6f1/0x21f0 [ 2256.418379] ? nf_hook_slow+0xfc/0x1e0 [ 2256.418866] ? ip_frag_next+0x9e0/0x9e0 [ 2256.419348] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2256.419959] __ip_finish_output.part.0+0x5f3/0xb50 [ 2256.420557] ? ip_fragment.constprop.0+0x240/0x240 [ 2256.421154] ? netif_rx_ni+0xe7/0x300 [ 2256.421626] ip_mc_output+0x401/0xa30 [ 2256.422092] ip_send_skb+0xdd/0x260 [ 2256.422536] udp_send_skb+0x6da/0x11d0 [ 2256.423039] udp_sendmsg+0x139a/0x2160 [ 2256.423511] ? mark_lock+0xf5/0x2df0 [ 2256.423964] ? ip_frag_init+0x350/0x350 [ 2256.424451] ? lock_chain_count+0x20/0x20 [ 2256.424956] ? udp_setsockopt+0xc0/0xc0 [ 2256.425435] ? mark_lock+0xf5/0x2df0 [ 2256.425885] ? lock_acquire+0x197/0x470 [ 2256.426368] ? lock_chain_count+0x20/0x20 [ 2256.426896] ? mark_lock+0xf5/0x2df0 [ 2256.427350] ? mark_lock+0xf5/0x2df0 [ 2256.427801] ? lock_chain_count+0x20/0x20 [ 2256.428302] ? __lock_acquire+0xbb1/0x5b00 [ 2256.428814] ? lock_chain_count+0x20/0x20 [ 2256.429326] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.429957] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.430457] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2256.430975] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.431598] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.432094] ? mark_lock+0xf5/0x2df0 [ 2256.432549] ? lock_acquire+0x197/0x470 [ 2256.433030] ? find_held_lock+0x2c/0x110 [ 2256.433525] ? __might_fault+0xd3/0x180 [ 2256.434007] ? lock_downgrade+0x6d0/0x6d0 [ 2256.434511] ? lock_downgrade+0x6d0/0x6d0 [ 2256.435033] ? sock_has_perm+0x1ea/0x280 [ 2256.435530] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2256.436157] ? _copy_from_user+0xfb/0x1b0 [ 2256.436668] ? __import_iovec+0x458/0x590 [ 2256.437171] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.437802] inet6_sendmsg+0x105/0x140 [ 2256.438282] ? inet6_compat_ioctl+0x320/0x320 [ 2256.438862] __sock_sendmsg+0xf2/0x190 [ 2256.439336] ____sys_sendmsg+0x70d/0x870 [ 2256.439831] ? sock_write_iter+0x3d0/0x3d0 [ 2256.440341] ? do_recvmmsg+0x6d0/0x6d0 [ 2256.440816] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.441306] ? lock_downgrade+0x6d0/0x6d0 [ 2256.441811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.442442] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.442953] ___sys_sendmsg+0xf3/0x170 [ 2256.443432] ? sendmsg_copy_msghdr+0x160/0x160 [ 2256.443990] ? __fget_files+0x2cf/0x520 [ 2256.444473] ? lock_downgrade+0x6d0/0x6d0 [ 2256.444977] ? find_held_lock+0x2c/0x110 [ 2256.445478] ? __fget_files+0x2f8/0x520 [ 2256.445967] ? __fget_light+0xea/0x290 [ 2256.446446] __sys_sendmsg+0xe5/0x1b0 [ 2256.446923] ? __sys_sendmsg_sock+0x40/0x40 [ 2256.447446] ? rcu_read_lock_any_held+0x75/0xa0 [ 2256.448023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2256.448658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2256.449280] ? trace_hardirqs_on+0x5b/0x180 [ 2256.449804] do_syscall_64+0x33/0x40 [ 2256.450255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.450888] RIP: 0033:0x7f251a6f7b19 [ 2256.451342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.453564] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2256.454486] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2256.455371] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2256.456234] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.457099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2256.457960] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:49:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x1c000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:27 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 47) 09:49:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 48) [ 2256.573402] FAULT_INJECTION: forcing a failure. [ 2256.573402] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.574969] CPU: 0 PID: 10583 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2256.575874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.576960] Call Trace: [ 2256.577314] dump_stack+0x107/0x167 [ 2256.577799] should_fail.cold+0x5/0xa [ 2256.578305] ? create_object.isra.0+0x3a/0xa20 [ 2256.582935] should_failslab+0x5/0x20 [ 2256.583436] kmem_cache_alloc+0x5b/0x310 [ 2256.583979] create_object.isra.0+0x3a/0xa20 [ 2256.584551] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2256.585217] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2256.585885] ? skb_segment+0x9d8/0x3aa0 [ 2256.586410] __alloc_skb+0xb1/0x5b0 [ 2256.586913] skb_segment+0x9d8/0x3aa0 [ 2256.587416] ? __lock_acquire+0xbb1/0x5b00 [ 2256.587997] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2256.588652] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.589338] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.589876] __udp_gso_segment+0x11c6/0x1830 09:49:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2256.590450] ? __sk_receive_skb+0x830/0x830 [ 2256.591054] udp4_ufo_fragment+0x528/0x720 [ 2256.591612] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2256.592265] inet_gso_segment+0x4fb/0x11a0 [ 2256.598694] skb_mac_gso_segment+0x273/0x570 [ 2256.599272] ? inet_sock_destruct+0x840/0x840 [ 2256.599856] ? skb_network_protocol+0x650/0x650 [ 2256.600462] ? skb_crc32c_csum_help+0x80/0x80 [ 2256.601046] ? lock_acquire+0x197/0x470 [ 2256.601565] ? __dev_queue_xmit+0x1c6/0x2690 [ 2256.602148] __skb_gso_segment+0x32d/0x6d0 [ 2256.602718] ? mark_lock+0xf5/0x2df0 [ 2256.603213] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2256.603898] ? lock_chain_count+0x20/0x20 [ 2256.604437] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2256.605035] __dev_queue_xmit+0x825/0x2690 [ 2256.605595] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2256.606271] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2256.606909] ? mark_held_locks+0x9e/0xe0 [ 2256.607447] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2256.608137] neigh_connected_output+0x382/0x4d0 [ 2256.608756] ip_finish_output2+0x6f1/0x21f0 [ 2256.609324] ? nf_hook_slow+0xfc/0x1e0 [ 2256.609835] ? ip_frag_next+0x9e0/0x9e0 [ 2256.610354] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2256.611047] __ip_finish_output.part.0+0x5f3/0xb50 [ 2256.611693] ? ip_fragment.constprop.0+0x240/0x240 [ 2256.612333] ? netif_rx_ni+0xe7/0x300 [ 2256.612837] ip_mc_output+0x401/0xa30 [ 2256.613340] ip_send_skb+0xdd/0x260 [ 2256.613820] udp_send_skb+0x6da/0x11d0 [ 2256.614338] udp_sendmsg+0x139a/0x2160 [ 2256.614885] ? mark_lock+0xf5/0x2df0 [ 2256.615376] ? ip_frag_init+0x350/0x350 [ 2256.615896] ? lock_chain_count+0x20/0x20 [ 2256.616442] ? udp_setsockopt+0xc0/0xc0 [ 2256.616959] ? mark_lock+0xf5/0x2df0 [ 2256.617445] ? lock_acquire+0x197/0x470 [ 2256.617968] ? lock_chain_count+0x20/0x20 [ 2256.618511] ? mark_lock+0xf5/0x2df0 [ 2256.619022] ? mark_lock+0xf5/0x2df0 [ 2256.619509] ? lock_chain_count+0x20/0x20 [ 2256.620050] ? __lock_acquire+0xbb1/0x5b00 [ 2256.620603] ? lock_chain_count+0x20/0x20 [ 2256.621157] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.621840] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.622381] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2256.622940] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.623613] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.624148] ? mark_lock+0xf5/0x2df0 [ 2256.624640] ? lock_acquire+0x197/0x470 [ 2256.625159] ? find_held_lock+0x2c/0x110 [ 2256.625695] ? __might_fault+0xd3/0x180 [ 2256.626216] ? lock_downgrade+0x6d0/0x6d0 [ 2256.626780] ? lock_downgrade+0x6d0/0x6d0 [ 2256.627324] ? sock_has_perm+0x1ea/0x280 [ 2256.627856] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2256.628536] ? _copy_from_user+0xfb/0x1b0 [ 2256.629088] ? __import_iovec+0x458/0x590 [ 2256.629630] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.630308] inet6_sendmsg+0x105/0x140 [ 2256.630844] ? inet6_compat_ioctl+0x320/0x320 [ 2256.631430] __sock_sendmsg+0xf2/0x190 [ 2256.631939] ____sys_sendmsg+0x70d/0x870 [ 2256.632472] ? sock_write_iter+0x3d0/0x3d0 [ 2256.633022] ? do_recvmmsg+0x6d0/0x6d0 [ 2256.633534] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.634063] ? lock_downgrade+0x6d0/0x6d0 [ 2256.634629] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.635318] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.635853] ___sys_sendmsg+0xf3/0x170 [ 2256.636364] ? sendmsg_copy_msghdr+0x160/0x160 [ 2256.636964] ? __fget_files+0x2cf/0x520 [ 2256.637485] ? lock_downgrade+0x6d0/0x6d0 [ 2256.638026] ? find_held_lock+0x2c/0x110 [ 2256.638573] ? __fget_files+0x2f8/0x520 [ 2256.639109] ? __fget_light+0xea/0x290 [ 2256.639624] __sys_sendmsg+0xe5/0x1b0 [ 2256.640123] ? __sys_sendmsg_sock+0x40/0x40 [ 2256.640689] ? rcu_read_lock_any_held+0x75/0xa0 [ 2256.641310] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2256.641995] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2256.642709] ? trace_hardirqs_on+0x5b/0x180 [ 2256.643275] do_syscall_64+0x33/0x40 [ 2256.643763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.644432] RIP: 0033:0x7f251a6f7b19 [ 2256.644920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.651369] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2256.652365] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2256.653301] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2256.654231] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.655177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2256.656108] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2256.700093] FAULT_INJECTION: forcing a failure. [ 2256.700093] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.701605] CPU: 0 PID: 10592 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2256.702510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.703619] Call Trace: [ 2256.703974] dump_stack+0x107/0x167 [ 2256.704451] should_fail.cold+0x5/0xa [ 2256.704958] should_failslab+0x5/0x20 [ 2256.705458] __kmalloc_node_track_caller+0x74/0x3b0 [ 2256.706116] ? skb_segment+0x9d8/0x3aa0 [ 2256.706662] __alloc_skb+0xb1/0x5b0 [ 2256.707151] skb_segment+0x9d8/0x3aa0 [ 2256.707653] ? __lock_acquire+0xbb1/0x5b00 [ 2256.708233] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2256.708888] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.709571] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.710114] __udp_gso_segment+0x11c6/0x1830 [ 2256.710730] ? __sk_receive_skb+0x830/0x830 [ 2256.711308] udp4_ufo_fragment+0x528/0x720 [ 2256.711865] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2256.712516] inet_gso_segment+0x4fb/0x11a0 [ 2256.713079] skb_mac_gso_segment+0x273/0x570 [ 2256.713655] ? inet_sock_destruct+0x840/0x840 [ 2256.714239] ? skb_network_protocol+0x650/0x650 [ 2256.714890] ? skb_crc32c_csum_help+0x80/0x80 [ 2256.715477] ? lock_acquire+0x197/0x470 [ 2256.716000] ? __dev_queue_xmit+0x1c6/0x2690 [ 2256.716578] __skb_gso_segment+0x32d/0x6d0 [ 2256.717130] ? mark_lock+0xf5/0x2df0 [ 2256.717618] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2256.718306] ? lock_chain_count+0x20/0x20 [ 2256.722888] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2256.723490] __dev_queue_xmit+0x825/0x2690 [ 2256.724052] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2256.724728] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2256.725336] ? mark_held_locks+0x9e/0xe0 [ 2256.725878] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2256.726579] neigh_connected_output+0x382/0x4d0 [ 2256.727212] ip_finish_output2+0x6f1/0x21f0 [ 2256.727782] ? nf_hook_slow+0xfc/0x1e0 [ 2256.728294] ? ip_frag_next+0x9e0/0x9e0 [ 2256.728816] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2256.729478] __ip_finish_output.part.0+0x5f3/0xb50 [ 2256.730123] ? ip_fragment.constprop.0+0x240/0x240 [ 2256.730794] ? netif_rx_ni+0xe7/0x300 [ 2256.731298] ip_mc_output+0x401/0xa30 [ 2256.731802] ip_send_skb+0xdd/0x260 [ 2256.732281] udp_send_skb+0x6da/0x11d0 [ 2256.732800] udp_sendmsg+0x139a/0x2160 [ 2256.733307] ? mark_lock+0xf5/0x2df0 [ 2256.733795] ? ip_frag_init+0x350/0x350 [ 2256.734315] ? lock_chain_count+0x20/0x20 [ 2256.734880] ? udp_setsockopt+0xc0/0xc0 [ 2256.735400] ? mark_lock+0xf5/0x2df0 [ 2256.735889] ? lock_acquire+0x197/0x470 [ 2256.736412] ? lock_chain_count+0x20/0x20 [ 2256.736954] ? mark_lock+0xf5/0x2df0 [ 2256.737444] ? mark_lock+0xf5/0x2df0 [ 2256.737932] ? lock_chain_count+0x20/0x20 [ 2256.738473] ? __lock_acquire+0xbb1/0x5b00 [ 2256.739060] ? lock_chain_count+0x20/0x20 [ 2256.739614] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.740297] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.740838] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2256.741387] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.742059] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.742616] ? mark_lock+0xf5/0x2df0 [ 2256.743115] ? lock_acquire+0x197/0x470 [ 2256.743634] ? find_held_lock+0x2c/0x110 [ 2256.744169] ? __might_fault+0xd3/0x180 [ 2256.744688] ? lock_downgrade+0x6d0/0x6d0 [ 2256.745234] ? lock_downgrade+0x6d0/0x6d0 [ 2256.745779] ? sock_has_perm+0x1ea/0x280 [ 2256.746311] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2256.747019] ? _copy_from_user+0xfb/0x1b0 [ 2256.747572] ? __import_iovec+0x458/0x590 [ 2256.748114] ? udp_v6_push_pending_frames+0x360/0x360 [ 2256.748793] inet6_sendmsg+0x105/0x140 [ 2256.749304] ? inet6_compat_ioctl+0x320/0x320 [ 2256.749889] __sock_sendmsg+0xf2/0x190 [ 2256.750400] ____sys_sendmsg+0x70d/0x870 [ 2256.750952] ? sock_write_iter+0x3d0/0x3d0 [ 2256.751505] ? do_recvmmsg+0x6d0/0x6d0 [ 2256.752023] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.752553] ? lock_downgrade+0x6d0/0x6d0 [ 2256.753096] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.753779] ? SOFTIRQ_verbose+0x10/0x10 [ 2256.754315] ___sys_sendmsg+0xf3/0x170 [ 2256.754862] ? sendmsg_copy_msghdr+0x160/0x160 [ 2256.755465] ? __fget_files+0x2cf/0x520 [ 2256.755984] ? lock_downgrade+0x6d0/0x6d0 [ 2256.756526] ? find_held_lock+0x2c/0x110 [ 2256.757064] ? __fget_files+0x2f8/0x520 [ 2256.757591] ? __fget_light+0xea/0x290 [ 2256.758106] __sys_sendmsg+0xe5/0x1b0 [ 2256.758627] ? __sys_sendmsg_sock+0x40/0x40 [ 2256.759205] ? rcu_read_lock_any_held+0x75/0xa0 [ 2256.759828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2256.760516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2256.761188] ? trace_hardirqs_on+0x5b/0x180 [ 2256.761754] do_syscall_64+0x33/0x40 [ 2256.762242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.762966] RIP: 0033:0x7f3f9ec55b19 [ 2256.763455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.765852] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2256.766868] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2256.767799] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2256.768730] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.769662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2256.770608] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:49:27 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:27 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xa, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2272.314876] FAULT_INJECTION: forcing a failure. [ 2272.314876] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.317781] CPU: 1 PID: 10622 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2272.319373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2272.320392] Call Trace: [ 2272.320724] dump_stack+0x107/0x167 [ 2272.321191] should_fail.cold+0x5/0xa [ 2272.321683] ? trace_hardirqs_on+0x5b/0x180 [ 2272.322232] ? __alloc_skb+0x6d/0x5b0 [ 2272.326750] FAULT_INJECTION: forcing a failure. [ 2272.326750] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.331414] should_failslab+0x5/0x20 [ 2272.331432] kmem_cache_alloc_node+0x55/0x330 [ 2272.331453] __alloc_skb+0x6d/0x5b0 [ 2272.331475] skb_segment+0x9d8/0x3aa0 [ 2272.331493] ? __lock_acquire+0xbb1/0x5b00 [ 2272.331544] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2272.331564] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.331579] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.331603] __udp_gso_segment+0x11c6/0x1830 [ 2272.337841] ? __sk_receive_skb+0x830/0x830 [ 2272.338394] udp4_ufo_fragment+0x528/0x720 [ 2272.338938] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2272.339618] inet_gso_segment+0x4fb/0x11a0 [ 2272.340161] skb_mac_gso_segment+0x273/0x570 [ 2272.340707] ? inet_sock_destruct+0x840/0x840 [ 2272.341253] ? skb_network_protocol+0x650/0x650 [ 2272.341847] ? skb_crc32c_csum_help+0x80/0x80 [ 2272.342414] ? lock_acquire+0x197/0x470 [ 2272.342930] ? __dev_queue_xmit+0x1c6/0x2690 [ 2272.343526] __skb_gso_segment+0x32d/0x6d0 [ 2272.344067] ? mark_lock+0xf5/0x2df0 [ 2272.344549] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2272.345221] ? lock_chain_count+0x20/0x20 [ 2272.345745] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2272.346311] __dev_queue_xmit+0x825/0x2690 [ 2272.346850] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2272.347521] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2272.348092] ? mark_held_locks+0x9e/0xe0 [ 2272.348598] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2272.349243] neigh_connected_output+0x382/0x4d0 [ 2272.349829] ip_finish_output2+0x6f1/0x21f0 [ 2272.350356] ? nf_hook_slow+0xfc/0x1e0 [ 2272.350842] ? ip_frag_next+0x9e0/0x9e0 [ 2272.351373] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2272.352067] __ip_finish_output.part.0+0x5f3/0xb50 [ 2272.352741] ? ip_fragment.constprop.0+0x240/0x240 [ 2272.353406] ? netif_rx_ni+0xe7/0x300 [ 2272.353940] ip_mc_output+0x401/0xa30 [ 2272.354463] ip_send_skb+0xdd/0x260 [ 2272.354972] udp_send_skb+0x6da/0x11d0 [ 2272.355541] udp_sendmsg+0x139a/0x2160 [ 2272.356070] ? mark_lock+0xf5/0x2df0 [ 2272.356589] ? ip_frag_init+0x350/0x350 [ 2272.357097] ? lock_chain_count+0x20/0x20 [ 2272.357616] ? mark_lock+0xf5/0x2df0 [ 2272.358082] ? udp_setsockopt+0xc0/0xc0 [ 2272.358592] ? __bad_area_nosemaphore+0xa1/0x310 [ 2272.359203] ? mark_lock+0xf5/0x2df0 [ 2272.359688] ? mark_lock+0xf5/0x2df0 [ 2272.360163] ? lock_chain_count+0x20/0x20 [ 2272.360716] ? mark_lock+0xf5/0x2df0 [ 2272.361217] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2272.361723] ? mark_held_locks+0x9e/0xe0 [ 2272.362226] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.362863] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2272.363559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2272.364202] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2272.364865] ? trace_hardirqs_on+0x5b/0x180 [ 2272.365393] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2272.366066] ? sock_has_perm+0x7f/0x280 [ 2272.366555] ? sock_has_perm+0x92/0x280 [ 2272.367043] ? sock_has_perm+0x1ea/0x280 [ 2272.367555] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2272.368193] ? _copy_from_user+0xfb/0x1b0 [ 2272.368708] ? __import_iovec+0x458/0x590 [ 2272.369224] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.369895] inet6_sendmsg+0x105/0x140 [ 2272.370393] ? inet6_compat_ioctl+0x320/0x320 [ 2272.370958] __sock_sendmsg+0xf2/0x190 [ 2272.371506] ____sys_sendmsg+0x70d/0x870 [ 2272.372053] ? sock_write_iter+0x3d0/0x3d0 [ 2272.372580] ? do_recvmmsg+0x6d0/0x6d0 [ 2272.373074] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.373646] ___sys_sendmsg+0xf3/0x170 [ 2272.374129] ? sendmsg_copy_msghdr+0x160/0x160 [ 2272.374707] ? __fget_files+0x2cf/0x520 [ 2272.375217] ? lock_downgrade+0x6d0/0x6d0 [ 2272.375746] ? fd_install+0x680/0x680 [ 2272.376223] ? __fget_files+0x5f/0x520 [ 2272.376723] ? __fget_files+0x2f8/0x520 [ 2272.377219] ? __fget_light+0xea/0x290 [ 2272.377709] __sys_sendmsg+0xe5/0x1b0 [ 2272.378176] ? __sys_sendmsg_sock+0x40/0x40 [ 2272.378727] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2272.379454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2272.380087] ? trace_hardirqs_on+0x5b/0x180 [ 2272.380651] do_syscall_64+0x33/0x40 [ 2272.381132] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2272.381771] RIP: 0033:0x7f251a6f7b19 [ 2272.382252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2272.384550] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2272.385478] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2272.386344] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2272.387217] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2272.388084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2272.388950] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2272.389868] CPU: 0 PID: 10619 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2272.390914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2272.392156] Call Trace: [ 2272.392600] dump_stack+0x107/0x167 [ 2272.393090] should_fail.cold+0x5/0xa [ 2272.393664] ? create_object.isra.0+0x3a/0xa20 [ 2272.394324] should_failslab+0x5/0x20 [ 2272.394847] kmem_cache_alloc+0x5b/0x310 [ 2272.395475] create_object.isra.0+0x3a/0xa20 [ 2272.396061] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2272.396821] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2272.397573] ? skb_segment+0x9d8/0x3aa0 [ 2272.398119] __alloc_skb+0xb1/0x5b0 [ 2272.398678] skb_segment+0x9d8/0x3aa0 [ 2272.399231] ? __lock_acquire+0xbb1/0x5b00 [ 2272.399888] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2272.400649] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.401417] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.401976] __udp_gso_segment+0x11c6/0x1830 [ 2272.402627] ? __sk_receive_skb+0x830/0x830 [ 2272.403231] udp4_ufo_fragment+0x528/0x720 [ 2272.403869] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2272.404615] inet_gso_segment+0x4fb/0x11a0 [ 2272.405200] skb_mac_gso_segment+0x273/0x570 [ 2272.405856] ? inet_sock_destruct+0x840/0x840 [ 2272.406513] ? skb_network_protocol+0x650/0x650 [ 2272.407147] ? skb_crc32c_csum_help+0x80/0x80 [ 2272.407808] ? lock_acquire+0x197/0x470 [ 2272.412178] ? __dev_queue_xmit+0x1c6/0x2690 [ 2272.412926] __skb_gso_segment+0x32d/0x6d0 [ 2272.413667] ? mark_lock+0xf5/0x2df0 [ 2272.414240] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2272.415100] ? lock_chain_count+0x20/0x20 [ 2272.415818] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2272.416497] __dev_queue_xmit+0x825/0x2690 [ 2272.417075] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2272.417849] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2272.418532] ? mark_held_locks+0x9e/0xe0 [ 2272.419083] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2272.419869] neigh_connected_output+0x382/0x4d0 [ 2272.420573] ip_finish_output2+0x6f1/0x21f0 [ 2272.421161] ? nf_hook_slow+0xfc/0x1e0 [ 2272.421768] ? ip_frag_next+0x9e0/0x9e0 [ 2272.422364] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2272.423049] __ip_finish_output.part.0+0x5f3/0xb50 [ 2272.423783] ? ip_fragment.constprop.0+0x240/0x240 [ 2272.424505] ? netif_rx_ni+0xe7/0x300 [ 2272.425025] ip_mc_output+0x401/0xa30 [ 2272.425627] ip_send_skb+0xdd/0x260 [ 2272.426141] udp_send_skb+0x6da/0x11d0 [ 2272.426749] udp_sendmsg+0x139a/0x2160 [ 2272.427367] ? mark_lock+0xf5/0x2df0 [ 2272.427883] ? ip_frag_init+0x350/0x350 [ 2272.428495] ? lock_chain_count+0x20/0x20 [ 2272.429053] ? udp_setsockopt+0xc0/0xc0 [ 2272.429673] ? mark_lock+0xf5/0x2df0 [ 2272.430173] ? lock_acquire+0x197/0x470 [ 2272.430815] ? lock_chain_count+0x20/0x20 [ 2272.431445] ? mark_lock+0xf5/0x2df0 [ 2272.431956] ? mark_lock+0xf5/0x2df0 [ 2272.432520] ? lock_chain_count+0x20/0x20 [ 2272.433076] ? __lock_acquire+0xbb1/0x5b00 [ 2272.433733] ? lock_chain_count+0x20/0x20 [ 2272.434356] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.435063] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.435713] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2272.436330] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.437049] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.437682] ? mark_lock+0xf5/0x2df0 [ 2272.438185] ? lock_acquire+0x197/0x470 [ 2272.438777] ? find_held_lock+0x2c/0x110 [ 2272.439410] ? __might_fault+0xd3/0x180 [ 2272.439944] ? lock_downgrade+0x6d0/0x6d0 [ 2272.440567] ? lock_downgrade+0x6d0/0x6d0 [ 2272.441127] ? sock_has_perm+0x1ea/0x280 [ 2272.441760] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2272.442510] ? _copy_from_user+0xfb/0x1b0 [ 2272.443087] ? __import_iovec+0x458/0x590 [ 2272.443726] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.444480] inet6_sendmsg+0x105/0x140 [ 2272.445009] ? inet6_compat_ioctl+0x320/0x320 [ 2272.445703] __sock_sendmsg+0xf2/0x190 [ 2272.446238] ____sys_sendmsg+0x70d/0x870 [ 2272.446843] ? sock_write_iter+0x3d0/0x3d0 [ 2272.447486] ? do_recvmmsg+0x6d0/0x6d0 [ 2272.448026] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.448638] ? lock_downgrade+0x6d0/0x6d0 [ 2272.449197] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.449980] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.450586] ___sys_sendmsg+0xf3/0x170 [ 2272.451108] ? sendmsg_copy_msghdr+0x160/0x160 [ 2272.451808] ? __fget_files+0x2cf/0x520 [ 2272.452403] ? lock_downgrade+0x6d0/0x6d0 [ 2272.452968] ? find_held_lock+0x2c/0x110 [ 2272.453606] ? __fget_files+0x2f8/0x520 [ 2272.454149] ? __fget_light+0xea/0x290 [ 2272.454746] __sys_sendmsg+0xe5/0x1b0 [ 2272.455321] ? __sys_sendmsg_sock+0x40/0x40 [ 2272.455909] ? rcu_read_lock_any_held+0x75/0xa0 [ 2272.456621] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2272.457402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2272.458090] ? trace_hardirqs_on+0x5b/0x180 [ 2272.458728] do_syscall_64+0x33/0x40 [ 2272.459242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2272.459977] RIP: 0033:0x7f3f9ec55b19 [ 2272.460538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2272.463084] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2272.464174] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2272.465183] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2272.466203] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2272.467223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2272.468225] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:49:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x20000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:43 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 48) 09:49:43 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:49:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xe, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:43 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:43 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 49) 09:49:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:49:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x3e000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:43 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:43 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:43 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 49) 09:49:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a2", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:49:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 50) 09:49:43 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2272.782202] FAULT_INJECTION: forcing a failure. [ 2272.782202] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.783735] CPU: 0 PID: 10651 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2272.784664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2272.785765] Call Trace: [ 2272.786122] dump_stack+0x107/0x167 [ 2272.786619] should_fail.cold+0x5/0xa [ 2272.787148] ? trace_hardirqs_on+0x5b/0x180 [ 2272.787739] ? __alloc_skb+0x6d/0x5b0 [ 2272.788245] should_failslab+0x5/0x20 [ 2272.788763] kmem_cache_alloc_node+0x55/0x330 [ 2272.789356] __alloc_skb+0x6d/0x5b0 [ 2272.789697] FAULT_INJECTION: forcing a failure. [ 2272.789697] name failslab, interval 1, probability 0, space 0, times 0 [ 2272.789848] skb_segment+0x9d8/0x3aa0 [ 2272.791785] ? __lock_acquire+0xbb1/0x5b00 [ 2272.792367] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2272.793030] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.793722] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.794261] __udp_gso_segment+0x11c6/0x1830 [ 2272.794844] ? __sk_receive_skb+0x830/0x830 [ 2272.795435] udp4_ufo_fragment+0x528/0x720 [ 2272.796003] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2272.796661] inet_gso_segment+0x4fb/0x11a0 [ 2272.797226] skb_mac_gso_segment+0x273/0x570 [ 2272.797809] ? inet_sock_destruct+0x840/0x840 [ 2272.798395] ? skb_network_protocol+0x650/0x650 [ 2272.799006] ? skb_crc32c_csum_help+0x80/0x80 [ 2272.799615] ? lock_acquire+0x197/0x470 [ 2272.800136] ? __dev_queue_xmit+0x1c6/0x2690 [ 2272.800726] __skb_gso_segment+0x32d/0x6d0 [ 2272.801282] ? mark_lock+0xf5/0x2df0 [ 2272.801782] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2272.802472] ? lock_chain_count+0x20/0x20 [ 2272.803019] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2272.803703] __dev_queue_xmit+0x825/0x2690 [ 2272.804266] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2272.804957] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2272.805570] ? mark_held_locks+0x9e/0xe0 [ 2272.806112] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2272.806820] neigh_connected_output+0x382/0x4d0 [ 2272.807468] ip_finish_output2+0x6f1/0x21f0 [ 2272.808045] ? nf_hook_slow+0xfc/0x1e0 [ 2272.808564] ? ip_frag_next+0x9e0/0x9e0 [ 2272.809090] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2272.809763] __ip_finish_output.part.0+0x5f3/0xb50 [ 2272.810411] ? ip_fragment.constprop.0+0x240/0x240 [ 2272.811063] ? netif_rx_ni+0xe7/0x300 [ 2272.811597] ip_mc_output+0x401/0xa30 [ 2272.812107] ip_send_skb+0xdd/0x260 [ 2272.812597] udp_send_skb+0x6da/0x11d0 [ 2272.813122] udp_sendmsg+0x139a/0x2160 [ 2272.813641] ? mark_lock+0xf5/0x2df0 [ 2272.814135] ? ip_frag_init+0x350/0x350 [ 2272.814668] ? lock_chain_count+0x20/0x20 [ 2272.815232] ? udp_setsockopt+0xc0/0xc0 [ 2272.815764] ? mark_lock+0xf5/0x2df0 [ 2272.816254] ? lock_acquire+0x197/0x470 [ 2272.816789] ? lock_chain_count+0x20/0x20 [ 2272.817335] ? mark_lock+0xf5/0x2df0 [ 2272.817837] ? mark_lock+0xf5/0x2df0 [ 2272.818328] ? lock_chain_count+0x20/0x20 [ 2272.818880] ? __lock_acquire+0xbb1/0x5b00 [ 2272.819453] ? lock_chain_count+0x20/0x20 [ 2272.820017] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.820712] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.821256] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2272.821811] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.822489] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.823031] ? mark_lock+0xf5/0x2df0 [ 2272.823555] ? lock_acquire+0x197/0x470 [ 2272.824079] ? find_held_lock+0x2c/0x110 [ 2272.824626] ? __might_fault+0xd3/0x180 [ 2272.825150] ? lock_downgrade+0x6d0/0x6d0 [ 2272.825707] ? lock_downgrade+0x6d0/0x6d0 [ 2272.826256] ? sock_has_perm+0x1ea/0x280 [ 2272.826800] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2272.827505] ? _copy_from_user+0xfb/0x1b0 [ 2272.828066] ? __import_iovec+0x458/0x590 [ 2272.828619] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.829304] inet6_sendmsg+0x105/0x140 [ 2272.829826] ? inet6_compat_ioctl+0x320/0x320 [ 2272.830417] __sock_sendmsg+0xf2/0x190 [ 2272.830938] ____sys_sendmsg+0x70d/0x870 [ 2272.831497] ? sock_write_iter+0x3d0/0x3d0 [ 2272.832059] ? do_recvmmsg+0x6d0/0x6d0 [ 2272.832582] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.833117] ? lock_downgrade+0x6d0/0x6d0 [ 2272.833672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.834358] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.834902] ___sys_sendmsg+0xf3/0x170 [ 2272.835447] ? sendmsg_copy_msghdr+0x160/0x160 [ 2272.836057] ? __fget_files+0x2cf/0x520 [ 2272.836607] ? lock_downgrade+0x6d0/0x6d0 [ 2272.837154] ? find_held_lock+0x2c/0x110 [ 2272.837759] ? __fget_files+0x2f8/0x520 [ 2272.838291] ? __fget_light+0xea/0x290 [ 2272.838897] __sys_sendmsg+0xe5/0x1b0 [ 2272.839427] ? __sys_sendmsg_sock+0x40/0x40 [ 2272.840004] ? rcu_read_lock_any_held+0x75/0xa0 [ 2272.840673] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2272.841370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2272.842054] ? trace_hardirqs_on+0x5b/0x180 [ 2272.842679] do_syscall_64+0x33/0x40 [ 2272.843179] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2272.843943] RIP: 0033:0x7f3f9ec55b19 [ 2272.844458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2272.847119] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2272.848136] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2272.849072] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2272.850008] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2272.850943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2272.852002] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2272.853035] CPU: 1 PID: 10661 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2272.854014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2272.855086] Call Trace: [ 2272.855461] dump_stack+0x107/0x167 [ 2272.855992] should_fail.cold+0x5/0xa [ 2272.856548] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2272.857344] ? create_object.isra.0+0x3a/0xa20 [ 2272.858000] should_failslab+0x5/0x20 [ 2272.858545] kmem_cache_alloc+0x5b/0x310 [ 2272.859093] ? mark_held_locks+0x9e/0xe0 [ 2272.859670] create_object.isra.0+0x3a/0xa20 [ 2272.860222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2272.860885] kmem_cache_alloc_node+0x169/0x330 [ 2272.861492] __alloc_skb+0x6d/0x5b0 [ 2272.861963] skb_segment+0x9d8/0x3aa0 [ 2272.862472] ? __lock_acquire+0xbb1/0x5b00 [ 2272.863047] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2272.863704] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.864363] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.864883] __udp_gso_segment+0x11c6/0x1830 [ 2272.865434] ? __sk_receive_skb+0x830/0x830 [ 2272.865989] udp4_ufo_fragment+0x528/0x720 [ 2272.866532] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2272.867171] inet_gso_segment+0x4fb/0x11a0 [ 2272.867742] skb_mac_gso_segment+0x273/0x570 [ 2272.868295] ? inet_sock_destruct+0x840/0x840 [ 2272.868859] ? skb_network_protocol+0x650/0x650 [ 2272.869441] ? skb_crc32c_csum_help+0x80/0x80 [ 2272.870011] ? lock_acquire+0x197/0x470 [ 2272.870518] ? __dev_queue_xmit+0x1c6/0x2690 [ 2272.871074] __skb_gso_segment+0x32d/0x6d0 [ 2272.871628] ? mark_lock+0xf5/0x2df0 [ 2272.872102] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2272.872763] ? lock_chain_count+0x20/0x20 [ 2272.873283] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2272.873859] __dev_queue_xmit+0x825/0x2690 [ 2272.874398] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2272.875044] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2272.875666] ? mark_held_locks+0x9e/0xe0 [ 2272.876184] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2272.876848] neigh_connected_output+0x382/0x4d0 [ 2272.877448] ip_finish_output2+0x6f1/0x21f0 [ 2272.877993] ? nf_hook_slow+0xfc/0x1e0 [ 2272.878485] ? ip_frag_next+0x9e0/0x9e0 [ 2272.878986] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2272.879643] __ip_finish_output.part.0+0x5f3/0xb50 [ 2272.880262] ? ip_fragment.constprop.0+0x240/0x240 [ 2272.880879] ? netif_rx_ni+0xe7/0x300 [ 2272.881367] ip_mc_output+0x401/0xa30 [ 2272.881849] ip_send_skb+0xdd/0x260 [ 2272.882317] udp_send_skb+0x6da/0x11d0 [ 2272.882821] udp_sendmsg+0x139a/0x2160 [ 2272.883334] ? mark_lock+0xf5/0x2df0 [ 2272.883810] ? ip_frag_init+0x350/0x350 [ 2272.884312] ? lock_chain_count+0x20/0x20 [ 2272.884839] ? udp_setsockopt+0xc0/0xc0 [ 2272.885337] ? mark_lock+0xf5/0x2df0 [ 2272.885806] ? lock_acquire+0x197/0x470 [ 2272.886312] ? lock_chain_count+0x20/0x20 [ 2272.886840] ? mark_lock+0xf5/0x2df0 [ 2272.887347] ? mark_lock+0xf5/0x2df0 [ 2272.887815] ? lock_chain_count+0x20/0x20 [ 2272.888336] ? __lock_acquire+0xbb1/0x5b00 [ 2272.888870] ? lock_chain_count+0x20/0x20 [ 2272.889405] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.890059] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.890580] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2272.891102] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.891772] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.892290] ? mark_lock+0xf5/0x2df0 [ 2272.892765] ? lock_acquire+0x197/0x470 [ 2272.893265] ? find_held_lock+0x2c/0x110 [ 2272.893789] ? __might_fault+0xd3/0x180 [ 2272.894291] ? lock_downgrade+0x6d0/0x6d0 [ 2272.894820] ? lock_downgrade+0x6d0/0x6d0 [ 2272.895648] ? sock_has_perm+0x1ea/0x280 [ 2272.896162] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2272.896818] ? _copy_from_user+0xfb/0x1b0 [ 2272.897357] ? __import_iovec+0x458/0x590 [ 2272.897884] ? udp_v6_push_pending_frames+0x360/0x360 [ 2272.898526] inet6_sendmsg+0x105/0x140 [ 2272.899007] ? inet6_compat_ioctl+0x320/0x320 [ 2272.900303] __sock_sendmsg+0xf2/0x190 [ 2272.901594] ____sys_sendmsg+0x70d/0x870 [ 2272.902940] ? sock_write_iter+0x3d0/0x3d0 [ 2272.903677] ? do_recvmmsg+0x6d0/0x6d0 [ 2272.904209] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.904756] ? lock_downgrade+0x6d0/0x6d0 [ 2272.905296] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2272.905941] ? SOFTIRQ_verbose+0x10/0x10 [ 2272.906448] ___sys_sendmsg+0xf3/0x170 [ 2272.906934] ? sendmsg_copy_msghdr+0x160/0x160 [ 2272.907548] ? __fget_files+0x2cf/0x520 [ 2272.908047] ? lock_downgrade+0x6d0/0x6d0 [ 2272.908565] ? find_held_lock+0x2c/0x110 [ 2272.909083] ? __fget_files+0x2f8/0x520 [ 2272.909623] ? __fget_light+0xea/0x290 [ 2272.910147] __sys_sendmsg+0xe5/0x1b0 [ 2272.910655] ? __sys_sendmsg_sock+0x40/0x40 [ 2272.911240] ? rcu_read_lock_any_held+0x75/0xa0 [ 2272.911876] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2272.912580] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2272.913270] ? trace_hardirqs_on+0x5b/0x180 [ 2272.913848] do_syscall_64+0x33/0x40 [ 2272.914348] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2272.915032] RIP: 0033:0x7f251a6f7b19 [ 2272.915600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2272.918275] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2272.919412] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2272.920358] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2272.921303] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2272.922247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2272.923203] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:49:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x3f000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:49:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:49:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 51) 09:49:59 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x28, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:49:59 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:59 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 50) 09:49:59 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a2", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2288.301295] FAULT_INJECTION: forcing a failure. [ 2288.301295] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.302917] CPU: 0 PID: 10684 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2288.307916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2288.309071] Call Trace: [ 2288.309449] dump_stack+0x107/0x167 [ 2288.309967] should_fail.cold+0x5/0xa [ 2288.310514] should_failslab+0x5/0x20 [ 2288.311054] __kmalloc_node_track_caller+0x74/0x3b0 [ 2288.311771] ? skb_segment+0x9d8/0x3aa0 [ 2288.312331] __alloc_skb+0xb1/0x5b0 [ 2288.312850] skb_segment+0x9d8/0x3aa0 [ 2288.313384] ? __lock_acquire+0xbb1/0x5b00 [ 2288.314014] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2288.314716] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.315451] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.316053] __udp_gso_segment+0x11c6/0x1830 [ 2288.316674] ? __sk_receive_skb+0x830/0x830 [ 2288.317292] udp4_ufo_fragment+0x528/0x720 [ 2288.317891] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2288.318597] inet_gso_segment+0x4fb/0x11a0 [ 2288.319205] skb_mac_gso_segment+0x273/0x570 [ 2288.319849] ? inet_sock_destruct+0x840/0x840 [ 2288.320474] ? skb_network_protocol+0x650/0x650 [ 2288.321121] ? skb_crc32c_csum_help+0x80/0x80 [ 2288.321749] ? lock_acquire+0x197/0x470 [ 2288.322302] ? __dev_queue_xmit+0x1c6/0x2690 [ 2288.322922] __skb_gso_segment+0x32d/0x6d0 [ 2288.323520] ? mark_lock+0xf5/0x2df0 [ 2288.324075] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2288.324807] ? lock_chain_count+0x20/0x20 [ 2288.325389] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2288.326026] __dev_queue_xmit+0x825/0x2690 [ 2288.326624] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2288.327337] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2288.332016] ? mark_held_locks+0x9e/0xe0 [ 2288.332591] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2288.333331] neigh_connected_output+0x382/0x4d0 [ 2288.333997] ip_finish_output2+0x6f1/0x21f0 [ 2288.334609] ? nf_hook_slow+0xfc/0x1e0 [ 2288.335168] ? ip_frag_next+0x9e0/0x9e0 [ 2288.335728] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2288.336441] __ip_finish_output.part.0+0x5f3/0xb50 [ 2288.337125] ? ip_fragment.constprop.0+0x240/0x240 [ 2288.337795] ? netif_rx_ni+0xe7/0x300 [ 2288.338342] ip_mc_output+0x401/0xa30 [ 2288.338888] ip_send_skb+0xdd/0x260 [ 2288.339416] udp_send_skb+0x6da/0x11d0 [ 2288.339999] udp_sendmsg+0x139a/0x2160 [ 2288.340555] ? mark_lock+0xf5/0x2df0 [ 2288.341079] ? ip_frag_init+0x350/0x350 [ 2288.341652] ? lock_chain_count+0x20/0x20 [ 2288.342233] ? udp_setsockopt+0xc0/0xc0 [ 2288.342802] ? mark_lock+0xf5/0x2df0 [ 2288.343329] ? lock_acquire+0x197/0x470 [ 2288.343916] ? lock_chain_count+0x20/0x20 [ 2288.344500] ? mark_lock+0xf5/0x2df0 [ 2288.345028] ? mark_lock+0xf5/0x2df0 [ 2288.345559] ? lock_chain_count+0x20/0x20 [ 2288.346158] ? __lock_acquire+0xbb1/0x5b00 [ 2288.346757] ? lock_chain_count+0x20/0x20 [ 2288.347351] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.348098] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.348684] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2288.349271] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.350021] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.350606] ? mark_lock+0xf5/0x2df0 [ 2288.351140] ? lock_acquire+0x197/0x470 [ 2288.355712] ? find_held_lock+0x2c/0x110 [ 2288.356311] ? __might_fault+0xd3/0x180 [ 2288.356869] ? lock_downgrade+0x6d0/0x6d0 [ 2288.357459] ? lock_downgrade+0x6d0/0x6d0 [ 2288.358053] ? sock_has_perm+0x1ea/0x280 [ 2288.358620] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2288.359350] ? _copy_from_user+0xfb/0x1b0 [ 2288.359962] ? __import_iovec+0x458/0x590 [ 2288.360552] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.361277] inet6_sendmsg+0x105/0x140 [ 2288.361823] ? inet6_compat_ioctl+0x320/0x320 [ 2288.362444] __sock_sendmsg+0xf2/0x190 [ 2288.362996] ____sys_sendmsg+0x70d/0x870 [ 2288.363574] ? sock_write_iter+0x3d0/0x3d0 [ 2288.364184] ? do_recvmmsg+0x6d0/0x6d0 [ 2288.364740] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.365305] ? lock_downgrade+0x6d0/0x6d0 [ 2288.365899] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.366628] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.367200] ___sys_sendmsg+0xf3/0x170 [ 2288.367769] ? sendmsg_copy_msghdr+0x160/0x160 [ 2288.368428] ? __fget_files+0x2cf/0x520 [ 2288.368981] ? lock_downgrade+0x6d0/0x6d0 [ 2288.369565] ? find_held_lock+0x2c/0x110 [ 2288.370147] ? __fget_files+0x2f8/0x520 [ 2288.370724] ? __fget_light+0xea/0x290 [ 2288.371285] __sys_sendmsg+0xe5/0x1b0 [ 2288.375863] ? __sys_sendmsg_sock+0x40/0x40 [ 2288.376476] ? rcu_read_lock_any_held+0x75/0xa0 [ 2288.377153] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2288.377899] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2288.378621] ? trace_hardirqs_on+0x5b/0x180 [ 2288.379239] do_syscall_64+0x33/0x40 [ 2288.379804] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2288.380549] RIP: 0033:0x7f251a6f7b19 [ 2288.381075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2288.383640] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2288.384705] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2288.385680] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2288.386654] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2288.387628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2288.388660] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2288.410043] FAULT_INJECTION: forcing a failure. [ 2288.410043] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.411583] CPU: 0 PID: 10688 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2288.412556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2288.413705] Call Trace: [ 2288.414083] dump_stack+0x107/0x167 [ 2288.414595] should_fail.cold+0x5/0xa 09:49:59 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:49:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x7f000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2288.415131] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2288.415884] ? create_object.isra.0+0x3a/0xa20 [ 2288.416533] should_failslab+0x5/0x20 [ 2288.417062] kmem_cache_alloc+0x5b/0x310 [ 2288.417618] create_object.isra.0+0x3a/0xa20 [ 2288.428358] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2288.429091] kmem_cache_alloc_node+0x169/0x330 [ 2288.429760] __alloc_skb+0x6d/0x5b0 [ 2288.430291] skb_segment+0x9d8/0x3aa0 [ 2288.430845] ? __lock_acquire+0xbb1/0x5b00 [ 2288.431489] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2288.432231] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.432983] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.433558] __udp_gso_segment+0x11c6/0x1830 [ 2288.434178] ? __sk_receive_skb+0x830/0x830 [ 2288.434788] udp4_ufo_fragment+0x528/0x720 [ 2288.435387] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2288.436115] inet_gso_segment+0x4fb/0x11a0 [ 2288.436732] skb_mac_gso_segment+0x273/0x570 [ 2288.437364] ? inet_sock_destruct+0x840/0x840 [ 2288.438001] ? skb_network_protocol+0x650/0x650 [ 2288.438658] ? skb_crc32c_csum_help+0x80/0x80 [ 2288.439301] ? lock_acquire+0x197/0x470 [ 2288.439878] ? __dev_queue_xmit+0x1c6/0x2690 [ 2288.440510] __skb_gso_segment+0x32d/0x6d0 [ 2288.441103] ? mark_lock+0xf5/0x2df0 [ 2288.441645] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2288.442380] ? lock_chain_count+0x20/0x20 [ 2288.442977] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2288.443634] __dev_queue_xmit+0x825/0x2690 [ 2288.444255] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2288.444987] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2288.445646] ? mark_held_locks+0x9e/0xe0 [ 2288.446235] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2288.446986] neigh_connected_output+0x382/0x4d0 [ 2288.447662] ip_finish_output2+0x6f1/0x21f0 [ 2288.452319] ? nf_hook_slow+0xfc/0x1e0 [ 2288.452890] ? ip_frag_next+0x9e0/0x9e0 [ 2288.453469] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2288.454180] __ip_finish_output.part.0+0x5f3/0xb50 [ 2288.454892] ? ip_fragment.constprop.0+0x240/0x240 [ 2288.455593] ? netif_rx_ni+0xe7/0x300 [ 2288.456164] ip_mc_output+0x401/0xa30 [ 2288.456722] ip_send_skb+0xdd/0x260 [ 2288.457250] udp_send_skb+0x6da/0x11d0 [ 2288.457836] udp_sendmsg+0x139a/0x2160 [ 2288.458384] ? mark_lock+0xf5/0x2df0 [ 2288.458937] ? ip_frag_init+0x350/0x350 [ 2288.459500] ? lock_chain_count+0x20/0x20 [ 2288.460141] ? udp_setsockopt+0xc0/0xc0 [ 2288.460706] ? mark_lock+0xf5/0x2df0 [ 2288.461262] ? lock_acquire+0x197/0x470 [ 2288.461827] ? lock_chain_count+0x20/0x20 [ 2288.462436] ? mark_lock+0xf5/0x2df0 [ 2288.462979] ? mark_lock+0xf5/0x2df0 [ 2288.463513] ? lock_chain_count+0x20/0x20 [ 2288.464137] ? __lock_acquire+0xbb1/0x5b00 [ 2288.464743] ? lock_chain_count+0x20/0x20 [ 2288.465361] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.466110] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.466714] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2288.467316] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.468079] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.468683] ? mark_lock+0xf5/0x2df0 [ 2288.469222] ? lock_acquire+0x197/0x470 [ 2288.469808] ? find_held_lock+0x2c/0x110 [ 2288.470407] ? __might_fault+0xd3/0x180 [ 2288.470989] ? lock_downgrade+0x6d0/0x6d0 [ 2288.471590] ? lock_downgrade+0x6d0/0x6d0 [ 2288.476254] ? sock_has_perm+0x1ea/0x280 [ 2288.476839] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2288.477594] ? _copy_from_user+0xfb/0x1b0 [ 2288.478204] ? __import_iovec+0x458/0x590 [ 2288.478809] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.479566] inet6_sendmsg+0x105/0x140 [ 2288.480153] ? inet6_compat_ioctl+0x320/0x320 [ 2288.480812] __sock_sendmsg+0xf2/0x190 [ 2288.481387] ____sys_sendmsg+0x70d/0x870 [ 2288.481980] ? sock_write_iter+0x3d0/0x3d0 [ 2288.482596] ? do_recvmmsg+0x6d0/0x6d0 [ 2288.483166] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.483769] ? lock_downgrade+0x6d0/0x6d0 [ 2288.484350] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.485075] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.485661] ___sys_sendmsg+0xf3/0x170 [ 2288.486217] ? sendmsg_copy_msghdr+0x160/0x160 [ 2288.486888] ? __fget_files+0x2cf/0x520 [ 2288.487457] ? lock_downgrade+0x6d0/0x6d0 [ 2288.488075] ? find_held_lock+0x2c/0x110 [ 2288.488674] ? __fget_files+0x2f8/0x520 [ 2288.489246] ? __fget_light+0xea/0x290 [ 2288.489814] __sys_sendmsg+0xe5/0x1b0 [ 2288.490359] ? __sys_sendmsg_sock+0x40/0x40 [ 2288.490975] ? rcu_read_lock_any_held+0x75/0xa0 [ 2288.491643] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2288.492404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2288.493131] ? trace_hardirqs_on+0x5b/0x180 [ 2288.493743] do_syscall_64+0x33/0x40 [ 2288.494282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2288.494999] RIP: 0033:0x7f3f9ec55b19 [ 2288.495536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2288.502155] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2288.503241] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2288.504276] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2288.505294] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2288.506301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2288.507313] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:49:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 52) [ 2288.606019] FAULT_INJECTION: forcing a failure. [ 2288.606019] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.607533] CPU: 1 PID: 10709 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2288.608441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2288.609505] Call Trace: [ 2288.609859] dump_stack+0x107/0x167 [ 2288.610344] should_fail.cold+0x5/0xa [ 2288.610855] ? ___slab_alloc+0x360/0x700 [ 2288.611391] ? create_object.isra.0+0x3a/0xa20 [ 2288.612027] should_failslab+0x5/0x20 [ 2288.612523] kmem_cache_alloc+0x5b/0x310 [ 2288.613059] create_object.isra.0+0x3a/0xa20 [ 2288.613641] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2288.614319] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2288.614988] ? skb_segment+0x9d8/0x3aa0 [ 2288.615513] __alloc_skb+0xb1/0x5b0 [ 2288.616493] skb_segment+0x9d8/0x3aa0 [ 2288.617720] ? __lock_acquire+0xbb1/0x5b00 [ 2288.619106] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2288.620133] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.620815] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.621356] __udp_gso_segment+0x11c6/0x1830 [ 2288.621930] ? __sk_receive_skb+0x830/0x830 [ 2288.622511] udp4_ufo_fragment+0x528/0x720 [ 2288.623073] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2288.623790] inet_gso_segment+0x4fb/0x11a0 [ 2288.625016] skb_mac_gso_segment+0x273/0x570 [ 2288.626227] ? inet_sock_destruct+0x840/0x840 [ 2288.627433] ? skb_network_protocol+0x650/0x650 [ 2288.628768] ? skb_crc32c_csum_help+0x80/0x80 [ 2288.630023] ? lock_acquire+0x197/0x470 [ 2288.631079] ? __dev_queue_xmit+0x1c6/0x2690 [ 2288.632018] __skb_gso_segment+0x32d/0x6d0 [ 2288.632573] ? mark_lock+0xf5/0x2df0 [ 2288.633075] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2288.633758] ? lock_chain_count+0x20/0x20 [ 2288.634300] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2288.634918] __dev_queue_xmit+0x825/0x2690 [ 2288.635483] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2288.636228] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2288.636834] ? mark_held_locks+0x9e/0xe0 [ 2288.637366] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2288.638060] neigh_connected_output+0x382/0x4d0 [ 2288.638685] ip_finish_output2+0x6f1/0x21f0 [ 2288.639257] ? nf_hook_slow+0xfc/0x1e0 [ 2288.639831] ? ip_frag_next+0x9e0/0x9e0 [ 2288.640363] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2288.641035] __ip_finish_output.part.0+0x5f3/0xb50 [ 2288.641689] ? ip_fragment.constprop.0+0x240/0x240 [ 2288.642338] ? netif_rx_ni+0xe7/0x300 [ 2288.642851] ip_mc_output+0x401/0xa30 [ 2288.643345] ip_send_skb+0xdd/0x260 [ 2288.643877] udp_send_skb+0x6da/0x11d0 [ 2288.644402] udp_sendmsg+0x139a/0x2160 [ 2288.644924] ? mark_lock+0xf5/0x2df0 [ 2288.645429] ? ip_frag_init+0x350/0x350 [ 2288.645961] ? lock_chain_count+0x20/0x20 [ 2288.646517] ? mark_lock+0xf5/0x2df0 [ 2288.647010] ? udp_setsockopt+0xc0/0xc0 [ 2288.647555] ? __bad_area_nosemaphore+0xa1/0x310 [ 2288.648256] ? mark_lock+0xf5/0x2df0 [ 2288.648766] ? mark_lock+0xf5/0x2df0 [ 2288.649264] ? lock_chain_count+0x20/0x20 [ 2288.649842] ? lock_chain_count+0x20/0x20 [ 2288.650407] ? mark_lock+0xf5/0x2df0 [ 2288.650940] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2288.651494] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.652210] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.652754] ? mark_lock+0xf5/0x2df0 [ 2288.653274] ? lock_acquire+0x197/0x470 [ 2288.653805] ? find_held_lock+0x2c/0x110 [ 2288.654371] ? __might_fault+0xd3/0x180 [ 2288.654900] ? lock_downgrade+0x6d0/0x6d0 [ 2288.655476] ? lock_downgrade+0x6d0/0x6d0 [ 2288.656040] ? sock_has_perm+0x1ea/0x280 [ 2288.656595] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2288.657289] ? _copy_from_user+0xfb/0x1b0 [ 2288.657854] ? __import_iovec+0x458/0x590 [ 2288.658426] ? udp_v6_push_pending_frames+0x360/0x360 [ 2288.659110] inet6_sendmsg+0x105/0x140 [ 2288.659652] ? inet6_compat_ioctl+0x320/0x320 [ 2288.660251] __sock_sendmsg+0xf2/0x190 [ 2288.660776] ____sys_sendmsg+0x70d/0x870 [ 2288.661312] ? sock_write_iter+0x3d0/0x3d0 [ 2288.661886] ? do_recvmmsg+0x6d0/0x6d0 [ 2288.662405] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.662965] ? lock_downgrade+0x6d0/0x6d0 [ 2288.663518] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2288.664287] ? SOFTIRQ_verbose+0x10/0x10 [ 2288.664842] ___sys_sendmsg+0xf3/0x170 [ 2288.665371] ? sendmsg_copy_msghdr+0x160/0x160 [ 2288.665990] ? __fget_files+0x2cf/0x520 [ 2288.666528] ? lock_downgrade+0x6d0/0x6d0 [ 2288.667096] ? find_held_lock+0x2c/0x110 [ 2288.667656] ? __fget_files+0x2f8/0x520 [ 2288.668328] ? __fget_light+0xea/0x290 [ 2288.668964] __sys_sendmsg+0xe5/0x1b0 [ 2288.669566] ? __sys_sendmsg_sock+0x40/0x40 [ 2288.670260] ? rcu_read_lock_any_held+0x75/0xa0 [ 2288.671011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2288.671851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2288.672668] ? trace_hardirqs_on+0x5b/0x180 [ 2288.673357] do_syscall_64+0x33/0x40 [ 2288.673940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2288.674753] RIP: 0033:0x7f251a6f7b19 [ 2288.675342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2288.677827] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2288.678836] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2288.679904] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2288.681806] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2288.683755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2288.686118] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:49:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x36, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:50:15 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:50:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xc8050000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 53) 09:50:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a2", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:50:15 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:15 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 51) 09:50:15 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x60, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2304.677051] FAULT_INJECTION: forcing a failure. [ 2304.677051] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.678489] CPU: 1 PID: 10729 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2304.679338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2304.680429] Call Trace: [ 2304.680762] dump_stack+0x107/0x167 [ 2304.681212] should_fail.cold+0x5/0xa [ 2304.681685] ? trace_hardirqs_on+0x5b/0x180 [ 2304.682215] ? __alloc_skb+0x6d/0x5b0 [ 2304.682688] should_failslab+0x5/0x20 [ 2304.683157] kmem_cache_alloc_node+0x55/0x330 [ 2304.683711] __alloc_skb+0x6d/0x5b0 [ 2304.684163] skb_segment+0x9d8/0x3aa0 [ 2304.684685] ? __lock_acquire+0xbb1/0x5b00 [ 2304.685231] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2304.685843] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2304.686482] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.686985] __udp_gso_segment+0x11c6/0x1830 [ 2304.687522] ? __sk_receive_skb+0x830/0x830 [ 2304.688056] udp4_ufo_fragment+0x528/0x720 [ 2304.688617] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2304.689229] inet_gso_segment+0x4fb/0x11a0 [ 2304.689757] skb_mac_gso_segment+0x273/0x570 [ 2304.690294] ? inet_sock_destruct+0x840/0x840 [ 2304.690845] ? skb_network_protocol+0x650/0x650 [ 2304.691410] ? skb_crc32c_csum_help+0x80/0x80 [ 2304.691957] ? lock_acquire+0x197/0x470 [ 2304.692490] ? __dev_queue_xmit+0x1c6/0x2690 [ 2304.693035] __skb_gso_segment+0x32d/0x6d0 [ 2304.693553] ? mark_lock+0xf5/0x2df0 [ 2304.694012] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2304.694653] ? lock_chain_count+0x20/0x20 [ 2304.695159] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2304.695719] __dev_queue_xmit+0x825/0x2690 [ 2304.696240] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2304.696914] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2304.697483] ? mark_held_locks+0x9e/0xe0 [ 2304.697987] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2304.698664] neigh_connected_output+0x382/0x4d0 [ 2304.699275] ip_finish_output2+0x6f1/0x21f0 [ 2304.699832] ? nf_hook_slow+0xfc/0x1e0 [ 2304.700480] ? ip_frag_next+0x9e0/0x9e0 [ 2304.700970] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2304.701594] __ip_finish_output.part.0+0x5f3/0xb50 [ 2304.702208] ? ip_fragment.constprop.0+0x240/0x240 [ 2304.702810] ? netif_rx_ni+0xe7/0x300 [ 2304.703282] ip_mc_output+0x401/0xa30 [ 2304.703761] ip_send_skb+0xdd/0x260 [ 2304.704212] udp_send_skb+0x6da/0x11d0 [ 2304.704755] udp_sendmsg+0x139a/0x2160 [ 2304.705232] ? mark_lock+0xf5/0x2df0 [ 2304.705690] ? ip_frag_init+0x350/0x350 [ 2304.706178] ? lock_chain_count+0x20/0x20 [ 2304.706691] ? lock_chain_count+0x20/0x20 [ 2304.707196] ? mark_lock+0xf5/0x2df0 [ 2304.707660] ? udp_setsockopt+0xc0/0xc0 [ 2304.708154] ? __bad_area_nosemaphore+0xa1/0x310 [ 2304.708784] ? lock_chain_count+0x20/0x20 [ 2304.709294] ? mark_lock+0xf5/0x2df0 [ 2304.709753] ? mark_lock+0xf5/0x2df0 [ 2304.710209] ? lock_chain_count+0x20/0x20 [ 2304.710720] ? lock_chain_count+0x20/0x20 [ 2304.711238] ? mark_lock+0xf5/0x2df0 [ 2304.711702] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2304.712212] ? udp_v6_push_pending_frames+0x360/0x360 [ 2304.712909] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.713420] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2304.714062] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2304.714721] ? trace_hardirqs_on+0x5b/0x180 [ 2304.715250] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2304.715922] ? sock_has_perm+0x7f/0x280 [ 2304.716481] ? sock_has_perm+0xdc/0x280 [ 2304.716969] ? sock_has_perm+0x1ea/0x280 [ 2304.717466] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2304.718100] ? _copy_from_user+0xfb/0x1b0 [ 2304.718617] ? __import_iovec+0x458/0x590 [ 2304.719125] ? udp_v6_push_pending_frames+0x360/0x360 [ 2304.719759] inet6_sendmsg+0x105/0x140 [ 2304.720238] ? inet6_compat_ioctl+0x320/0x320 [ 2304.724904] __sock_sendmsg+0xf2/0x190 [ 2304.725385] ____sys_sendmsg+0x70d/0x870 [ 2304.725885] ? sock_write_iter+0x3d0/0x3d0 [ 2304.726401] ? do_recvmmsg+0x6d0/0x6d0 [ 2304.726882] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.727388] ___sys_sendmsg+0xf3/0x170 [ 2304.727867] ? sendmsg_copy_msghdr+0x160/0x160 [ 2304.728447] ? __fget_files+0x2cf/0x520 [ 2304.728937] ? lock_downgrade+0x6d0/0x6d0 [ 2304.729451] ? clockevents_program_event+0x14b/0x360 [ 2304.730077] ? __fget_files+0x2f8/0x520 [ 2304.730572] ? __fget_light+0xea/0x290 [ 2304.731055] __sys_sendmsg+0xe5/0x1b0 [ 2304.731523] ? __sys_sendmsg_sock+0x40/0x40 [ 2304.732067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2304.732726] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2304.733354] ? trace_hardirqs_on+0x5b/0x180 [ 2304.733884] do_syscall_64+0x33/0x40 [ 2304.734343] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2304.734974] RIP: 0033:0x7f251a6f7b19 [ 2304.735432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2304.737767] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2304.738705] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2304.739577] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2304.756715] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2304.757593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2304.760795] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2304.824366] FAULT_INJECTION: forcing a failure. [ 2304.824366] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.825856] CPU: 0 PID: 10719 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2304.826762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2304.827849] Call Trace: [ 2304.828203] dump_stack+0x107/0x167 [ 2304.828720] should_fail.cold+0x5/0xa [ 2304.829230] should_failslab+0x5/0x20 [ 2304.829733] __kmalloc_node_track_caller+0x74/0x3b0 [ 2304.830390] ? skb_segment+0x9d8/0x3aa0 [ 2304.830919] __alloc_skb+0xb1/0x5b0 [ 2304.831402] skb_segment+0x9d8/0x3aa0 [ 2304.831906] ? __lock_acquire+0xbb1/0x5b00 [ 2304.832532] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2304.833201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2304.833890] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.834423] __udp_gso_segment+0x11c6/0x1830 [ 2304.834992] ? __sk_receive_skb+0x830/0x830 [ 2304.835559] udp4_ufo_fragment+0x528/0x720 [ 2304.836116] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2304.836789] inet_gso_segment+0x4fb/0x11a0 [ 2304.837347] skb_mac_gso_segment+0x273/0x570 [ 2304.837916] ? inet_sock_destruct+0x840/0x840 [ 2304.838496] ? skb_network_protocol+0x650/0x650 [ 2304.839092] ? skb_crc32c_csum_help+0x80/0x80 [ 2304.839670] ? lock_acquire+0x197/0x470 [ 2304.840180] ? __dev_queue_xmit+0x1c6/0x2690 [ 2304.840825] __skb_gso_segment+0x32d/0x6d0 [ 2304.841372] ? mark_lock+0xf5/0x2df0 [ 2304.841859] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2304.842535] ? lock_chain_count+0x20/0x20 [ 2304.843068] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2304.843661] __dev_queue_xmit+0x825/0x2690 [ 2304.844213] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2304.844889] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2304.845487] ? mark_held_locks+0x9e/0xe0 [ 2304.846017] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2304.846700] neigh_connected_output+0x382/0x4d0 [ 2304.847315] ip_finish_output2+0x6f1/0x21f0 [ 2304.847877] ? nf_hook_slow+0xfc/0x1e0 [ 2304.848396] ? ip_frag_next+0x9e0/0x9e0 [ 2304.848913] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2304.849567] __ip_finish_output.part.0+0x5f3/0xb50 [ 2304.850202] ? ip_fragment.constprop.0+0x240/0x240 [ 2304.850836] ? netif_rx_ni+0xe7/0x300 [ 2304.851334] ip_mc_output+0x401/0xa30 [ 2304.851840] ip_send_skb+0xdd/0x260 [ 2304.852329] udp_send_skb+0x6da/0x11d0 [ 2304.852850] udp_sendmsg+0x139a/0x2160 [ 2304.853352] ? mark_lock+0xf5/0x2df0 [ 2304.853836] ? ip_frag_init+0x350/0x350 [ 2304.854350] ? lock_chain_count+0x20/0x20 [ 2304.854891] ? udp_setsockopt+0xc0/0xc0 [ 2304.855401] ? mark_lock+0xf5/0x2df0 [ 2304.855884] ? lock_acquire+0x197/0x470 [ 2304.856424] ? lock_chain_count+0x20/0x20 [ 2304.856963] ? mark_lock+0xf5/0x2df0 [ 2304.857448] ? mark_lock+0xf5/0x2df0 [ 2304.857930] ? lock_chain_count+0x20/0x20 [ 2304.858465] ? __lock_acquire+0xbb1/0x5b00 [ 2304.859017] ? lock_chain_count+0x20/0x20 [ 2304.859567] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2304.860239] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.860792] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2304.861331] ? udp_v6_push_pending_frames+0x360/0x360 [ 2304.861995] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.862526] ? mark_lock+0xf5/0x2df0 [ 2304.863013] ? lock_acquire+0x197/0x470 [ 2304.863527] ? find_held_lock+0x2c/0x110 [ 2304.864056] ? __might_fault+0xd3/0x180 [ 2304.864587] ? lock_downgrade+0x6d0/0x6d0 [ 2304.865126] ? lock_downgrade+0x6d0/0x6d0 [ 2304.865668] ? sock_has_perm+0x1ea/0x280 [ 2304.866193] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2304.866865] ? _copy_from_user+0xfb/0x1b0 [ 2304.867413] ? __import_iovec+0x458/0x590 [ 2304.867951] ? udp_v6_push_pending_frames+0x360/0x360 [ 2304.868641] inet6_sendmsg+0x105/0x140 [ 2304.869144] ? inet6_compat_ioctl+0x320/0x320 [ 2304.869725] __sock_sendmsg+0xf2/0x190 [ 2304.870230] ____sys_sendmsg+0x70d/0x870 [ 2304.870758] ? sock_write_iter+0x3d0/0x3d0 [ 2304.871301] ? do_recvmmsg+0x6d0/0x6d0 [ 2304.871807] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.872338] ? lock_downgrade+0x6d0/0x6d0 [ 2304.872884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2304.873559] ? SOFTIRQ_verbose+0x10/0x10 [ 2304.874088] ___sys_sendmsg+0xf3/0x170 [ 2304.874594] ? sendmsg_copy_msghdr+0x160/0x160 [ 2304.875189] ? __fget_files+0x2cf/0x520 [ 2304.875704] ? lock_downgrade+0x6d0/0x6d0 [ 2304.876239] ? find_held_lock+0x2c/0x110 [ 2304.876790] ? __fget_files+0x2f8/0x520 [ 2304.877310] ? __fget_light+0xea/0x290 [ 2304.877823] __sys_sendmsg+0xe5/0x1b0 [ 2304.878314] ? __sys_sendmsg_sock+0x40/0x40 [ 2304.878873] ? rcu_read_lock_any_held+0x75/0xa0 [ 2304.879492] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2304.880169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2304.880850] ? trace_hardirqs_on+0x5b/0x180 [ 2304.881409] do_syscall_64+0x33/0x40 [ 2304.881895] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2304.882556] RIP: 0033:0x7f3f9ec55b19 [ 2304.883038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2304.885418] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2304.886401] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2304.887321] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2304.888240] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2304.889171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2304.890090] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:50:16 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:16 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 52) [ 2305.030866] FAULT_INJECTION: forcing a failure. [ 2305.030866] name failslab, interval 1, probability 0, space 0, times 0 09:50:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xe8030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 54) 09:50:16 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2305.032067] CPU: 1 PID: 10746 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2305.032954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.033967] Call Trace: [ 2305.034295] dump_stack+0x107/0x167 [ 2305.034745] should_fail.cold+0x5/0xa [ 2305.035216] ? create_object.isra.0+0x3a/0xa20 [ 2305.035779] should_failslab+0x5/0x20 [ 2305.036252] kmem_cache_alloc+0x5b/0x310 [ 2305.036770] create_object.isra.0+0x3a/0xa20 [ 2305.037307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2305.037934] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2305.038557] ? skb_segment+0x9d8/0x3aa0 [ 2305.039050] __alloc_skb+0xb1/0x5b0 [ 2305.039501] skb_segment+0x9d8/0x3aa0 [ 2305.039969] ? mark_lock+0xf5/0x2df0 [ 2305.040449] ? __lock_acquire+0xbb1/0x5b00 [ 2305.040995] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2305.041610] ? mark_held_locks+0x9e/0xe0 [ 2305.042123] __udp_gso_segment+0x11c6/0x1830 [ 2305.042663] ? __sk_receive_skb+0x830/0x830 [ 2305.043191] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2305.043860] udp4_ufo_fragment+0x528/0x720 [ 2305.044400] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2305.045013] inet_gso_segment+0x4fb/0x11a0 [ 2305.045548] skb_mac_gso_segment+0x273/0x570 [ 2305.046089] ? inet_sock_destruct+0x840/0x840 [ 2305.046638] ? skb_network_protocol+0x650/0x650 [ 2305.047204] ? skb_crc32c_csum_help+0x80/0x80 [ 2305.047753] ? lock_acquire+0x197/0x470 [ 2305.048244] ? __dev_queue_xmit+0x1c6/0x2690 [ 2305.048803] __skb_gso_segment+0x32d/0x6d0 [ 2305.049328] ? mark_lock+0xf5/0x2df0 [ 2305.049788] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2305.050429] ? lock_chain_count+0x20/0x20 [ 2305.050936] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2305.051502] __dev_queue_xmit+0x825/0x2690 [ 2305.052025] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2305.052674] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2305.053242] ? mark_held_locks+0x9e/0xe0 [ 2305.053744] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2305.054391] neigh_connected_output+0x382/0x4d0 [ 2305.054974] ip_finish_output2+0x6f1/0x21f0 [ 2305.055510] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2305.056175] ? ip_frag_next+0x9e0/0x9e0 [ 2305.056685] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2305.057305] __ip_finish_output.part.0+0x5f3/0xb50 [ 2305.057909] ? ip_fragment.constprop.0+0x240/0x240 [ 2305.058515] ? netif_rx_ni+0xe7/0x300 [ 2305.058987] ip_mc_output+0x401/0xa30 [ 2305.059459] ip_send_skb+0xdd/0x260 [ 2305.059910] udp_send_skb+0x6da/0x11d0 [ 2305.060410] udp_sendmsg+0x139a/0x2160 [ 2305.060891] ? mark_lock+0xf5/0x2df0 [ 2305.061356] ? ip_frag_init+0x350/0x350 [ 2305.061845] ? lock_chain_count+0x20/0x20 [ 2305.062356] ? udp_setsockopt+0xc0/0xc0 [ 2305.062841] ? mark_lock+0xf5/0x2df0 [ 2305.063300] ? lock_acquire+0x197/0x470 [ 2305.063791] ? lock_chain_count+0x20/0x20 [ 2305.064307] ? mark_lock+0xf5/0x2df0 [ 2305.064774] ? mark_lock+0xf5/0x2df0 [ 2305.065231] ? lock_chain_count+0x20/0x20 [ 2305.065738] ? __lock_acquire+0xbb1/0x5b00 [ 2305.066257] ? lock_chain_count+0x20/0x20 [ 2305.066775] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.067415] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.067923] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2305.068132] FAULT_INJECTION: forcing a failure. [ 2305.068132] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.068442] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.070486] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.070987] ? mark_lock+0xf5/0x2df0 [ 2305.071455] ? lock_acquire+0x197/0x470 [ 2305.071941] ? find_held_lock+0x2c/0x110 [ 2305.072479] ? __might_fault+0xd3/0x180 [ 2305.072967] ? lock_downgrade+0x6d0/0x6d0 [ 2305.073477] ? lock_downgrade+0x6d0/0x6d0 [ 2305.073990] ? sock_has_perm+0x1ea/0x280 [ 2305.074493] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2305.075128] ? _copy_from_user+0xfb/0x1b0 [ 2305.075646] ? __import_iovec+0x458/0x590 [ 2305.076155] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.077502] inet6_sendmsg+0x105/0x140 [ 2305.078622] ? inet6_compat_ioctl+0x320/0x320 [ 2305.079912] __sock_sendmsg+0xf2/0x190 [ 2305.080877] ____sys_sendmsg+0x70d/0x870 [ 2305.081382] ? sock_write_iter+0x3d0/0x3d0 [ 2305.081901] ? do_recvmmsg+0x6d0/0x6d0 [ 2305.082384] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.082883] ? lock_downgrade+0x6d0/0x6d0 [ 2305.083396] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.084039] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.084650] ___sys_sendmsg+0xf3/0x170 [ 2305.085132] ? sendmsg_copy_msghdr+0x160/0x160 [ 2305.085697] ? __fget_files+0x2cf/0x520 [ 2305.086185] ? lock_downgrade+0x6d0/0x6d0 [ 2305.086695] ? find_held_lock+0x2c/0x110 [ 2305.087201] ? __fget_files+0x2f8/0x520 [ 2305.087697] ? __fget_light+0xea/0x290 [ 2305.088181] __sys_sendmsg+0xe5/0x1b0 [ 2305.089132] ? __sys_sendmsg_sock+0x40/0x40 [ 2305.090206] ? rcu_read_lock_any_held+0x75/0xa0 [ 2305.091381] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2305.092725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2305.094011] ? trace_hardirqs_on+0x5b/0x180 [ 2305.095084] do_syscall_64+0x33/0x40 [ 2305.095998] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2305.096802] RIP: 0033:0x7f3f9ec55b19 [ 2305.097262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.099514] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2305.100527] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2305.101402] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2305.102277] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2305.103153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.104029] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2305.104966] CPU: 0 PID: 10752 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2305.105872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.106943] Call Trace: [ 2305.107289] dump_stack+0x107/0x167 [ 2305.107764] should_fail.cold+0x5/0xa [ 2305.108259] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2305.109000] ? create_object.isra.0+0x3a/0xa20 [ 2305.109597] should_failslab+0x5/0x20 [ 2305.110090] kmem_cache_alloc+0x5b/0x310 [ 2305.110615] ? mark_held_locks+0x9e/0xe0 [ 2305.111145] create_object.isra.0+0x3a/0xa20 [ 2305.111712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2305.112453] kmem_cache_alloc_node+0x169/0x330 [ 2305.113048] __alloc_skb+0x6d/0x5b0 [ 2305.113747] skb_segment+0x9d8/0x3aa0 [ 2305.114246] ? __lock_acquire+0xbb1/0x5b00 [ 2305.114823] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2305.115473] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.116160] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.116739] __udp_gso_segment+0x11c6/0x1830 [ 2305.117351] ? __sk_receive_skb+0x830/0x830 [ 2305.117939] udp4_ufo_fragment+0x528/0x720 [ 2305.118554] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2305.119266] inet_gso_segment+0x4fb/0x11a0 09:50:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x1f4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2305.119890] skb_mac_gso_segment+0x273/0x570 [ 2305.120529] ? inet_sock_destruct+0x840/0x840 [ 2305.121108] ? skb_network_protocol+0x650/0x650 [ 2305.121711] ? skb_crc32c_csum_help+0x80/0x80 [ 2305.122290] ? lock_acquire+0x197/0x470 [ 2305.122957] ? __dev_queue_xmit+0x1c6/0x2690 [ 2305.123552] __skb_gso_segment+0x32d/0x6d0 [ 2305.124101] ? mark_lock+0xf5/0x2df0 [ 2305.124634] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2305.125313] ? lock_chain_count+0x20/0x20 [ 2305.125849] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2305.126441] __dev_queue_xmit+0x825/0x2690 [ 2305.126993] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2305.127659] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2305.128261] ? mark_held_locks+0x9e/0xe0 [ 2305.128826] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2305.129510] neigh_connected_output+0x382/0x4d0 [ 2305.130122] ip_finish_output2+0x6f1/0x21f0 [ 2305.130682] ? nf_hook_slow+0xfc/0x1e0 [ 2305.131186] ? ip_frag_next+0x9e0/0x9e0 [ 2305.131703] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2305.132369] __ip_finish_output.part.0+0x5f3/0xb50 [ 2305.133005] ? ip_fragment.constprop.0+0x240/0x240 [ 2305.133638] ? netif_rx_ni+0xe7/0x300 [ 2305.134136] ip_mc_output+0x401/0xa30 [ 2305.134634] ip_send_skb+0xdd/0x260 [ 2305.135108] udp_send_skb+0x6da/0x11d0 [ 2305.135620] udp_sendmsg+0x139a/0x2160 [ 2305.136122] ? mark_lock+0xf5/0x2df0 [ 2305.136721] ? ip_frag_init+0x350/0x350 [ 2305.137240] ? lock_chain_count+0x20/0x20 [ 2305.137782] ? udp_setsockopt+0xc0/0xc0 [ 2305.138297] ? mark_lock+0xf5/0x2df0 [ 2305.138780] ? lock_acquire+0x197/0x470 [ 2305.139299] ? lock_chain_count+0x20/0x20 [ 2305.139838] ? mark_lock+0xf5/0x2df0 [ 2305.140358] ? mark_lock+0xf5/0x2df0 [ 2305.140849] ? lock_chain_count+0x20/0x20 [ 2305.141388] ? __lock_acquire+0xbb1/0x5b00 [ 2305.141939] ? lock_chain_count+0x20/0x20 [ 2305.142488] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.143167] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.143704] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2305.144245] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.144950] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.145506] ? mark_lock+0xf5/0x2df0 [ 2305.146026] ? lock_acquire+0x197/0x470 [ 2305.146542] ? find_held_lock+0x2c/0x110 [ 2305.147072] ? __might_fault+0xd3/0x180 [ 2305.147586] ? lock_downgrade+0x6d0/0x6d0 [ 2305.148124] ? lock_downgrade+0x6d0/0x6d0 [ 2305.148720] ? sock_has_perm+0x1ea/0x280 [ 2305.149246] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2305.149917] ? _copy_from_user+0xfb/0x1b0 [ 2305.150462] ? __import_iovec+0x458/0x590 [ 2305.150998] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.151668] inet6_sendmsg+0x105/0x140 [ 2305.152191] ? inet6_compat_ioctl+0x320/0x320 [ 2305.152887] __sock_sendmsg+0xf2/0x190 [ 2305.153394] ____sys_sendmsg+0x70d/0x870 [ 2305.153922] ? sock_write_iter+0x3d0/0x3d0 [ 2305.154468] ? do_recvmmsg+0x6d0/0x6d0 [ 2305.154976] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.155500] ? lock_downgrade+0x6d0/0x6d0 [ 2305.156039] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.156796] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.157327] ___sys_sendmsg+0xf3/0x170 [ 2305.157834] ? sendmsg_copy_msghdr+0x160/0x160 [ 2305.158429] ? __fget_files+0x2cf/0x520 [ 2305.158944] ? lock_downgrade+0x6d0/0x6d0 [ 2305.159483] ? find_held_lock+0x2c/0x110 [ 2305.160017] ? __fget_files+0x2f8/0x520 [ 2305.160573] ? __fget_light+0xea/0x290 [ 2305.161139] __sys_sendmsg+0xe5/0x1b0 [ 2305.161685] ? __sys_sendmsg_sock+0x40/0x40 [ 2305.162304] ? rcu_read_lock_any_held+0x75/0xa0 [ 2305.162989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2305.163738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2305.164517] ? trace_hardirqs_on+0x5b/0x180 [ 2305.165177] do_syscall_64+0x33/0x40 [ 2305.165742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2305.166522] RIP: 0033:0x7f251a6f7b19 [ 2305.167089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.169804] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2305.170891] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2305.171916] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2305.172994] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2305.174088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.175140] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:50:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 55) [ 2305.348907] FAULT_INJECTION: forcing a failure. [ 2305.348907] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.351890] CPU: 0 PID: 10764 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2305.353767] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.355923] Call Trace: [ 2305.356621] dump_stack+0x107/0x167 [ 2305.357564] should_fail.cold+0x5/0xa [ 2305.358550] should_failslab+0x5/0x20 [ 2305.359532] __kmalloc_node_track_caller+0x74/0x3b0 [ 2305.360888] ? skb_segment+0x9d8/0x3aa0 [ 2305.361930] __alloc_skb+0xb1/0x5b0 [ 2305.362871] skb_segment+0x9d8/0x3aa0 [ 2305.363842] ? __lock_acquire+0xbb1/0x5b00 [ 2305.364699] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2305.365355] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.366038] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.366576] __udp_gso_segment+0x11c6/0x1830 [ 2305.367150] ? __sk_receive_skb+0x830/0x830 [ 2305.367721] udp4_ufo_fragment+0x528/0x720 [ 2305.368278] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2305.369043] inet_gso_segment+0x4fb/0x11a0 [ 2305.369616] skb_mac_gso_segment+0x273/0x570 [ 2305.370223] ? inet_sock_destruct+0x840/0x840 [ 2305.370818] ? skb_network_protocol+0x650/0x650 [ 2305.371424] ? skb_crc32c_csum_help+0x80/0x80 [ 2305.372013] ? lock_acquire+0x197/0x470 [ 2305.372912] ? __dev_queue_xmit+0x1c6/0x2690 [ 2305.374294] __skb_gso_segment+0x32d/0x6d0 [ 2305.375617] ? mark_lock+0xf5/0x2df0 [ 2305.376823] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2305.378479] ? lock_chain_count+0x20/0x20 [ 2305.379543] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2305.380757] __dev_queue_xmit+0x825/0x2690 [ 2305.381856] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2305.383199] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2305.384416] ? mark_held_locks+0x9e/0xe0 [ 2305.385514] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2305.386913] neigh_connected_output+0x382/0x4d0 [ 2305.388118] ip_finish_output2+0x6f1/0x21f0 [ 2305.389391] ? nf_hook_slow+0xfc/0x1e0 [ 2305.390366] ? ip_frag_next+0x9e0/0x9e0 [ 2305.391358] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2305.392542] __ip_finish_output.part.0+0x5f3/0xb50 [ 2305.393190] ? ip_fragment.constprop.0+0x240/0x240 [ 2305.393832] ? netif_rx_ni+0xe7/0x300 [ 2305.394336] ip_mc_output+0x401/0xa30 [ 2305.394841] ip_send_skb+0xdd/0x260 [ 2305.395323] udp_send_skb+0x6da/0x11d0 [ 2305.395844] udp_sendmsg+0x139a/0x2160 [ 2305.396454] ? mark_lock+0xf5/0x2df0 [ 2305.397137] ? ip_frag_init+0x350/0x350 [ 2305.398037] ? lock_chain_count+0x20/0x20 [ 2305.399110] ? udp_setsockopt+0xc0/0xc0 [ 2305.400113] ? mark_lock+0xf5/0x2df0 [ 2305.401126] ? lock_acquire+0x197/0x470 [ 2305.402161] ? lock_chain_count+0x20/0x20 [ 2305.403248] ? mark_lock+0xf5/0x2df0 [ 2305.404187] ? mark_lock+0xf5/0x2df0 [ 2305.404771] ? lock_chain_count+0x20/0x20 [ 2305.405314] ? __lock_acquire+0xbb1/0x5b00 [ 2305.405870] ? lock_chain_count+0x20/0x20 [ 2305.406421] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.407104] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.407645] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2305.408189] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.408941] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.409482] ? mark_lock+0xf5/0x2df0 [ 2305.409976] ? lock_acquire+0x197/0x470 [ 2305.410498] ? find_held_lock+0x2c/0x110 [ 2305.411038] ? __might_fault+0xd3/0x180 [ 2305.411561] ? lock_downgrade+0x6d0/0x6d0 [ 2305.412109] ? lock_downgrade+0x6d0/0x6d0 [ 2305.412756] ? sock_has_perm+0x1ea/0x280 [ 2305.413295] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2305.413980] ? _copy_from_user+0xfb/0x1b0 [ 2305.414536] ? __import_iovec+0x458/0x590 [ 2305.415083] ? udp_v6_push_pending_frames+0x360/0x360 [ 2305.415770] inet6_sendmsg+0x105/0x140 [ 2305.416286] ? inet6_compat_ioctl+0x320/0x320 [ 2305.416929] __sock_sendmsg+0xf2/0x190 [ 2305.417442] ____sys_sendmsg+0x70d/0x870 [ 2305.417977] ? sock_write_iter+0x3d0/0x3d0 [ 2305.418528] ? do_recvmmsg+0x6d0/0x6d0 [ 2305.419044] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.419574] ? lock_downgrade+0x6d0/0x6d0 [ 2305.420117] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2305.420847] ? SOFTIRQ_verbose+0x10/0x10 [ 2305.421385] ___sys_sendmsg+0xf3/0x170 [ 2305.421898] ? sendmsg_copy_msghdr+0x160/0x160 [ 2305.422502] ? __fget_files+0x2cf/0x520 [ 2305.423025] ? lock_downgrade+0x6d0/0x6d0 [ 2305.423571] ? find_held_lock+0x2c/0x110 [ 2305.424116] ? __fget_files+0x2f8/0x520 [ 2305.424713] ? __fget_light+0xea/0x290 [ 2305.425239] __sys_sendmsg+0xe5/0x1b0 [ 2305.425742] ? __sys_sendmsg_sock+0x40/0x40 [ 2305.426314] ? rcu_read_lock_any_held+0x75/0xa0 [ 2305.426939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2305.427630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2305.428317] ? trace_hardirqs_on+0x5b/0x180 [ 2305.428957] do_syscall_64+0x33/0x40 [ 2305.429448] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2305.430118] RIP: 0033:0x7f251a6f7b19 [ 2305.430607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.433088] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2305.434086] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2305.435021] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2305.435955] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2305.437781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.440026] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:50:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 56) 09:50:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:50:31 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:50:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xf4010000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:31 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 53) 09:50:31 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:31 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc04812b9, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x300, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2320.466158] FAULT_INJECTION: forcing a failure. [ 2320.466158] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.467941] CPU: 0 PID: 10773 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2320.473019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2320.474161] Call Trace: [ 2320.474565] dump_stack+0x107/0x167 [ 2320.475043] should_fail.cold+0x5/0xa [ 2320.475596] ? create_object.isra.0+0x3a/0xa20 [ 2320.476196] should_failslab+0x5/0x20 [ 2320.476776] kmem_cache_alloc+0x5b/0x310 [ 2320.477763] create_object.isra.0+0x3a/0xa20 [ 2320.478394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2320.479069] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2320.479787] ? skb_segment+0x9d8/0x3aa0 [ 2320.480392] __alloc_skb+0xb1/0x5b0 09:50:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2320.480891] skb_segment+0x9d8/0x3aa0 [ 2320.481460] ? __lock_acquire+0xbb1/0x5b00 [ 2320.482041] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2320.482757] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.483500] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.484041] __udp_gso_segment+0x11c6/0x1830 [ 2320.484696] ? __sk_receive_skb+0x830/0x830 [ 2320.489398] udp4_ufo_fragment+0x528/0x720 [ 2320.489954] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2320.490663] inet_gso_segment+0x4fb/0x11a0 [ 2320.491233] skb_mac_gso_segment+0x273/0x570 [ 2320.491859] ? inet_sock_destruct+0x840/0x840 [ 2320.492525] ? skb_network_protocol+0x650/0x650 [ 2320.493146] ? skb_crc32c_csum_help+0x80/0x80 [ 2320.493794] ? lock_acquire+0x197/0x470 [ 2320.494369] ? __dev_queue_xmit+0x1c6/0x2690 [ 2320.494955] __skb_gso_segment+0x32d/0x6d0 [ 2320.495562] ? mark_lock+0xf5/0x2df0 [ 2320.496052] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2320.496827] ? lock_chain_count+0x20/0x20 [ 2320.497440] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2320.498057] __dev_queue_xmit+0x825/0x2690 [ 2320.498680] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2320.499423] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2320.500040] ? mark_held_locks+0x9e/0xe0 [ 2320.500666] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2320.501447] neigh_connected_output+0x382/0x4d0 [ 2320.502079] ip_finish_output2+0x6f1/0x21f0 [ 2320.502701] ? nf_hook_slow+0xfc/0x1e0 [ 2320.503220] ? ip_frag_next+0x9e0/0x9e0 [ 2320.503793] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2320.504540] __ip_finish_output.part.0+0x5f3/0xb50 [ 2320.505199] ? ip_fragment.constprop.0+0x240/0x240 [ 2320.505893] ? netif_rx_ni+0xe7/0x300 [ 2320.506450] ip_mc_output+0x401/0xa30 [ 2320.506954] ip_send_skb+0xdd/0x260 [ 2320.507487] udp_send_skb+0x6da/0x11d0 [ 2320.508006] udp_sendmsg+0x139a/0x2160 [ 2320.508593] ? mark_lock+0xf5/0x2df0 [ 2320.509101] ? ip_frag_init+0x350/0x350 [ 2320.509683] ? lock_chain_count+0x20/0x20 [ 2320.510224] ? udp_setsockopt+0xc0/0xc0 [ 2320.510803] ? __bad_area_nosemaphore+0xa1/0x310 [ 2320.511476] ? mark_lock+0xf5/0x2df0 [ 2320.511966] ? mark_lock+0xf5/0x2df0 [ 2320.512528] ? lock_chain_count+0x20/0x20 [ 2320.513095] ? lock_chain_count+0x20/0x20 [ 2320.513705] ? mark_lock+0xf5/0x2df0 [ 2320.514201] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2320.514810] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.515538] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.516079] ? lock_acquire+0x197/0x470 [ 2320.516676] ? find_held_lock+0x2c/0x110 [ 2320.517230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2320.517969] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2320.518734] ? trace_hardirqs_on+0x5b/0x180 [ 2320.519354] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2320.520067] ? sock_has_perm+0x1ea/0x280 [ 2320.520676] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2320.521425] ? copy_user_generic_string+0x2c/0x40 [ 2320.522059] ? _copy_from_user+0xfb/0x1b0 [ 2320.522668] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2320.523404] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2320.524106] ? trace_hardirqs_on+0x5b/0x180 [ 2320.524748] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.525495] inet6_sendmsg+0x105/0x140 [ 2320.526006] ? inet6_compat_ioctl+0x320/0x320 [ 2320.526643] __sock_sendmsg+0xf2/0x190 [ 2320.527152] ____sys_sendmsg+0x70d/0x870 [ 2320.527738] ? sock_write_iter+0x3d0/0x3d0 [ 2320.528368] ? do_recvmmsg+0x6d0/0x6d0 [ 2320.528893] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.529492] ___sys_sendmsg+0xf3/0x170 [ 2320.530003] ? sendmsg_copy_msghdr+0x160/0x160 [ 2320.530658] ? __fget_files+0x2cf/0x520 [ 2320.531179] ? lock_downgrade+0x6d0/0x6d0 [ 2320.531781] ? clockevents_program_event+0x14b/0x360 [ 2320.532529] ? __fget_files+0x2f8/0x520 [ 2320.533078] ? __fget_light+0xea/0x290 [ 2320.533649] __sys_sendmsg+0xe5/0x1b0 [ 2320.534148] ? __sys_sendmsg_sock+0x40/0x40 [ 2320.534762] ? trace_hardirqs_on+0x5b/0x180 [ 2320.535394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2320.539138] ? syscall_enter_from_user_mode+0x27/0x50 [ 2320.539876] do_syscall_64+0x33/0x40 [ 2320.540416] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2320.541105] RIP: 0033:0x7f251a6f7b19 [ 2320.541666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2320.544185] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2320.545317] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2320.546310] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2320.547335] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.548362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2320.549434] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2320.550971] FAULT_INJECTION: forcing a failure. [ 2320.550971] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.552414] CPU: 1 PID: 10790 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2320.553284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2320.554313] Call Trace: [ 2320.554658] dump_stack+0x107/0x167 [ 2320.555110] should_fail.cold+0x5/0xa 09:50:31 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2320.555596] ? trace_hardirqs_on+0x5b/0x180 [ 2320.561405] ? __alloc_skb+0x6d/0x5b0 [ 2320.561881] should_failslab+0x5/0x20 [ 2320.562365] kmem_cache_alloc_node+0x55/0x330 [ 2320.562933] __alloc_skb+0x6d/0x5b0 [ 2320.563563] skb_segment+0x9d8/0x3aa0 [ 2320.564044] ? __lock_acquire+0xbb1/0x5b00 [ 2320.564599] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2320.565233] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.565877] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.566390] __udp_gso_segment+0x11c6/0x1830 [ 2320.566932] ? __sk_receive_skb+0x830/0x830 [ 2320.567471] udp4_ufo_fragment+0x528/0x720 [ 2320.567998] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2320.568612] inet_gso_segment+0x4fb/0x11a0 [ 2320.569167] skb_mac_gso_segment+0x273/0x570 [ 2320.569716] ? inet_sock_destruct+0x840/0x840 [ 2320.570266] ? skb_network_protocol+0x650/0x650 [ 2320.570834] ? skb_crc32c_csum_help+0x80/0x80 [ 2320.571383] ? lock_acquire+0x197/0x470 [ 2320.571868] ? __dev_queue_xmit+0x1c6/0x2690 [ 2320.572411] __skb_gso_segment+0x32d/0x6d0 [ 2320.572950] ? mark_lock+0xf5/0x2df0 [ 2320.573412] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2320.574053] ? lock_chain_count+0x20/0x20 [ 2320.574561] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2320.575122] __dev_queue_xmit+0x825/0x2690 [ 2320.575647] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2320.576278] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2320.576858] ? mark_held_locks+0x9e/0xe0 [ 2320.577367] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2320.578018] neigh_connected_output+0x382/0x4d0 [ 2320.578602] ip_finish_output2+0x6f1/0x21f0 [ 2320.579139] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2320.579807] ? ip_frag_next+0x9e0/0x9e0 [ 2320.580294] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2320.580926] __ip_finish_output.part.0+0x5f3/0xb50 [ 2320.581533] ? ip_fragment.constprop.0+0x240/0x240 [ 2320.582136] ? netif_rx_ni+0xe7/0x300 [ 2320.582611] ip_mc_output+0x401/0xa30 [ 2320.583091] ip_send_skb+0xdd/0x260 [ 2320.583543] udp_send_skb+0x6da/0x11d0 [ 2320.584032] udp_sendmsg+0x139a/0x2160 [ 2320.584511] ? mark_lock+0xf5/0x2df0 [ 2320.584995] ? ip_frag_init+0x350/0x350 [ 2320.585489] ? lock_chain_count+0x20/0x20 [ 2320.586005] ? udp_setsockopt+0xc0/0xc0 [ 2320.586494] ? mark_lock+0xf5/0x2df0 [ 2320.586954] ? lock_acquire+0x197/0x470 [ 2320.587448] ? lock_chain_count+0x20/0x20 [ 2320.587958] ? mark_lock+0xf5/0x2df0 [ 2320.588417] ? mark_lock+0xf5/0x2df0 [ 2320.588894] ? lock_chain_count+0x20/0x20 [ 2320.589409] ? __lock_acquire+0xbb1/0x5b00 [ 2320.589961] ? lock_chain_count+0x20/0x20 [ 2320.590508] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.591193] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.591750] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2320.592311] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.593005] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.593530] ? mark_lock+0xf5/0x2df0 [ 2320.594012] ? lock_acquire+0x197/0x470 [ 2320.594522] ? find_held_lock+0x2c/0x110 [ 2320.595046] ? __might_fault+0xd3/0x180 [ 2320.595562] ? lock_downgrade+0x6d0/0x6d0 [ 2320.601118] ? lock_downgrade+0x6d0/0x6d0 [ 2320.601634] ? sock_has_perm+0x1ea/0x280 [ 2320.602134] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2320.602772] ? _copy_from_user+0xfb/0x1b0 [ 2320.603292] ? __import_iovec+0x458/0x590 [ 2320.603803] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.604440] inet6_sendmsg+0x105/0x140 [ 2320.604939] ? inet6_compat_ioctl+0x320/0x320 [ 2320.605497] __sock_sendmsg+0xf2/0x190 [ 2320.605976] ____sys_sendmsg+0x70d/0x870 [ 2320.606481] ? sock_write_iter+0x3d0/0x3d0 [ 2320.606999] ? do_recvmmsg+0x6d0/0x6d0 [ 2320.607483] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.607986] ? lock_downgrade+0x6d0/0x6d0 [ 2320.608499] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.609152] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.609658] ___sys_sendmsg+0xf3/0x170 [ 2320.610140] ? sendmsg_copy_msghdr+0x160/0x160 [ 2320.610710] ? __fget_files+0x2cf/0x520 [ 2320.611204] ? lock_downgrade+0x6d0/0x6d0 [ 2320.611715] ? find_held_lock+0x2c/0x110 [ 2320.612223] ? __fget_files+0x2f8/0x520 [ 2320.612719] ? __fget_light+0xea/0x290 [ 2320.613225] __sys_sendmsg+0xe5/0x1b0 [ 2320.613701] ? __sys_sendmsg_sock+0x40/0x40 [ 2320.614234] ? rcu_read_lock_any_held+0x75/0xa0 [ 2320.614825] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2320.615475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2320.616112] ? trace_hardirqs_on+0x5b/0x180 [ 2320.616646] do_syscall_64+0x33/0x40 [ 2320.617131] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2320.617768] RIP: 0033:0x7f3f9ec55b19 [ 2320.618230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2320.620559] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2320.621506] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2320.622379] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2320.623252] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.624132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2320.625021] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:50:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xfeffffff, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:31 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:31 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 54) 09:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x358, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:50:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 57) [ 2320.837741] FAULT_INJECTION: forcing a failure. [ 2320.837741] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.841134] CPU: 1 PID: 10809 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2320.843138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2320.845569] Call Trace: [ 2320.846333] dump_stack+0x107/0x167 [ 2320.847382] should_fail.cold+0x5/0xa [ 2320.848482] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2320.850015] ? create_object.isra.0+0x3a/0xa20 [ 2320.851350] should_failslab+0x5/0x20 [ 2320.852446] kmem_cache_alloc+0x5b/0x310 [ 2320.853637] ? mark_held_locks+0x9e/0xe0 [ 2320.854812] create_object.isra.0+0x3a/0xa20 [ 2320.856077] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2320.857586] kmem_cache_alloc_node+0x169/0x330 [ 2320.858913] __alloc_skb+0x6d/0x5b0 [ 2320.859967] skb_segment+0x9d8/0x3aa0 [ 2320.861085] ? __lock_acquire+0xbb1/0x5b00 [ 2320.862334] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2320.863778] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.865308] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.866488] __udp_gso_segment+0x11c6/0x1830 [ 2320.867756] ? __sk_receive_skb+0x830/0x830 [ 2320.869026] udp4_ufo_fragment+0x528/0x720 [ 2320.870252] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2320.871704] inet_gso_segment+0x4fb/0x11a0 [ 2320.872952] skb_mac_gso_segment+0x273/0x570 [ 2320.874229] ? inet_sock_destruct+0x840/0x840 [ 2320.875522] ? skb_network_protocol+0x650/0x650 [ 2320.876872] ? skb_crc32c_csum_help+0x80/0x80 [ 2320.878188] ? lock_acquire+0x197/0x470 [ 2320.879332] ? __dev_queue_xmit+0x1c6/0x2690 [ 2320.880604] __skb_gso_segment+0x32d/0x6d0 [ 2320.881845] ? mark_lock+0xf5/0x2df0 [ 2320.882919] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2320.884434] ? lock_chain_count+0x20/0x20 [ 2320.885647] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2320.886967] __dev_queue_xmit+0x825/0x2690 [ 2320.888190] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2320.889698] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2320.891025] ? mark_held_locks+0x9e/0xe0 [ 2320.892200] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2320.893736] neigh_connected_output+0x382/0x4d0 [ 2320.895092] ip_finish_output2+0x6f1/0x21f0 [ 2320.896339] ? nf_hook_slow+0xfc/0x1e0 [ 2320.897481] ? ip_frag_next+0x9e0/0x9e0 [ 2320.898630] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2320.900083] __ip_finish_output.part.0+0x5f3/0xb50 [ 2320.901523] ? ip_fragment.constprop.0+0x240/0x240 [ 2320.902946] ? netif_rx_ni+0xe7/0x300 [ 2320.904049] ip_mc_output+0x401/0xa30 [ 2320.905165] ip_send_skb+0xdd/0x260 [ 2320.906218] udp_send_skb+0x6da/0x11d0 [ 2320.907349] udp_sendmsg+0x139a/0x2160 [ 2320.908470] ? mark_lock+0xf5/0x2df0 [ 2320.909562] ? ip_frag_init+0x350/0x350 [ 2320.910708] ? lock_chain_count+0x20/0x20 [ 2320.911913] ? udp_setsockopt+0xc0/0xc0 [ 2320.913075] ? mark_lock+0xf5/0x2df0 [ 2320.914148] ? mark_lock+0xf5/0x2df0 [ 2320.915227] ? lock_chain_count+0x20/0x20 [ 2320.916423] ? lock_chain_count+0x20/0x20 [ 2320.917644] ? mark_lock+0xf5/0x2df0 [ 2320.918718] ? mark_lock+0xf5/0x2df0 [ 2320.919789] ? lock_chain_count+0x20/0x20 [ 2320.921002] ? __lock_acquire+0xbb1/0x5b00 [ 2320.922228] ? lock_chain_count+0x20/0x20 [ 2320.923420] ? mark_lock+0xf5/0x2df0 [ 2320.924496] ? lock_chain_count+0x20/0x20 [ 2320.925710] ? __lock_acquire+0xbb1/0x5b00 [ 2320.926938] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2320.928122] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.929631] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.930811] ? mark_lock+0xf5/0x2df0 [ 2320.931888] ? lock_acquire+0x197/0x470 [ 2320.933052] ? find_held_lock+0x2c/0x110 [ 2320.934231] ? __might_fault+0xd3/0x180 [ 2320.935379] ? lock_downgrade+0x6d0/0x6d0 [ 2320.936580] ? lock_downgrade+0x6d0/0x6d0 [ 2320.937801] ? sock_has_perm+0x1ea/0x280 [ 2320.938972] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2320.940472] ? _copy_from_user+0xfb/0x1b0 [ 2320.941698] ? __import_iovec+0x458/0x590 [ 2320.942893] ? udp_v6_push_pending_frames+0x360/0x360 [ 2320.944388] inet6_sendmsg+0x105/0x140 [ 2320.945534] ? inet6_compat_ioctl+0x320/0x320 [ 2320.946829] __sock_sendmsg+0xf2/0x190 [ 2320.947954] ____sys_sendmsg+0x70d/0x870 [ 2320.949149] ? sock_write_iter+0x3d0/0x3d0 [ 2320.950372] ? do_recvmmsg+0x6d0/0x6d0 [ 2320.951499] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.952676] ? lock_downgrade+0x6d0/0x6d0 [ 2320.953893] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2320.955411] ? SOFTIRQ_verbose+0x10/0x10 [ 2320.956589] ___sys_sendmsg+0xf3/0x170 [ 2320.957726] ? sendmsg_copy_msghdr+0x160/0x160 [ 2320.959052] ? __fget_files+0x2cf/0x520 [ 2320.960205] ? lock_downgrade+0x6d0/0x6d0 [ 2320.961418] ? find_held_lock+0x2c/0x110 [ 2320.966024] ? __fget_files+0x2f8/0x520 [ 2320.967177] ? __fget_light+0xea/0x290 [ 2320.968300] __sys_sendmsg+0xe5/0x1b0 [ 2320.973482] ? __sys_sendmsg_sock+0x40/0x40 [ 2320.974732] ? rcu_read_lock_any_held+0x75/0xa0 [ 2320.976084] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2320.977617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2320.979107] ? trace_hardirqs_on+0x5b/0x180 [ 2320.980347] do_syscall_64+0x33/0x40 [ 2320.981433] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2320.982915] RIP: 0033:0x7f3f9ec55b19 [ 2320.983985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2320.989427] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2320.991787] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2320.994077] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2320.996369] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.998699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2321.001070] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:50:32 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:32 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2321.095747] FAULT_INJECTION: forcing a failure. [ 2321.095747] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.098619] CPU: 0 PID: 10816 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2321.099736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2321.101085] Call Trace: [ 2321.101538] dump_stack+0x107/0x167 [ 2321.102143] should_fail.cold+0x5/0xa [ 2321.102773] ? trace_hardirqs_on+0x5b/0x180 [ 2321.103484] ? __alloc_skb+0x6d/0x5b0 [ 2321.104123] should_failslab+0x5/0x20 [ 2321.104756] kmem_cache_alloc_node+0x55/0x330 [ 2321.105513] __alloc_skb+0x6d/0x5b0 [ 2321.106130] skb_segment+0x9d8/0x3aa0 [ 2321.106764] ? __lock_acquire+0xbb1/0x5b00 [ 2321.107498] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2321.108319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2321.109188] ? SOFTIRQ_verbose+0x10/0x10 [ 2321.109874] __udp_gso_segment+0x11c6/0x1830 [ 2321.110594] ? __sk_receive_skb+0x830/0x830 [ 2321.111314] udp4_ufo_fragment+0x528/0x720 [ 2321.112018] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2321.112844] inet_gso_segment+0x4fb/0x11a0 [ 2321.113501] skb_mac_gso_segment+0x273/0x570 [ 2321.114098] ? inet_sock_destruct+0x840/0x840 [ 2321.114710] ? skb_network_protocol+0x650/0x650 [ 2321.115340] ? skb_crc32c_csum_help+0x80/0x80 [ 2321.115948] ? lock_acquire+0x197/0x470 [ 2321.116498] ? __dev_queue_xmit+0x1c6/0x2690 [ 2321.117108] __skb_gso_segment+0x32d/0x6d0 [ 2321.117685] ? mark_lock+0xf5/0x2df0 [ 2321.118203] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2321.118921] ? lock_chain_count+0x20/0x20 [ 2321.119485] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2321.120109] __dev_queue_xmit+0x825/0x2690 [ 2321.120692] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2321.121402] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2321.122031] ? mark_held_locks+0x9e/0xe0 [ 2321.122591] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2321.123306] neigh_connected_output+0x382/0x4d0 [ 2321.123950] ip_finish_output2+0x6f1/0x21f0 [ 2321.124544] ? nf_hook_slow+0xfc/0x1e0 [ 2321.125279] ? ip_frag_next+0x9e0/0x9e0 [ 2321.125939] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2321.126767] __ip_finish_output.part.0+0x5f3/0xb50 [ 2321.127577] ? ip_fragment.constprop.0+0x240/0x240 [ 2321.128372] ? netif_rx_ni+0xe7/0x300 [ 2321.129027] ip_mc_output+0x401/0xa30 [ 2321.129672] ip_send_skb+0xdd/0x260 [ 2321.130279] udp_send_skb+0x6da/0x11d0 [ 2321.130938] udp_sendmsg+0x139a/0x2160 [ 2321.131581] ? mark_lock+0xf5/0x2df0 [ 2321.132205] ? ip_frag_init+0x350/0x350 [ 2321.132862] ? lock_chain_count+0x20/0x20 [ 2321.133568] ? udp_setsockopt+0xc0/0xc0 [ 2321.134224] ? mark_lock+0xf5/0x2df0 [ 2321.134853] ? lock_acquire+0x197/0x470 [ 2321.135506] ? lock_chain_count+0x20/0x20 [ 2321.136184] ? mark_lock+0xf5/0x2df0 [ 2321.136800] ? mark_lock+0xf5/0x2df0 [ 2321.137428] ? lock_chain_count+0x20/0x20 [ 2321.138153] ? __lock_acquire+0xbb1/0x5b00 [ 2321.139289] ? lock_chain_count+0x20/0x20 [ 2321.140415] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2321.141374] ? SOFTIRQ_verbose+0x10/0x10 [ 2321.141937] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2321.142513] ? udp_v6_push_pending_frames+0x360/0x360 [ 2321.143233] ? SOFTIRQ_verbose+0x10/0x10 [ 2321.143825] ? mark_lock+0xf5/0x2df0 [ 2321.144338] ? lock_acquire+0x197/0x470 [ 2321.144891] ? find_held_lock+0x2c/0x110 [ 2321.145614] ? __might_fault+0xd3/0x180 [ 2321.146273] ? lock_downgrade+0x6d0/0x6d0 [ 2321.146979] ? lock_downgrade+0x6d0/0x6d0 [ 2321.147682] ? sock_has_perm+0x1ea/0x280 [ 2321.148373] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2321.149192] ? _copy_from_user+0xfb/0x1b0 [ 2321.149771] ? __import_iovec+0x458/0x590 [ 2321.150336] ? udp_v6_push_pending_frames+0x360/0x360 [ 2321.151042] inet6_sendmsg+0x105/0x140 [ 2321.151574] ? inet6_compat_ioctl+0x320/0x320 [ 2321.152182] __sock_sendmsg+0xf2/0x190 [ 2321.152714] ____sys_sendmsg+0x70d/0x870 [ 2321.153424] ? sock_write_iter+0x3d0/0x3d0 [ 2321.154131] ? do_recvmmsg+0x6d0/0x6d0 [ 2321.154775] ? SOFTIRQ_verbose+0x10/0x10 [ 2321.155440] ? lock_downgrade+0x6d0/0x6d0 [ 2321.156124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2321.156995] ? SOFTIRQ_verbose+0x10/0x10 [ 2321.157669] ___sys_sendmsg+0xf3/0x170 [ 2321.158322] ? sendmsg_copy_msghdr+0x160/0x160 [ 2321.159075] ? __fget_files+0x2cf/0x520 [ 2321.159733] ? lock_downgrade+0x6d0/0x6d0 [ 2321.160425] ? find_held_lock+0x2c/0x110 [ 2321.161130] ? __fget_files+0x2f8/0x520 [ 2321.161818] ? __fget_light+0xea/0x290 [ 2321.162472] __sys_sendmsg+0xe5/0x1b0 [ 2321.163101] ? __sys_sendmsg_sock+0x40/0x40 [ 2321.163814] ? rcu_read_lock_any_held+0x75/0xa0 [ 2321.164600] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2321.165474] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2321.166327] ? trace_hardirqs_on+0x5b/0x180 [ 2321.167039] do_syscall_64+0x33/0x40 [ 2321.167658] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2321.168356] RIP: 0033:0x7f251a6f7b19 [ 2321.168863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2321.171345] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2321.172370] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2321.173333] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2321.174287] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2321.175258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2321.176223] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:50:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xffffff7f, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x36c, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:50:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xfffffffe, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:50:47 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d3", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:50:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 58) [ 2336.523959] FAULT_INJECTION: forcing a failure. [ 2336.523959] name failslab, interval 1, probability 0, space 0, times 0 09:50:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:50:47 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:47 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:47 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 55) [ 2336.525510] CPU: 1 PID: 10838 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2336.534189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2336.535264] Call Trace: [ 2336.535623] dump_stack+0x107/0x167 [ 2336.536109] should_fail.cold+0x5/0xa [ 2336.536622] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2336.537307] ? create_object.isra.0+0x3a/0xa20 [ 2336.537933] should_failslab+0x5/0x20 [ 2336.538429] kmem_cache_alloc+0x5b/0x310 [ 2336.538960] ? mark_held_locks+0x9e/0xe0 [ 2336.539506] create_object.isra.0+0x3a/0xa20 [ 2336.540082] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2336.540754] kmem_cache_alloc_node+0x169/0x330 [ 2336.541365] __alloc_skb+0x6d/0x5b0 [ 2336.541873] skb_segment+0x9d8/0x3aa0 [ 2336.542388] ? __lock_acquire+0xbb1/0x5b00 [ 2336.542993] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2336.543645] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.544333] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.544885] __udp_gso_segment+0x11c6/0x1830 [ 2336.545473] ? __sk_receive_skb+0x830/0x830 [ 2336.546055] udp4_ufo_fragment+0x528/0x720 [ 2336.546622] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2336.547292] inet_gso_segment+0x4fb/0x11a0 [ 2336.547875] skb_mac_gso_segment+0x273/0x570 [ 2336.548453] ? inet_sock_destruct+0x840/0x840 [ 2336.553556] ? skb_network_protocol+0x650/0x650 [ 2336.554166] ? skb_crc32c_csum_help+0x80/0x80 [ 2336.554749] ? lock_acquire+0x197/0x470 [ 2336.555265] ? __dev_queue_xmit+0x1c6/0x2690 [ 2336.555841] __skb_gso_segment+0x32d/0x6d0 [ 2336.556395] ? mark_lock+0xf5/0x2df0 [ 2336.556885] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2336.557598] ? lock_chain_count+0x20/0x20 [ 2336.558133] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2336.558727] __dev_queue_xmit+0x825/0x2690 [ 2336.559277] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2336.559944] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2336.560545] ? mark_held_locks+0x9e/0xe0 [ 2336.561074] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2336.561800] neigh_connected_output+0x382/0x4d0 [ 2336.562415] ip_finish_output2+0x6f1/0x21f0 [ 2336.562975] ? nf_hook_slow+0xfc/0x1e0 [ 2336.563485] ? ip_frag_next+0x9e0/0x9e0 [ 2336.564004] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2336.564657] __ip_finish_output.part.0+0x5f3/0xb50 [ 2336.565300] ? ip_fragment.constprop.0+0x240/0x240 [ 2336.573970] ? netif_rx_ni+0xe7/0x300 [ 2336.585735] ip_mc_output+0x401/0xa30 [ 2336.586252] ip_send_skb+0xdd/0x260 [ 2336.586741] udp_send_skb+0x6da/0x11d0 [ 2336.587268] udp_sendmsg+0x139a/0x2160 [ 2336.587786] ? mark_lock+0xf5/0x2df0 [ 2336.588283] ? ip_frag_init+0x350/0x350 [ 2336.588804] ? lock_chain_count+0x20/0x20 [ 2336.589362] ? udp_setsockopt+0xc0/0xc0 [ 2336.589929] ? mark_lock+0xf5/0x2df0 [ 2336.590427] ? lock_acquire+0x197/0x470 [ 2336.590960] ? lock_chain_count+0x20/0x20 [ 2336.591511] ? mark_lock+0xf5/0x2df0 [ 2336.592009] ? mark_lock+0xf5/0x2df0 [ 2336.592500] ? lock_chain_count+0x20/0x20 [ 2336.593048] ? __lock_acquire+0xbb1/0x5b00 [ 2336.593638] ? lock_chain_count+0x20/0x20 [ 2336.594186] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.594872] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.595435] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2336.596014] ? udp_v6_push_pending_frames+0x360/0x360 [ 2336.596713] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.597287] ? mark_lock+0xf5/0x2df0 [ 2336.597807] ? lock_acquire+0x197/0x470 [ 2336.598328] ? find_held_lock+0x2c/0x110 [ 2336.598868] ? __might_fault+0xd3/0x180 [ 2336.599396] ? lock_downgrade+0x6d0/0x6d0 [ 2336.599938] ? lock_downgrade+0x6d0/0x6d0 [ 2336.600488] ? sock_has_perm+0x1ea/0x280 [ 2336.600995] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2336.601667] ? _copy_from_user+0xfb/0x1b0 [ 2336.602172] ? __import_iovec+0x458/0x590 [ 2336.602673] ? udp_v6_push_pending_frames+0x360/0x360 [ 2336.603294] inet6_sendmsg+0x105/0x140 [ 2336.603767] ? inet6_compat_ioctl+0x320/0x320 [ 2336.604306] __sock_sendmsg+0xf2/0x190 [ 2336.604777] ____sys_sendmsg+0x70d/0x870 [ 2336.605275] ? sock_write_iter+0x3d0/0x3d0 [ 2336.605834] ? do_recvmmsg+0x6d0/0x6d0 [ 2336.606316] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.606807] ? lock_downgrade+0x6d0/0x6d0 [ 2336.607311] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.607940] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.608436] ___sys_sendmsg+0xf3/0x170 [ 2336.608914] ? sendmsg_copy_msghdr+0x160/0x160 [ 2336.609478] ? __fget_files+0x2cf/0x520 [ 2336.609992] ? lock_downgrade+0x6d0/0x6d0 [ 2336.610498] ? find_held_lock+0x2c/0x110 [ 2336.611042] ? __fget_files+0x2f8/0x520 [ 2336.611565] ? __fget_light+0xea/0x290 [ 2336.612085] __sys_sendmsg+0xe5/0x1b0 [ 2336.612591] ? __sys_sendmsg_sock+0x40/0x40 [ 2336.613150] ? rcu_read_lock_any_held+0x75/0xa0 [ 2336.613822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2336.614526] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2336.615208] ? trace_hardirqs_on+0x5b/0x180 [ 2336.615787] do_syscall_64+0x33/0x40 [ 2336.616284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2336.616964] RIP: 0033:0x7f251a6f7b19 [ 2336.617488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2336.619876] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2336.620790] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2336.621689] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2336.622559] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2336.623417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2336.624286] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2336.682277] FAULT_INJECTION: forcing a failure. [ 2336.682277] name failslab, interval 1, probability 0, space 0, times 0 [ 2336.683865] CPU: 1 PID: 10858 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2336.684797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2336.686610] Call Trace: [ 2336.687375] dump_stack+0x107/0x167 [ 2336.688394] should_fail.cold+0x5/0xa [ 2336.689504] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2336.690225] ? create_object.isra.0+0x3a/0xa20 [ 2336.690841] should_failslab+0x5/0x20 [ 2336.691367] kmem_cache_alloc+0x5b/0x310 [ 2336.691920] create_object.isra.0+0x3a/0xa20 [ 2336.692536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2336.693209] kmem_cache_alloc_node+0x169/0x330 [ 2336.694405] __alloc_skb+0x6d/0x5b0 [ 2336.695438] skb_segment+0x9d8/0x3aa0 [ 2336.696532] ? __lock_acquire+0xbb1/0x5b00 [ 2336.697841] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2336.699270] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.700734] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.701926] __udp_gso_segment+0x11c6/0x1830 [ 2336.703174] ? __sk_receive_skb+0x830/0x830 [ 2336.704389] udp4_ufo_fragment+0x528/0x720 [ 2336.705629] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2336.707105] inet_gso_segment+0x4fb/0x11a0 [ 2336.708338] skb_mac_gso_segment+0x273/0x570 [ 2336.709639] ? inet_sock_destruct+0x840/0x840 [ 2336.710901] ? skb_network_protocol+0x650/0x650 [ 2336.712185] ? skb_crc32c_csum_help+0x80/0x80 [ 2336.713493] ? lock_acquire+0x197/0x470 [ 2336.714838] ? __dev_queue_xmit+0x1c6/0x2690 [ 2336.716100] __skb_gso_segment+0x32d/0x6d0 [ 2336.717319] ? mark_lock+0xf5/0x2df0 [ 2336.717913] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2336.718625] ? lock_chain_count+0x20/0x20 [ 2336.719191] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2336.719818] __dev_queue_xmit+0x825/0x2690 [ 2336.720408] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2336.721111] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2336.722189] ? mark_held_locks+0x9e/0xe0 [ 2336.723377] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2336.725067] neigh_connected_output+0x382/0x4d0 [ 2336.725861] ip_finish_output2+0x6f1/0x21f0 [ 2336.726388] ? nf_hook_slow+0xfc/0x1e0 [ 2336.726899] ? ip_frag_next+0x9e0/0x9e0 [ 2336.727414] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2336.728035] __ip_finish_output.part.0+0x5f3/0xb50 [ 2336.728637] ? ip_fragment.constprop.0+0x240/0x240 [ 2336.729226] ? netif_rx_ni+0xe7/0x300 [ 2336.729763] ip_mc_output+0x401/0xa30 [ 2336.730902] ip_send_skb+0xdd/0x260 [ 2336.731843] udp_send_skb+0x6da/0x11d0 [ 2336.732815] udp_sendmsg+0x139a/0x2160 [ 2336.733653] ? mark_lock+0xf5/0x2df0 [ 2336.734129] ? ip_frag_init+0x350/0x350 [ 2336.734611] ? lock_chain_count+0x20/0x20 [ 2336.735115] ? udp_setsockopt+0xc0/0xc0 [ 2336.735597] ? mark_lock+0xf5/0x2df0 [ 2336.736045] ? lock_acquire+0x197/0x470 [ 2336.736525] ? lock_chain_count+0x20/0x20 [ 2336.737026] ? mark_lock+0xf5/0x2df0 [ 2336.737509] ? mark_lock+0xf5/0x2df0 [ 2336.739021] ? lock_chain_count+0x20/0x20 [ 2336.739524] ? __lock_acquire+0xbb1/0x5b00 [ 2336.740036] ? lock_chain_count+0x20/0x20 [ 2336.740546] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.741191] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.741715] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2336.742216] ? udp_v6_push_pending_frames+0x360/0x360 [ 2336.742835] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.743332] ? mark_lock+0xf5/0x2df0 [ 2336.743812] ? lock_acquire+0x197/0x470 [ 2336.744314] ? find_held_lock+0x2c/0x110 [ 2336.744847] ? __might_fault+0xd3/0x180 [ 2336.745330] ? lock_downgrade+0x6d0/0x6d0 [ 2336.745857] ? lock_downgrade+0x6d0/0x6d0 [ 2336.746361] ? sock_has_perm+0x1ea/0x280 [ 2336.746850] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2336.747471] ? _copy_from_user+0xfb/0x1b0 [ 2336.747979] ? __import_iovec+0x458/0x590 [ 2336.748479] ? udp_v6_push_pending_frames+0x360/0x360 [ 2336.749108] inet6_sendmsg+0x105/0x140 [ 2336.749598] ? inet6_compat_ioctl+0x320/0x320 [ 2336.750141] __sock_sendmsg+0xf2/0x190 [ 2336.750613] ____sys_sendmsg+0x70d/0x870 [ 2336.751098] ? sock_write_iter+0x3d0/0x3d0 [ 2336.751602] ? do_recvmmsg+0x6d0/0x6d0 [ 2336.752072] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.752555] ? lock_downgrade+0x6d0/0x6d0 [ 2336.753051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.758122] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.758834] ___sys_sendmsg+0xf3/0x170 [ 2336.759305] ? sendmsg_copy_msghdr+0x160/0x160 [ 2336.760120] ? __fget_files+0x2cf/0x520 [ 2336.760934] ? lock_downgrade+0x6d0/0x6d0 [ 2336.761570] ? find_held_lock+0x2c/0x110 [ 2336.762332] ? __fget_files+0x2f8/0x520 [ 2336.763123] ? __fget_light+0xea/0x290 [ 2336.763925] __sys_sendmsg+0xe5/0x1b0 [ 2336.764631] ? __sys_sendmsg_sock+0x40/0x40 [ 2336.765412] ? rcu_read_lock_any_held+0x75/0xa0 [ 2336.766842] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2336.767731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2336.768364] ? trace_hardirqs_on+0x5b/0x180 [ 2336.769597] do_syscall_64+0x33/0x40 [ 2336.770252] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2336.771506] RIP: 0033:0x7f3f9ec55b19 [ 2336.772181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2336.778475] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2336.780047] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2336.781251] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2336.782581] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2336.783834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2336.785014] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:50:48 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 56) [ 2336.879571] blktrace: Concurrent blktraces are not allowed on loop14 09:50:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0xffffffff, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2336.970068] FAULT_INJECTION: forcing a failure. [ 2336.970068] name failslab, interval 1, probability 0, space 0, times 0 [ 2336.971617] CPU: 0 PID: 10865 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2336.972550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2336.973830] Call Trace: [ 2336.974475] dump_stack+0x107/0x167 [ 2336.975368] should_fail.cold+0x5/0xa [ 2336.976305] ? ___slab_alloc+0x360/0x700 [ 2336.977297] ? create_object.isra.0+0x3a/0xa20 [ 2336.978634] should_failslab+0x5/0x20 [ 2336.979586] kmem_cache_alloc+0x5b/0x310 09:50:48 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:50:48 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2336.980609] create_object.isra.0+0x3a/0xa20 [ 2336.989621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2336.990291] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2336.990958] ? skb_segment+0x9d8/0x3aa0 [ 2336.991485] __alloc_skb+0xb1/0x5b0 [ 2336.991966] skb_segment+0x9d8/0x3aa0 [ 2336.992469] ? __lock_acquire+0xbb1/0x5b00 [ 2336.993052] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2336.993732] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2336.994417] ? SOFTIRQ_verbose+0x10/0x10 [ 2336.994955] __udp_gso_segment+0x11c6/0x1830 [ 2336.995530] ? __sk_receive_skb+0x830/0x830 [ 2336.996103] udp4_ufo_fragment+0x528/0x720 [ 2336.996663] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2336.997319] inet_gso_segment+0x4fb/0x11a0 [ 2336.997907] skb_mac_gso_segment+0x273/0x570 [ 2336.998491] ? inet_sock_destruct+0x840/0x840 [ 2336.999077] ? skb_network_protocol+0x650/0x650 [ 2336.999685] ? skb_crc32c_csum_help+0x80/0x80 [ 2337.000271] ? lock_acquire+0x197/0x470 [ 2337.000792] ? __dev_queue_xmit+0x1c6/0x2690 [ 2337.001372] __skb_gso_segment+0x32d/0x6d0 [ 2337.001943] ? mark_lock+0xf5/0x2df0 [ 2337.002441] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2337.003126] ? lock_chain_count+0x20/0x20 [ 2337.003669] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2337.004269] __dev_queue_xmit+0x825/0x2690 [ 2337.004830] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2337.005517] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2337.006127] ? mark_held_locks+0x9e/0xe0 [ 2337.006657] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2337.007347] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2337.008038] neigh_connected_output+0x382/0x4d0 [ 2337.008663] ip_finish_output2+0x6f1/0x21f0 [ 2337.009232] ? nf_hook_slow+0xfc/0x1e0 [ 2337.009772] ? ip_frag_next+0x9e0/0x9e0 [ 2337.010298] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2337.010958] __ip_finish_output.part.0+0x5f3/0xb50 [ 2337.011609] ? ip_fragment.constprop.0+0x240/0x240 [ 2337.012250] ? netif_rx_ni+0xe7/0x300 [ 2337.012755] ip_mc_output+0x401/0xa30 [ 2337.013260] ip_send_skb+0xdd/0x260 [ 2337.013762] udp_send_skb+0x6da/0x11d0 [ 2337.014287] udp_sendmsg+0x139a/0x2160 [ 2337.014798] ? mark_lock+0xf5/0x2df0 [ 2337.015287] ? ip_frag_init+0x350/0x350 [ 2337.015809] ? lock_chain_count+0x20/0x20 [ 2337.016357] ? udp_setsockopt+0xc0/0xc0 [ 2337.016876] ? mark_lock+0xf5/0x2df0 [ 2337.017364] ? lock_acquire+0x197/0x470 [ 2337.017916] ? lock_chain_count+0x20/0x20 [ 2337.018462] ? mark_lock+0xf5/0x2df0 [ 2337.018953] ? mark_lock+0xf5/0x2df0 [ 2337.019442] ? lock_chain_count+0x20/0x20 [ 2337.019984] ? __lock_acquire+0xbb1/0x5b00 [ 2337.020539] ? lock_chain_count+0x20/0x20 [ 2337.021093] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2337.021802] ? SOFTIRQ_verbose+0x10/0x10 [ 2337.022345] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2337.022891] ? udp_v6_push_pending_frames+0x360/0x360 [ 2337.023566] ? SOFTIRQ_verbose+0x10/0x10 [ 2337.024101] ? mark_lock+0xf5/0x2df0 [ 2337.024594] ? lock_acquire+0x197/0x470 [ 2337.025112] ? find_held_lock+0x2c/0x110 [ 2337.025697] ? __might_fault+0xd3/0x180 [ 2337.026219] ? lock_downgrade+0x6d0/0x6d0 [ 2337.026765] ? lock_downgrade+0x6d0/0x6d0 [ 2337.027312] ? sock_has_perm+0x1ea/0x280 [ 2337.027844] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2337.028525] ? _copy_from_user+0xfb/0x1b0 [ 2337.029078] ? __import_iovec+0x458/0x590 [ 2337.029638] ? udp_v6_push_pending_frames+0x360/0x360 [ 2337.030322] inet6_sendmsg+0x105/0x140 [ 2337.030832] ? inet6_compat_ioctl+0x320/0x320 [ 2337.031418] __sock_sendmsg+0xf2/0x190 [ 2337.031929] ____sys_sendmsg+0x70d/0x870 [ 2337.032465] ? sock_write_iter+0x3d0/0x3d0 [ 2337.033018] ? do_recvmmsg+0x6d0/0x6d0 [ 2337.033555] ? SOFTIRQ_verbose+0x10/0x10 [ 2337.034088] ? lock_downgrade+0x6d0/0x6d0 [ 2337.034634] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2337.035318] ? SOFTIRQ_verbose+0x10/0x10 [ 2337.035854] ___sys_sendmsg+0xf3/0x170 [ 2337.036367] ? sendmsg_copy_msghdr+0x160/0x160 [ 2337.036969] ? __fget_files+0x2cf/0x520 [ 2337.037506] ? lock_downgrade+0x6d0/0x6d0 [ 2337.038054] ? find_held_lock+0x2c/0x110 [ 2337.038595] ? __fget_files+0x2f8/0x520 [ 2337.039129] ? __fget_light+0xea/0x290 [ 2337.039647] __sys_sendmsg+0xe5/0x1b0 [ 2337.040148] ? __sys_sendmsg_sock+0x40/0x40 [ 2337.040715] ? rcu_read_lock_any_held+0x75/0xa0 [ 2337.041338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2337.042071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2337.042745] ? trace_hardirqs_on+0x5b/0x180 [ 2337.043312] do_syscall_64+0x33/0x40 [ 2337.043800] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2337.044472] RIP: 0033:0x7f3f9ec55b19 [ 2337.044962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2337.047391] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2337.048387] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2337.049325] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2337.050296] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2337.051270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2337.052243] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:50:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x380, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x38e, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:03 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d3", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:51:03 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:03 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 59) 09:51:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)="f4", 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:03 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 57) 09:51:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944f", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2352.216286] FAULT_INJECTION: forcing a failure. [ 2352.216286] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.217825] CPU: 1 PID: 10892 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2352.218748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.219825] Call Trace: [ 2352.220179] dump_stack+0x107/0x167 [ 2352.220665] should_fail.cold+0x5/0xa [ 2352.221169] ? trace_hardirqs_on+0x5b/0x180 [ 2352.221745] ? __alloc_skb+0x6d/0x5b0 [ 2352.222275] should_failslab+0x5/0x20 [ 2352.222784] kmem_cache_alloc_node+0x55/0x330 [ 2352.223376] __alloc_skb+0x6d/0x5b0 [ 2352.223863] skb_segment+0x9d8/0x3aa0 [ 2352.224373] ? __lock_acquire+0xbb1/0x5b00 [ 2352.224965] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2352.225632] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.226343] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.226891] __udp_gso_segment+0x11c6/0x1830 [ 2352.227465] ? __sk_receive_skb+0x830/0x830 [ 2352.228043] udp4_ufo_fragment+0x528/0x720 [ 2352.228610] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2352.229275] inet_gso_segment+0x4fb/0x11a0 [ 2352.229851] skb_mac_gso_segment+0x273/0x570 [ 2352.230459] ? inet_sock_destruct+0x840/0x840 [ 2352.231049] ? skb_network_protocol+0x650/0x650 [ 2352.231665] ? skb_crc32c_csum_help+0x80/0x80 [ 2352.232257] ? lock_acquire+0x197/0x470 [ 2352.232780] ? __dev_queue_xmit+0x1c6/0x2690 [ 2352.233215] FAULT_INJECTION: forcing a failure. [ 2352.233215] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.233355] __skb_gso_segment+0x32d/0x6d0 [ 2352.233372] ? mark_lock+0xf5/0x2df0 [ 2352.235784] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2352.236429] ? lock_chain_count+0x20/0x20 [ 2352.236953] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2352.237531] __dev_queue_xmit+0x825/0x2690 [ 2352.238082] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2352.238729] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2352.239301] ? mark_held_locks+0x9e/0xe0 [ 2352.239819] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2352.240475] neigh_connected_output+0x382/0x4d0 [ 2352.241075] ip_finish_output2+0x6f1/0x21f0 [ 2352.241627] ? nf_hook_slow+0xfc/0x1e0 [ 2352.242122] ? ip_frag_next+0x9e0/0x9e0 [ 2352.242624] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2352.243248] __ip_finish_output.part.0+0x5f3/0xb50 [ 2352.243867] ? ip_fragment.constprop.0+0x240/0x240 [ 2352.244476] ? netif_rx_ni+0xe7/0x300 [ 2352.244965] ip_mc_output+0x401/0xa30 [ 2352.245443] ip_send_skb+0xdd/0x260 [ 2352.245910] udp_send_skb+0x6da/0x11d0 [ 2352.246417] udp_sendmsg+0x139a/0x2160 [ 2352.246909] ? mark_lock+0xf5/0x2df0 [ 2352.247377] ? ip_frag_init+0x350/0x350 [ 2352.247879] ? lock_chain_count+0x20/0x20 [ 2352.248395] ? udp_setsockopt+0xc0/0xc0 [ 2352.248895] ? mark_lock+0xf5/0x2df0 [ 2352.249355] ? lock_acquire+0x197/0x470 [ 2352.249861] ? lock_chain_count+0x20/0x20 [ 2352.250395] ? mark_lock+0xf5/0x2df0 [ 2352.250871] ? mark_lock+0xf5/0x2df0 [ 2352.251332] ? lock_chain_count+0x20/0x20 [ 2352.251855] ? __lock_acquire+0xbb1/0x5b00 [ 2352.252379] ? lock_chain_count+0x20/0x20 [ 2352.252915] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.253571] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.254114] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2352.254644] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.255277] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.255795] ? mark_lock+0xf5/0x2df0 [ 2352.256259] ? lock_acquire+0x197/0x470 [ 2352.256761] ? find_held_lock+0x2c/0x110 [ 2352.257267] ? __might_fault+0xd3/0x180 [ 2352.257767] ? lock_downgrade+0x6d0/0x6d0 [ 2352.258304] ? lock_downgrade+0x6d0/0x6d0 [ 2352.258830] ? sock_has_perm+0x1ea/0x280 [ 2352.259330] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2352.259981] ? _copy_from_user+0xfb/0x1b0 [ 2352.260512] ? __import_iovec+0x458/0x590 [ 2352.261033] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.261685] inet6_sendmsg+0x105/0x140 [ 2352.262187] ? inet6_compat_ioctl+0x320/0x320 [ 2352.262749] __sock_sendmsg+0xf2/0x190 [ 2352.263232] ____sys_sendmsg+0x70d/0x870 [ 2352.263747] ? sock_write_iter+0x3d0/0x3d0 [ 2352.264267] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.264762] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.265261] ? lock_downgrade+0x6d0/0x6d0 [ 2352.265786] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.266447] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.266965] ___sys_sendmsg+0xf3/0x170 [ 2352.267450] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.268030] ? __fget_files+0x2cf/0x520 [ 2352.268530] ? lock_downgrade+0x6d0/0x6d0 [ 2352.269048] ? find_held_lock+0x2c/0x110 [ 2352.269571] ? __fget_files+0x2f8/0x520 [ 2352.270091] ? __fget_light+0xea/0x290 [ 2352.270590] __sys_sendmsg+0xe5/0x1b0 [ 2352.271066] ? __sys_sendmsg_sock+0x40/0x40 [ 2352.271608] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.272204] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.272862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.273501] ? trace_hardirqs_on+0x5b/0x180 [ 2352.274067] do_syscall_64+0x33/0x40 [ 2352.274546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.275184] RIP: 0033:0x7f3f9ec55b19 [ 2352.275662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.277924] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2352.278887] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2352.279772] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2352.280655] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.281533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2352.282434] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2352.283344] CPU: 0 PID: 10896 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2352.284302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.285439] Call Trace: [ 2352.285811] dump_stack+0x107/0x167 [ 2352.286331] should_fail.cold+0x5/0xa [ 2352.286872] should_failslab+0x5/0x20 [ 2352.287407] __kmalloc_node_track_caller+0x74/0x3b0 [ 2352.288092] ? skb_segment+0x9d8/0x3aa0 [ 2352.288644] __alloc_skb+0xb1/0x5b0 [ 2352.289156] skb_segment+0x9d8/0x3aa0 [ 2352.289689] ? __lock_acquire+0xbb1/0x5b00 [ 2352.290332] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2352.291022] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.291745] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.292324] __udp_gso_segment+0x11c6/0x1830 [ 2352.292934] ? __sk_receive_skb+0x830/0x830 [ 2352.293538] udp4_ufo_fragment+0x528/0x720 [ 2352.294146] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2352.294839] inet_gso_segment+0x4fb/0x11a0 [ 2352.295441] skb_mac_gso_segment+0x273/0x570 [ 2352.296047] ? inet_sock_destruct+0x840/0x840 [ 2352.296651] ? skb_network_protocol+0x650/0x650 [ 2352.297286] ? skb_crc32c_csum_help+0x80/0x80 [ 2352.297908] ? lock_acquire+0x197/0x470 [ 2352.298479] ? __dev_queue_xmit+0x1c6/0x2690 [ 2352.299098] __skb_gso_segment+0x32d/0x6d0 [ 2352.299682] ? mark_lock+0xf5/0x2df0 [ 2352.300179] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2352.300846] ? lock_chain_count+0x20/0x20 [ 2352.301404] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2352.302043] __dev_queue_xmit+0x825/0x2690 [ 2352.302649] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2352.303353] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2352.303991] ? mark_held_locks+0x9e/0xe0 [ 2352.304562] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2352.305294] neigh_connected_output+0x382/0x4d0 [ 2352.305955] ip_finish_output2+0x6f1/0x21f0 [ 2352.306581] ? nf_hook_slow+0xfc/0x1e0 [ 2352.307128] ? ip_frag_next+0x9e0/0x9e0 [ 2352.307688] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2352.308393] __ip_finish_output.part.0+0x5f3/0xb50 [ 2352.309080] ? ip_fragment.constprop.0+0x240/0x240 [ 2352.309763] ? netif_rx_ni+0xe7/0x300 [ 2352.310322] ip_mc_output+0x401/0xa30 [ 2352.310863] ip_send_skb+0xdd/0x260 [ 2352.311378] udp_send_skb+0x6da/0x11d0 [ 2352.311937] udp_sendmsg+0x139a/0x2160 [ 2352.312479] ? mark_lock+0xf5/0x2df0 [ 2352.312998] ? ip_frag_init+0x350/0x350 [ 2352.313549] ? lock_chain_count+0x20/0x20 [ 2352.314146] ? udp_setsockopt+0xc0/0xc0 [ 2352.314696] ? mark_lock+0xf5/0x2df0 [ 2352.315217] ? lock_acquire+0x197/0x470 [ 2352.315772] ? lock_chain_count+0x20/0x20 [ 2352.316352] ? mark_lock+0xf5/0x2df0 [ 2352.316877] ? mark_lock+0xf5/0x2df0 [ 2352.317395] ? lock_chain_count+0x20/0x20 [ 2352.317959] ? __lock_acquire+0xbb1/0x5b00 [ 2352.318563] ? lock_chain_count+0x20/0x20 [ 2352.319155] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.319876] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.320450] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2352.321034] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.321745] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.322342] ? mark_lock+0xf5/0x2df0 [ 2352.322869] ? lock_acquire+0x197/0x470 [ 2352.323421] ? find_held_lock+0x2c/0x110 [ 2352.323995] ? __might_fault+0xd3/0x180 [ 2352.324552] ? lock_downgrade+0x6d0/0x6d0 [ 2352.325131] ? lock_downgrade+0x6d0/0x6d0 [ 2352.325714] ? sock_has_perm+0x1ea/0x280 [ 2352.326347] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2352.327112] ? _copy_from_user+0xfb/0x1b0 [ 2352.327720] ? __import_iovec+0x458/0x590 [ 2352.328296] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.329078] inet6_sendmsg+0x105/0x140 [ 2352.329647] ? inet6_compat_ioctl+0x320/0x320 [ 2352.330367] __sock_sendmsg+0xf2/0x190 [ 2352.330924] ____sys_sendmsg+0x70d/0x870 [ 2352.331489] ? sock_write_iter+0x3d0/0x3d0 [ 2352.332073] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.332622] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.333184] ? lock_downgrade+0x6d0/0x6d0 [ 2352.333765] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.334548] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.335190] ___sys_sendmsg+0xf3/0x170 [ 2352.335740] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.336379] ? __fget_files+0x2cf/0x520 [ 2352.336988] ? lock_downgrade+0x6d0/0x6d0 [ 2352.337617] ? find_held_lock+0x2c/0x110 [ 2352.338207] ? __fget_files+0x2f8/0x520 [ 2352.338789] ? __fget_light+0xea/0x290 [ 2352.339340] __sys_sendmsg+0xe5/0x1b0 [ 2352.339891] ? __sys_sendmsg_sock+0x40/0x40 [ 2352.340502] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.341174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.341915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.342654] ? trace_hardirqs_on+0x5b/0x180 [ 2352.343264] do_syscall_64+0x33/0x40 [ 2352.343783] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.344505] RIP: 0033:0x7f251a6f7b19 [ 2352.345022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.347563] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2352.348613] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2352.349593] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2352.350596] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.351582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2352.352569] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:51:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3e8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:03 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:03 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 58) [ 2352.466025] FAULT_INJECTION: forcing a failure. [ 2352.466025] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.467752] CPU: 0 PID: 10917 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2352.468710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.469861] Call Trace: [ 2352.470263] dump_stack+0x107/0x167 [ 2352.470776] should_fail.cold+0x5/0xa [ 2352.471318] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2352.472046] ? create_object.isra.0+0x3a/0xa20 [ 2352.472691] should_failslab+0x5/0x20 [ 2352.473228] kmem_cache_alloc+0x5b/0x310 [ 2352.473806] ? mark_held_locks+0x9e/0xe0 [ 2352.474405] create_object.isra.0+0x3a/0xa20 [ 2352.475020] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2352.475741] kmem_cache_alloc_node+0x169/0x330 [ 2352.476386] __alloc_skb+0x6d/0x5b0 [ 2352.476901] skb_segment+0x9d8/0x3aa0 [ 2352.477430] ? __lock_acquire+0xbb1/0x5b00 [ 2352.478076] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2352.478785] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.479511] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.480098] __udp_gso_segment+0x11c6/0x1830 [ 2352.480723] ? __sk_receive_skb+0x830/0x830 [ 2352.481338] udp4_ufo_fragment+0x528/0x720 [ 2352.481934] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2352.482654] inet_gso_segment+0x4fb/0x11a0 [ 2352.483256] skb_mac_gso_segment+0x273/0x570 [ 2352.483872] ? inet_sock_destruct+0x840/0x840 [ 2352.484497] ? skb_network_protocol+0x650/0x650 [ 2352.485147] ? skb_crc32c_csum_help+0x80/0x80 [ 2352.485780] ? lock_acquire+0x197/0x470 [ 2352.486361] ? __dev_queue_xmit+0x1c6/0x2690 [ 2352.486983] __skb_gso_segment+0x32d/0x6d0 [ 2352.487577] ? mark_lock+0xf5/0x2df0 [ 2352.488094] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2352.488838] ? lock_chain_count+0x20/0x20 [ 2352.489417] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2352.490076] __dev_queue_xmit+0x825/0x2690 [ 2352.490695] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2352.491408] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2352.492058] ? mark_held_locks+0x9e/0xe0 [ 2352.492628] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2352.493363] neigh_connected_output+0x382/0x4d0 [ 2352.494043] ip_finish_output2+0x6f1/0x21f0 [ 2352.494661] ? nf_hook_slow+0xfc/0x1e0 [ 2352.495230] ? ip_frag_next+0x9e0/0x9e0 [ 2352.495785] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2352.496498] __ip_finish_output.part.0+0x5f3/0xb50 [ 2352.497182] ? ip_fragment.constprop.0+0x240/0x240 [ 2352.497865] ? netif_rx_ni+0xe7/0x300 [ 2352.498425] ip_mc_output+0x401/0xa30 [ 2352.498964] ip_send_skb+0xdd/0x260 [ 2352.499479] udp_send_skb+0x6da/0x11d0 [ 2352.500050] udp_sendmsg+0x139a/0x2160 [ 2352.500608] ? mark_lock+0xf5/0x2df0 [ 2352.501129] ? ip_frag_init+0x350/0x350 [ 2352.501685] ? lock_chain_count+0x20/0x20 [ 2352.502300] ? udp_setsockopt+0xc0/0xc0 [ 2352.502859] ? mark_lock+0xf5/0x2df0 [ 2352.503374] ? lock_acquire+0x197/0x470 [ 2352.503930] ? lock_chain_count+0x20/0x20 [ 2352.504518] ? mark_lock+0xf5/0x2df0 [ 2352.505051] ? mark_lock+0xf5/0x2df0 [ 2352.505573] ? lock_chain_count+0x20/0x20 [ 2352.506184] ? __lock_acquire+0xbb1/0x5b00 [ 2352.506773] ? lock_chain_count+0x20/0x20 [ 2352.507366] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.508091] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.508668] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2352.509252] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.509970] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.510570] ? mark_lock+0xf5/0x2df0 [ 2352.511111] ? lock_acquire+0x197/0x470 [ 2352.511678] ? find_held_lock+0x2c/0x110 [ 2352.512247] ? __might_fault+0xd3/0x180 [ 2352.512811] ? lock_downgrade+0x6d0/0x6d0 [ 2352.513394] ? lock_downgrade+0x6d0/0x6d0 [ 2352.514016] ? sock_has_perm+0x1ea/0x280 [ 2352.514600] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2352.515332] ? _copy_from_user+0xfb/0x1b0 [ 2352.515932] ? __import_iovec+0x458/0x590 [ 2352.516512] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.517234] inet6_sendmsg+0x105/0x140 [ 2352.517779] ? inet6_compat_ioctl+0x320/0x320 [ 2352.518430] __sock_sendmsg+0xf2/0x190 [ 2352.518987] ____sys_sendmsg+0x70d/0x870 [ 2352.519564] ? sock_write_iter+0x3d0/0x3d0 [ 2352.520163] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.520710] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.521275] ? lock_downgrade+0x6d0/0x6d0 [ 2352.521861] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.522631] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.523216] ___sys_sendmsg+0xf3/0x170 [ 2352.523765] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.524417] ? __fget_files+0x2cf/0x520 [ 2352.524981] ? lock_downgrade+0x6d0/0x6d0 [ 2352.525572] ? find_held_lock+0x2c/0x110 [ 2352.526193] ? __fget_files+0x2f8/0x520 [ 2352.526766] ? __fget_light+0xea/0x290 [ 2352.527325] __sys_sendmsg+0xe5/0x1b0 [ 2352.527871] ? __sys_sendmsg_sock+0x40/0x40 [ 2352.528430] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.529084] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.529818] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.530564] ? trace_hardirqs_on+0x5b/0x180 [ 2352.531178] do_syscall_64+0x33/0x40 [ 2352.531705] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.532429] RIP: 0033:0x7f3f9ec55b19 [ 2352.532959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.535538] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2352.536595] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2352.537582] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2352.538603] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.539605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2352.540612] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:51:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)="e8", 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x5b0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 60) 09:51:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:03 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 59) 09:51:03 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2352.702434] FAULT_INJECTION: forcing a failure. [ 2352.702434] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.707402] CPU: 1 PID: 10930 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2352.708265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.709281] Call Trace: [ 2352.709621] dump_stack+0x107/0x167 [ 2352.714106] should_fail.cold+0x5/0xa [ 2352.714620] should_failslab+0x5/0x20 [ 2352.715131] __kmalloc_node_track_caller+0x74/0x3b0 [ 2352.715795] ? skb_segment+0x9d8/0x3aa0 [ 2352.716326] __alloc_skb+0xb1/0x5b0 [ 2352.716825] skb_segment+0x9d8/0x3aa0 [ 2352.717336] ? __lock_acquire+0xbb1/0x5b00 [ 2352.717956] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2352.721591] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.722291] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.722829] __udp_gso_segment+0x11c6/0x1830 [ 2352.723400] ? __sk_receive_skb+0x830/0x830 [ 2352.723956] udp4_ufo_fragment+0x528/0x720 [ 2352.724517] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2352.725162] inet_gso_segment+0x4fb/0x11a0 [ 2352.725712] skb_mac_gso_segment+0x273/0x570 [ 2352.726296] ? inet_sock_destruct+0x840/0x840 [ 2352.726867] ? skb_network_protocol+0x650/0x650 [ 2352.727449] ? skb_crc32c_csum_help+0x80/0x80 [ 2352.728028] ? lock_acquire+0x197/0x470 [ 2352.728525] ? __dev_queue_xmit+0x1c6/0x2690 [ 2352.729083] __skb_gso_segment+0x32d/0x6d0 [ 2352.729630] ? mark_lock+0xf5/0x2df0 [ 2352.730114] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2352.730804] ? lock_chain_count+0x20/0x20 [ 2352.731345] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2352.731941] __dev_queue_xmit+0x825/0x2690 [ 2352.732504] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2352.733167] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2352.733757] ? mark_held_locks+0x9e/0xe0 [ 2352.734732] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2352.735675] neigh_connected_output+0x382/0x4d0 [ 2352.736615] ip_finish_output2+0x6f1/0x21f0 [ 2352.737186] ? nf_hook_slow+0xfc/0x1e0 [ 2352.739594] ? ip_frag_next+0x9e0/0x9e0 [ 2352.744181] FAULT_INJECTION: forcing a failure. [ 2352.744181] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.754551] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2352.754576] __ip_finish_output.part.0+0x5f3/0xb50 [ 2352.754595] ? ip_fragment.constprop.0+0x240/0x240 [ 2352.754610] ? netif_rx_ni+0xe7/0x300 [ 2352.754630] ip_mc_output+0x401/0xa30 [ 2352.754649] ip_send_skb+0xdd/0x260 [ 2352.754667] udp_send_skb+0x6da/0x11d0 [ 2352.754692] udp_sendmsg+0x139a/0x2160 [ 2352.754707] ? mark_lock+0xf5/0x2df0 [ 2352.754723] ? ip_frag_init+0x350/0x350 [ 2352.754738] ? lock_chain_count+0x20/0x20 [ 2352.754757] ? udp_setsockopt+0xc0/0xc0 [ 2352.754769] ? mark_lock+0xf5/0x2df0 [ 2352.754782] ? lock_acquire+0x197/0x470 [ 2352.754798] ? lock_chain_count+0x20/0x20 [ 2352.754813] ? mark_lock+0xf5/0x2df0 [ 2352.754831] ? mark_lock+0xf5/0x2df0 [ 2352.754846] ? lock_chain_count+0x20/0x20 [ 2352.754858] ? __lock_acquire+0xbb1/0x5b00 [ 2352.754874] ? lock_chain_count+0x20/0x20 [ 2352.754900] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.754914] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.754939] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2352.754966] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.754980] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.755001] ? mark_lock+0xf5/0x2df0 [ 2352.755019] ? lock_acquire+0x197/0x470 [ 2352.755032] ? find_held_lock+0x2c/0x110 [ 2352.755053] ? __might_fault+0xd3/0x180 [ 2352.755069] ? lock_downgrade+0x6d0/0x6d0 [ 2352.755085] ? lock_downgrade+0x6d0/0x6d0 [ 2352.755102] ? sock_has_perm+0x1ea/0x280 [ 2352.755115] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2352.755135] ? _copy_from_user+0xfb/0x1b0 [ 2352.755160] ? __import_iovec+0x458/0x590 [ 2352.755176] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.755196] inet6_sendmsg+0x105/0x140 [ 2352.755210] ? inet6_compat_ioctl+0x320/0x320 [ 2352.755224] __sock_sendmsg+0xf2/0x190 [ 2352.755239] ____sys_sendmsg+0x70d/0x870 [ 2352.755257] ? sock_write_iter+0x3d0/0x3d0 [ 2352.755270] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.755287] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.755299] ? lock_downgrade+0x6d0/0x6d0 [ 2352.755316] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.755329] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.755348] ___sys_sendmsg+0xf3/0x170 [ 2352.755364] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.755384] ? __fget_files+0x2cf/0x520 [ 2352.755399] ? lock_downgrade+0x6d0/0x6d0 [ 2352.755415] ? find_held_lock+0x2c/0x110 [ 2352.755439] ? __fget_files+0x2f8/0x520 [ 2352.755460] ? __fget_light+0xea/0x290 [ 2352.755481] __sys_sendmsg+0xe5/0x1b0 [ 2352.755496] ? __sys_sendmsg_sock+0x40/0x40 [ 2352.755511] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.755543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.755559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.755572] ? trace_hardirqs_on+0x5b/0x180 [ 2352.755587] do_syscall_64+0x33/0x40 [ 2352.755602] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.755613] RIP: 0033:0x7f3f9ec55b19 [ 2352.755628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.755635] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2352.755652] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2352.755661] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2352.755670] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.755679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2352.755688] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2352.870618] CPU: 0 PID: 10931 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2352.871491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.872535] Call Trace: [ 2352.872877] dump_stack+0x107/0x167 [ 2352.873336] should_fail.cold+0x5/0xa [ 2352.873820] ? create_object.isra.0+0x3a/0xa20 [ 2352.874426] should_failslab+0x5/0x20 [ 2352.874909] kmem_cache_alloc+0x5b/0x310 [ 2352.875425] create_object.isra.0+0x3a/0xa20 [ 2352.875979] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2352.876628] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2352.877269] ? skb_segment+0x9d8/0x3aa0 [ 2352.877781] __alloc_skb+0xb1/0x5b0 [ 2352.878270] skb_segment+0x9d8/0x3aa0 [ 2352.878757] ? __lock_acquire+0xbb1/0x5b00 [ 2352.879333] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2352.879980] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2352.880641] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.881168] __udp_gso_segment+0x11c6/0x1830 [ 2352.881770] ? __sk_receive_skb+0x830/0x830 [ 2352.882384] udp4_ufo_fragment+0x528/0x720 [ 2352.882982] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2352.883680] inet_gso_segment+0x4fb/0x11a0 [ 2352.884283] skb_mac_gso_segment+0x273/0x570 [ 2352.884893] ? inet_sock_destruct+0x840/0x840 [ 2352.885511] ? skb_network_protocol+0x650/0x650 [ 2352.886196] ? skb_crc32c_csum_help+0x80/0x80 [ 2352.887521] ? lock_acquire+0x197/0x470 [ 2352.888743] ? __dev_queue_xmit+0x1c6/0x2690 [ 2352.890152] __skb_gso_segment+0x32d/0x6d0 [ 2352.891520] ? mark_lock+0xf5/0x2df0 [ 2352.892708] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2352.894339] ? lock_chain_count+0x20/0x20 [ 2352.895714] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2352.897182] __dev_queue_xmit+0x825/0x2690 [ 2352.898603] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2352.900273] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2352.901772] ? mark_held_locks+0x9e/0xe0 [ 2352.903081] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2352.904807] neigh_connected_output+0x382/0x4d0 [ 2352.906362] ip_finish_output2+0x6f1/0x21f0 [ 2352.907716] ? nf_hook_slow+0xfc/0x1e0 [ 2352.908968] ? ip_frag_next+0x9e0/0x9e0 [ 2352.910253] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2352.911895] __ip_finish_output.part.0+0x5f3/0xb50 [ 2352.913481] ? ip_fragment.constprop.0+0x240/0x240 [ 2352.915061] ? netif_rx_ni+0xe7/0x300 [ 2352.916244] ip_mc_output+0x401/0xa30 [ 2352.917415] ip_send_skb+0xdd/0x260 [ 2352.918615] udp_send_skb+0x6da/0x11d0 [ 2352.919907] udp_sendmsg+0x139a/0x2160 [ 2352.921196] ? mark_lock+0xf5/0x2df0 [ 2352.922405] ? ip_frag_init+0x350/0x350 [ 2352.923716] ? mark_lock+0xf5/0x2df0 [ 2352.924950] ? udp_setsockopt+0xc0/0xc0 [ 2352.926270] ? mark_lock+0xf5/0x2df0 [ 2352.927484] ? lock_chain_count+0x20/0x20 [ 2352.928859] ? lock_chain_count+0x20/0x20 [ 2352.930235] ? perf_output_begin+0x589/0xc60 [ 2352.931709] ? mark_lock+0xf5/0x2df0 [ 2352.932944] ? mark_lock+0xf5/0x2df0 [ 2352.934180] ? lock_chain_count+0x20/0x20 [ 2352.935545] ? lock_chain_count+0x20/0x20 [ 2352.936921] ? __lock_acquire+0xbb1/0x5b00 [ 2352.938391] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2352.939750] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.941431] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.942795] ? perf_event_update_userpage+0x4aa/0x7f0 [ 2352.944357] ? lock_acquire+0x197/0x470 [ 2352.945627] ? find_held_lock+0x2c/0x110 [ 2352.946963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.948653] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2352.950385] ? trace_hardirqs_on+0x5b/0x180 [ 2352.951805] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2352.953604] ? sock_has_perm+0x1ea/0x280 [ 2352.954955] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.956708] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2352.958482] ? trace_hardirqs_on+0x5b/0x180 [ 2352.959926] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2352.961646] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.963261] ? udp_v6_push_pending_frames+0x360/0x360 [ 2352.964887] inet6_sendmsg+0x105/0x140 [ 2352.966045] ? inet6_compat_ioctl+0x320/0x320 [ 2352.967365] __sock_sendmsg+0xf2/0x190 [ 2352.968515] ____sys_sendmsg+0x70d/0x870 [ 2352.969711] ? sock_write_iter+0x3d0/0x3d0 [ 2352.970992] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.972143] ? SOFTIRQ_verbose+0x10/0x10 [ 2352.973343] ___sys_sendmsg+0xf3/0x170 [ 2352.974537] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.975900] ? __fget_files+0x2cf/0x520 [ 2352.977068] ? lock_downgrade+0x6d0/0x6d0 [ 2352.978336] ? __fget_files+0x2c7/0x520 [ 2352.979513] ? __fget_files+0x2f8/0x520 [ 2352.980690] ? __fget_light+0xea/0x290 [ 2352.981836] __sys_sendmsg+0xe5/0x1b0 [ 2352.982999] ? __sys_sendmsg_sock+0x40/0x40 [ 2352.984270] ? io_schedule_timeout+0x140/0x140 [ 2352.985622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2352.987198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.988713] ? trace_hardirqs_on+0x5b/0x180 [ 2352.989984] do_syscall_64+0x33/0x40 [ 2352.991113] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.992625] RIP: 0033:0x7f251a6f7b19 [ 2352.993722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.999250] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2353.001498] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2353.003643] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2353.005752] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2353.007895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2353.010021] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2369.008921] FAULT_INJECTION: forcing a failure. [ 2369.008921] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.010330] CPU: 1 PID: 10950 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2369.011201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.012222] Call Trace: [ 2369.012552] dump_stack+0x107/0x167 [ 2369.013003] should_fail.cold+0x5/0xa [ 2369.013474] ? create_object.isra.0+0x3a/0xa20 [ 2369.014037] should_failslab+0x5/0x20 [ 2369.014507] kmem_cache_alloc+0x5b/0x310 [ 2369.015041] create_object.isra.0+0x3a/0xa20 [ 2369.015583] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2369.016209] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2369.016830] ? skb_segment+0x9d8/0x3aa0 [ 2369.017323] __alloc_skb+0xb1/0x5b0 [ 2369.017774] skb_segment+0x9d8/0x3aa0 [ 2369.018245] ? __lock_acquire+0xbb1/0x5b00 [ 2369.018826] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2369.019443] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.020085] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.020591] __udp_gso_segment+0x11c6/0x1830 [ 2369.021130] ? __sk_receive_skb+0x830/0x830 [ 2369.021669] udp4_ufo_fragment+0x528/0x720 [ 2369.022193] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2369.022822] inet_gso_segment+0x4fb/0x11a0 [ 2369.023353] skb_mac_gso_segment+0x273/0x570 [ 2369.023896] ? inet_sock_destruct+0x840/0x840 [ 2369.024452] ? skb_network_protocol+0x650/0x650 [ 2369.025021] ? skb_crc32c_csum_help+0x80/0x80 [ 2369.025573] ? lock_acquire+0x197/0x470 [ 2369.026060] ? __dev_queue_xmit+0x1c6/0x2690 [ 2369.026613] __skb_gso_segment+0x32d/0x6d0 [ 2369.027139] ? mark_lock+0xf5/0x2df0 [ 2369.027605] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2369.028248] ? lock_chain_count+0x20/0x20 [ 2369.028755] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2369.029318] __dev_queue_xmit+0x825/0x2690 [ 2369.029842] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2369.030479] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2369.031058] ? mark_held_locks+0x9e/0xe0 [ 2369.031562] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2369.032210] neigh_connected_output+0x382/0x4d0 [ 2369.032793] ip_finish_output2+0x6f1/0x21f0 [ 2369.033325] ? nf_hook_slow+0xfc/0x1e0 [ 2369.033806] ? ip_frag_next+0x9e0/0x9e0 [ 2369.034297] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2369.034932] __ip_finish_output.part.0+0x5f3/0xb50 [ 2369.035537] ? ip_fragment.constprop.0+0x240/0x240 [ 2369.036139] ? netif_rx_ni+0xe7/0x300 [ 2369.036612] ip_mc_output+0x401/0xa30 [ 2369.037082] ip_send_skb+0xdd/0x260 [ 2369.037531] udp_send_skb+0x6da/0x11d0 [ 2369.038017] udp_sendmsg+0x139a/0x2160 [ 2369.038495] ? mark_lock+0xf5/0x2df0 [ 2369.038966] ? ip_frag_init+0x350/0x350 [ 2369.039456] ? lock_chain_count+0x20/0x20 [ 2369.039968] ? udp_setsockopt+0xc0/0xc0 [ 2369.040459] ? mark_lock+0xf5/0x2df0 [ 2369.040916] ? lock_acquire+0x197/0x470 [ 2369.041407] ? lock_chain_count+0x20/0x20 [ 2369.041917] ? mark_lock+0xf5/0x2df0 [ 2369.042381] ? mark_lock+0xf5/0x2df0 [ 2369.042852] ? lock_chain_count+0x20/0x20 [ 2369.043360] ? __lock_acquire+0xbb1/0x5b00 [ 2369.043881] ? lock_chain_count+0x20/0x20 [ 2369.044405] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.045046] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.045554] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2369.046065] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.046718] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.047221] ? mark_lock+0xf5/0x2df0 [ 2369.047685] ? lock_acquire+0x197/0x470 [ 2369.048173] ? find_held_lock+0x2c/0x110 [ 2369.048676] ? __might_fault+0xd3/0x180 [ 2369.049165] ? lock_downgrade+0x6d0/0x6d0 [ 2369.049676] ? lock_downgrade+0x6d0/0x6d0 [ 2369.050190] ? sock_has_perm+0x1ea/0x280 [ 2369.050702] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2369.051344] ? _copy_from_user+0xfb/0x1b0 [ 2369.051866] ? __import_iovec+0x458/0x590 [ 2369.052377] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.053014] inet6_sendmsg+0x105/0x140 [ 2369.053498] ? inet6_compat_ioctl+0x320/0x320 [ 2369.054047] __sock_sendmsg+0xf2/0x190 [ 2369.054527] ____sys_sendmsg+0x70d/0x870 [ 2369.055038] ? sock_write_iter+0x3d0/0x3d0 [ 2369.055556] ? do_recvmmsg+0x6d0/0x6d0 [ 2369.056037] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.056539] ? lock_downgrade+0x6d0/0x6d0 [ 2369.057051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.057691] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.058194] ___sys_sendmsg+0xf3/0x170 [ 2369.058682] ? sendmsg_copy_msghdr+0x160/0x160 [ 2369.059256] ? __fget_files+0x2cf/0x520 [ 2369.059745] ? lock_downgrade+0x6d0/0x6d0 [ 2369.060254] ? find_held_lock+0x2c/0x110 [ 2369.060762] ? __fget_files+0x2f8/0x520 [ 2369.061258] ? __fget_light+0xea/0x290 [ 2369.061743] __sys_sendmsg+0xe5/0x1b0 [ 2369.062214] ? __sys_sendmsg_sock+0x40/0x40 [ 2369.062759] ? rcu_read_lock_any_held+0x75/0xa0 [ 2369.063348] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.063992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.064622] ? trace_hardirqs_on+0x5b/0x180 [ 2369.065152] do_syscall_64+0x33/0x40 [ 2369.065610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.066238] RIP: 0033:0x7f3f9ec55b19 [ 2369.066709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.068955] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2369.069888] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2369.070774] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2369.071652] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.072525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.073397] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:51:20 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:20 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:20 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d3", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:51:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1f9c}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:20 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:20 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 60) 09:51:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x5c4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 61) [ 2369.131720] FAULT_INJECTION: forcing a failure. [ 2369.131720] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.152069] CPU: 1 PID: 10969 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2369.152914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.153922] Call Trace: [ 2369.154252] dump_stack+0x107/0x167 [ 2369.154723] should_fail.cold+0x5/0xa [ 2369.155190] ? trace_hardirqs_on+0x5b/0x180 [ 2369.155720] ? __alloc_skb+0x6d/0x5b0 [ 2369.156189] should_failslab+0x5/0x20 [ 2369.156658] kmem_cache_alloc_node+0x55/0x330 [ 2369.157212] __alloc_skb+0x6d/0x5b0 [ 2369.157669] skb_segment+0x9d8/0x3aa0 [ 2369.158139] ? __lock_acquire+0xbb1/0x5b00 [ 2369.158696] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2369.159315] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.159957] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.160462] __udp_gso_segment+0x11c6/0x1830 [ 2369.161002] ? __sk_receive_skb+0x830/0x830 [ 2369.161538] udp4_ufo_fragment+0x528/0x720 [ 2369.162063] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2369.162686] inet_gso_segment+0x4fb/0x11a0 [ 2369.163220] skb_mac_gso_segment+0x273/0x570 [ 2369.163764] ? inet_sock_destruct+0x840/0x840 [ 2369.164314] ? skb_network_protocol+0x650/0x650 [ 2369.164881] ? skb_crc32c_csum_help+0x80/0x80 [ 2369.165431] ? lock_acquire+0x197/0x470 [ 2369.165916] ? __dev_queue_xmit+0x1c6/0x2690 [ 2369.166459] __skb_gso_segment+0x32d/0x6d0 [ 2369.166989] ? mark_lock+0xf5/0x2df0 [ 2369.167451] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2369.168093] ? lock_chain_count+0x20/0x20 [ 2369.168598] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2369.169157] __dev_queue_xmit+0x825/0x2690 [ 2369.169678] ? percpu_rwsem_wake_function+0x3d0/0x3f0 09:51:20 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2369.170307] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2369.170890] ? mark_held_locks+0x9e/0xe0 [ 2369.174797] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2369.175447] neigh_connected_output+0x382/0x4d0 [ 2369.176026] ip_finish_output2+0x6f1/0x21f0 [ 2369.176560] ? nf_hook_slow+0xfc/0x1e0 [ 2369.177036] ? ip_frag_next+0x9e0/0x9e0 [ 2369.177523] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2369.178140] __ip_finish_output.part.0+0x5f3/0xb50 [ 2369.178775] ? ip_fragment.constprop.0+0x240/0x240 [ 2369.179356] ? netif_rx_ni+0xe7/0x300 [ 2369.179814] ip_mc_output+0x401/0xa30 [ 2369.180284] ip_send_skb+0xdd/0x260 [ 2369.180753] udp_send_skb+0x6da/0x11d0 [ 2369.181248] udp_sendmsg+0x139a/0x2160 [ 2369.181714] ? mark_lock+0xf5/0x2df0 [ 2369.182154] ? ip_frag_init+0x350/0x350 [ 2369.182633] ? lock_chain_count+0x20/0x20 [ 2369.183132] ? udp_setsockopt+0xc0/0xc0 [ 2369.183599] ? mark_lock+0xf5/0x2df0 [ 2369.184033] ? lock_acquire+0x197/0x470 [ 2369.184508] ? lock_chain_count+0x20/0x20 [ 2369.184997] ? mark_lock+0xf5/0x2df0 [ 2369.185437] ? mark_lock+0xf5/0x2df0 [ 2369.185879] ? lock_chain_count+0x20/0x20 [ 2369.186386] ? __lock_acquire+0xbb1/0x5b00 [ 2369.186912] ? lock_chain_count+0x20/0x20 [ 2369.187413] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.188033] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.188535] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2369.189059] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.189678] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.190168] ? mark_lock+0xf5/0x2df0 [ 2369.190624] ? lock_acquire+0x197/0x470 [ 2369.191127] ? find_held_lock+0x2c/0x110 [ 2369.191631] ? __might_fault+0xd3/0x180 [ 2369.192117] ? lock_downgrade+0x6d0/0x6d0 [ 2369.192624] ? lock_downgrade+0x6d0/0x6d0 [ 2369.193132] ? sock_has_perm+0x1ea/0x280 [ 2369.193626] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2369.194258] ? _copy_from_user+0xfb/0x1b0 [ 2369.194800] ? __import_iovec+0x458/0x590 [ 2369.195306] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.195940] inet6_sendmsg+0x105/0x140 [ 2369.196418] ? inet6_compat_ioctl+0x320/0x320 [ 2369.196964] __sock_sendmsg+0xf2/0x190 [ 2369.197441] ____sys_sendmsg+0x70d/0x870 [ 2369.197939] ? sock_write_iter+0x3d0/0x3d0 [ 2369.198454] ? do_recvmmsg+0x6d0/0x6d0 [ 2369.198948] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.199442] ? lock_downgrade+0x6d0/0x6d0 [ 2369.199950] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.200586] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.201084] ___sys_sendmsg+0xf3/0x170 [ 2369.201566] ? sendmsg_copy_msghdr+0x160/0x160 [ 2369.202128] ? __fget_files+0x2cf/0x520 [ 2369.202627] ? lock_downgrade+0x6d0/0x6d0 [ 2369.203142] ? find_held_lock+0x2c/0x110 [ 2369.203647] ? __fget_files+0x2f8/0x520 [ 2369.204141] ? __fget_light+0xea/0x290 [ 2369.204634] __sys_sendmsg+0xe5/0x1b0 [ 2369.205101] ? __sys_sendmsg_sock+0x40/0x40 [ 2369.205628] ? rcu_read_lock_any_held+0x75/0xa0 [ 2369.206211] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.206870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.207498] ? trace_hardirqs_on+0x5b/0x180 [ 2369.208027] do_syscall_64+0x33/0x40 [ 2369.208484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.209112] RIP: 0033:0x7f251a6f7b19 [ 2369.209569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.211778] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2369.212704] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2369.213545] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2369.214379] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.215285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.216147] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:51:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x5c8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:20 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 61) [ 2369.295300] FAULT_INJECTION: forcing a failure. [ 2369.295300] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.296769] CPU: 1 PID: 10979 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2369.297650] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.298713] Call Trace: [ 2369.299044] dump_stack+0x107/0x167 [ 2369.299517] should_fail.cold+0x5/0xa [ 2369.299999] ? trace_hardirqs_on+0x5b/0x180 [ 2369.300553] ? __alloc_skb+0x6d/0x5b0 [ 2369.301055] should_failslab+0x5/0x20 [ 2369.301560] kmem_cache_alloc_node+0x55/0x330 [ 2369.302147] __alloc_skb+0x6d/0x5b0 [ 2369.302646] skb_segment+0x9d8/0x3aa0 [ 2369.303164] ? __lock_acquire+0xbb1/0x5b00 [ 2369.310945] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2369.311592] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.312236] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.312735] __udp_gso_segment+0x11c6/0x1830 [ 2369.313258] ? __sk_receive_skb+0x830/0x830 [ 2369.313776] udp4_ufo_fragment+0x528/0x720 [ 2369.314281] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2369.318919] inet_gso_segment+0x4fb/0x11a0 [ 2369.319439] skb_mac_gso_segment+0x273/0x570 [ 2369.319968] ? inet_sock_destruct+0x840/0x840 [ 2369.320500] ? skb_network_protocol+0x650/0x650 [ 2369.321049] ? skb_crc32c_csum_help+0x80/0x80 [ 2369.321597] ? lock_acquire+0x197/0x470 [ 2369.322072] ? __dev_queue_xmit+0x1c6/0x2690 [ 2369.322613] __skb_gso_segment+0x32d/0x6d0 [ 2369.323119] ? mark_lock+0xf5/0x2df0 [ 2369.326954] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2369.327570] ? lock_chain_count+0x20/0x20 [ 2369.328062] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2369.328605] __dev_queue_xmit+0x825/0x2690 [ 2369.329111] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2369.329719] ? netdev_core_pick_tx+0x2f0/0x2f0 09:51:20 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2369.330264] ? mark_held_locks+0x9e/0xe0 [ 2369.342774] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2369.343401] neigh_connected_output+0x382/0x4d0 [ 2369.343967] ip_finish_output2+0x6f1/0x21f0 [ 2369.344481] ? nf_hook_slow+0xfc/0x1e0 [ 2369.344947] ? ip_frag_next+0x9e0/0x9e0 [ 2369.345423] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2369.346034] __ip_finish_output.part.0+0x5f3/0xb50 [ 2369.346639] ? ip_fragment.constprop.0+0x240/0x240 [ 2369.347254] ? netif_rx_ni+0xe7/0x300 [ 2369.347709] ip_mc_output+0x401/0xa30 [ 2369.348163] ip_send_skb+0xdd/0x260 [ 2369.348602] udp_send_skb+0x6da/0x11d0 [ 2369.349107] udp_sendmsg+0x139a/0x2160 [ 2369.349574] ? mark_lock+0xf5/0x2df0 [ 2369.350020] ? ip_frag_init+0x350/0x350 [ 2369.350495] ? lock_chain_count+0x20/0x20 [ 2369.351004] ? udp_setsockopt+0xc0/0xc0 [ 2369.351507] ? mark_lock+0xf5/0x2df0 [ 2369.351963] ? lock_acquire+0x197/0x470 [ 2369.352447] ? lock_chain_count+0x20/0x20 [ 2369.352946] ? mark_lock+0xf5/0x2df0 [ 2369.353403] ? mark_lock+0xf5/0x2df0 [ 2369.353876] ? lock_chain_count+0x20/0x20 [ 2369.354396] ? __lock_acquire+0xbb1/0x5b00 [ 2369.354924] ? lock_chain_count+0x20/0x20 [ 2369.355437] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.356065] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.356554] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2369.357045] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.357652] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.358134] ? mark_lock+0xf5/0x2df0 [ 2369.358583] ? lock_acquire+0x197/0x470 [ 2369.359078] ? find_held_lock+0x2c/0x110 [ 2369.359563] ? __might_fault+0xd3/0x180 [ 2369.360039] ? lock_downgrade+0x6d0/0x6d0 [ 2369.360530] ? lock_downgrade+0x6d0/0x6d0 [ 2369.361023] ? sock_has_perm+0x1ea/0x280 [ 2369.361503] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2369.362119] ? _copy_from_user+0xfb/0x1b0 [ 2369.366675] ? __import_iovec+0x458/0x590 [ 2369.367197] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.367824] inet6_sendmsg+0x105/0x140 [ 2369.368289] ? inet6_compat_ioctl+0x320/0x320 [ 2369.368817] __sock_sendmsg+0xf2/0x190 [ 2369.369280] ____sys_sendmsg+0x70d/0x870 [ 2369.369770] ? sock_write_iter+0x3d0/0x3d0 [ 2369.370299] ? do_recvmmsg+0x6d0/0x6d0 [ 2369.370802] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.371277] ? lock_downgrade+0x6d0/0x6d0 [ 2369.371768] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.372387] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.372874] ___sys_sendmsg+0xf3/0x170 [ 2369.373345] ? sendmsg_copy_msghdr+0x160/0x160 [ 2369.373896] ? __fget_files+0x2cf/0x520 [ 2369.374364] ? lock_downgrade+0x6d0/0x6d0 [ 2369.374887] ? find_held_lock+0x2c/0x110 [ 2369.375394] ? __fget_files+0x2f8/0x520 [ 2369.375878] ? __fget_light+0xea/0x290 [ 2369.376349] __sys_sendmsg+0xe5/0x1b0 [ 2369.376806] ? __sys_sendmsg_sock+0x40/0x40 [ 2369.377335] ? rcu_read_lock_any_held+0x75/0xa0 [ 2369.377899] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.378525] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.379146] ? trace_hardirqs_on+0x5b/0x180 [ 2369.379662] do_syscall_64+0x33/0x40 [ 2369.380127] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.380742] RIP: 0033:0x7f3f9ec55b19 [ 2369.381188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.383387] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2369.384285] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2369.385121] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2369.386217] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.391134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.392056] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:51:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc8}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:20 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:20 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2369.565878] blktrace: Concurrent blktraces are not allowed on loop14 09:51:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 62) 09:51:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x5d2, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fdc}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2369.602738] FAULT_INJECTION: forcing a failure. [ 2369.602738] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.604157] CPU: 1 PID: 10998 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2369.604967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.605946] Call Trace: [ 2369.606272] dump_stack+0x107/0x167 [ 2369.606755] should_fail.cold+0x5/0xa [ 2369.607233] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2369.607874] ? create_object.isra.0+0x3a/0xa20 [ 2369.608419] should_failslab+0x5/0x20 [ 2369.608871] kmem_cache_alloc+0x5b/0x310 [ 2369.609355] ? mark_held_locks+0x9e/0xe0 [ 2369.609841] create_object.isra.0+0x3a/0xa20 [ 2369.610376] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2369.611484] kmem_cache_alloc_node+0x169/0x330 [ 2369.612612] __alloc_skb+0x6d/0x5b0 [ 2369.613516] skb_segment+0x9d8/0x3aa0 [ 2369.614440] ? __lock_acquire+0xbb1/0x5b00 [ 2369.615217] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2369.615820] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.616454] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.616944] __udp_gso_segment+0x11c6/0x1830 [ 2369.617483] ? __sk_receive_skb+0x830/0x830 [ 2369.618006] udp4_ufo_fragment+0x528/0x720 [ 2369.618517] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2369.619189] inet_gso_segment+0x4fb/0x11a0 [ 2369.619718] skb_mac_gso_segment+0x273/0x570 [ 2369.620244] ? inet_sock_destruct+0x840/0x840 [ 2369.620799] ? skb_network_protocol+0x650/0x650 [ 2369.621347] ? skb_crc32c_csum_help+0x80/0x80 [ 2369.621878] ? lock_acquire+0x197/0x470 [ 2369.622352] ? __dev_queue_xmit+0x1c6/0x2690 [ 2369.623287] __skb_gso_segment+0x32d/0x6d0 [ 2369.624321] ? mark_lock+0xf5/0x2df0 [ 2369.625237] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2369.626517] ? lock_chain_count+0x20/0x20 [ 2369.627703] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2369.628855] __dev_queue_xmit+0x825/0x2690 [ 2369.629883] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2369.630898] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2369.631453] ? mark_held_locks+0x9e/0xe0 [ 2369.631942] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2369.632607] neigh_connected_output+0x382/0x4d0 [ 2369.633175] ip_finish_output2+0x6f1/0x21f0 [ 2369.633688] ? nf_hook_slow+0xfc/0x1e0 [ 2369.634157] ? ip_frag_next+0x9e0/0x9e0 [ 2369.634651] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2369.636076] __ip_finish_output.part.0+0x5f3/0xb50 [ 2369.637291] ? ip_fragment.constprop.0+0x240/0x240 [ 2369.638561] ? netif_rx_ni+0xe7/0x300 [ 2369.639749] ip_mc_output+0x401/0xa30 [ 2369.640702] ip_send_skb+0xdd/0x260 [ 2369.641585] udp_send_skb+0x6da/0x11d0 [ 2369.642628] udp_sendmsg+0x139a/0x2160 [ 2369.647133] ? mark_lock+0xf5/0x2df0 [ 2369.647594] ? ip_frag_init+0x350/0x350 [ 2369.648081] ? lock_chain_count+0x20/0x20 [ 2369.648596] ? udp_setsockopt+0xc0/0xc0 [ 2369.649078] ? mark_lock+0xf5/0x2df0 [ 2369.649533] ? lock_acquire+0x197/0x470 [ 2369.650020] ? lock_chain_count+0x20/0x20 [ 2369.650527] ? mark_lock+0xf5/0x2df0 [ 2369.651000] ? mark_lock+0xf5/0x2df0 [ 2369.651456] ? lock_chain_count+0x20/0x20 [ 2369.651961] ? __lock_acquire+0xbb1/0x5b00 [ 2369.652479] ? lock_chain_count+0x20/0x20 [ 2369.652985] ? lock_chain_count+0x20/0x20 [ 2369.653498] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.654135] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.654653] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2369.655165] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.655792] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.656291] ? mark_lock+0xf5/0x2df0 [ 2369.656756] ? lock_acquire+0x197/0x470 [ 2369.657239] ? find_held_lock+0x2c/0x110 [ 2369.657746] ? __might_fault+0xd3/0x180 [ 2369.658232] ? lock_downgrade+0x6d0/0x6d0 [ 2369.658752] ? lock_downgrade+0x6d0/0x6d0 [ 2369.659259] ? sock_has_perm+0x1ea/0x280 [ 2369.659754] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2369.660386] ? _copy_from_user+0xfb/0x1b0 [ 2369.660902] ? __import_iovec+0x458/0x590 [ 2369.661408] ? udp_v6_push_pending_frames+0x360/0x360 [ 2369.662040] inet6_sendmsg+0x105/0x140 [ 2369.662524] ? inet6_compat_ioctl+0x320/0x320 [ 2369.671192] __sock_sendmsg+0xf2/0x190 [ 2369.671672] ____sys_sendmsg+0x70d/0x870 [ 2369.672170] ? sock_write_iter+0x3d0/0x3d0 [ 2369.672690] ? do_recvmmsg+0x6d0/0x6d0 [ 2369.673168] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.673661] ? lock_downgrade+0x6d0/0x6d0 [ 2369.674168] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2369.674812] ? SOFTIRQ_verbose+0x10/0x10 [ 2369.675309] ___sys_sendmsg+0xf3/0x170 [ 2369.675787] ? sendmsg_copy_msghdr+0x160/0x160 [ 2369.676349] ? __fget_files+0x2cf/0x520 [ 2369.676839] ? lock_downgrade+0x6d0/0x6d0 [ 2369.677346] ? find_held_lock+0x2c/0x110 [ 2369.677849] ? __fget_files+0x2f8/0x520 [ 2369.678342] ? __fget_light+0xea/0x290 [ 2369.678834] __sys_sendmsg+0xe5/0x1b0 [ 2369.679299] ? __sys_sendmsg_sock+0x40/0x40 [ 2369.679825] ? rcu_read_lock_any_held+0x75/0xa0 [ 2369.680407] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.681046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.681673] ? trace_hardirqs_on+0x5b/0x180 [ 2369.682201] do_syscall_64+0x33/0x40 [ 2369.688635] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.689368] RIP: 0033:0x7f251a6f7b19 [ 2369.702993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.705389] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2369.706397] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2369.707358] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2369.708299] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.709243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.710190] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:51:36 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 63) 09:51:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:51:36 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 62) 09:51:36 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xa00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0xffe3}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:36 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2385.115897] FAULT_INJECTION: forcing a failure. [ 2385.115897] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.119615] CPU: 1 PID: 11018 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2385.121838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2385.124474] Call Trace: [ 2385.125304] dump_stack+0x107/0x167 [ 2385.126451] should_fail.cold+0x5/0xa [ 2385.127686] should_failslab+0x5/0x20 [ 2385.128903] __kmalloc_node_track_caller+0x74/0x3b0 [ 2385.130510] ? skb_segment+0x9d8/0x3aa0 [ 2385.131807] __alloc_skb+0xb1/0x5b0 [ 2385.132982] skb_segment+0x9d8/0x3aa0 [ 2385.134205] ? __lock_acquire+0xbb1/0x5b00 [ 2385.135586] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2385.137029] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.138531] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.139808] __udp_gso_segment+0x11c6/0x1830 [ 2385.140772] FAULT_INJECTION: forcing a failure. [ 2385.140772] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.141146] ? __sk_receive_skb+0x830/0x830 [ 2385.144341] udp4_ufo_fragment+0x528/0x720 [ 2385.145584] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2385.147019] inet_gso_segment+0x4fb/0x11a0 [ 2385.148255] skb_mac_gso_segment+0x273/0x570 [ 2385.149532] ? inet_sock_destruct+0x840/0x840 [ 2385.150826] ? skb_network_protocol+0x650/0x650 [ 2385.152172] ? skb_crc32c_csum_help+0x80/0x80 [ 2385.153461] ? lock_acquire+0x197/0x470 [ 2385.154618] ? __dev_queue_xmit+0x1c6/0x2690 [ 2385.155900] __skb_gso_segment+0x32d/0x6d0 [ 2385.157114] ? mark_lock+0xf5/0x2df0 [ 2385.158188] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2385.159726] ? lock_chain_count+0x20/0x20 [ 2385.160914] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2385.162222] __dev_queue_xmit+0x825/0x2690 [ 2385.163462] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2385.164954] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2385.166269] ? mark_held_locks+0x9e/0xe0 [ 2385.167471] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2385.168982] neigh_connected_output+0x382/0x4d0 [ 2385.170327] ip_finish_output2+0x6f1/0x21f0 [ 2385.171634] ? nf_hook_slow+0xfc/0x1e0 [ 2385.172752] ? ip_frag_next+0x9e0/0x9e0 [ 2385.173891] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2385.175337] __ip_finish_output.part.0+0x5f3/0xb50 [ 2385.176762] ? ip_fragment.constprop.0+0x240/0x240 [ 2385.178160] ? netif_rx_ni+0xe7/0x300 [ 2385.179276] ip_mc_output+0x401/0xa30 [ 2385.180376] ip_send_skb+0xdd/0x260 [ 2385.181427] udp_send_skb+0x6da/0x11d0 [ 2385.182570] udp_sendmsg+0x139a/0x2160 [ 2385.183703] ? mark_lock+0xf5/0x2df0 [ 2385.184772] ? ip_frag_init+0x350/0x350 [ 2385.185910] ? lock_chain_count+0x20/0x20 [ 2385.187102] ? udp_setsockopt+0xc0/0xc0 [ 2385.188255] ? mark_lock+0xf5/0x2df0 [ 2385.189319] ? __lock_acquire+0x1657/0x5b00 [ 2385.190576] ? lock_chain_count+0x20/0x20 [ 2385.191777] ? mark_lock+0xf5/0x2df0 [ 2385.192846] ? mark_lock+0xf5/0x2df0 [ 2385.193912] ? lock_chain_count+0x20/0x20 [ 2385.195095] ? __lock_acquire+0xbb1/0x5b00 [ 2385.196325] ? lock_chain_count+0x20/0x20 [ 2385.197535] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.199038] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.200224] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2385.201403] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.202896] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.204078] ? mark_lock+0xf5/0x2df0 [ 2385.205151] ? lock_acquire+0x197/0x470 [ 2385.206287] ? find_held_lock+0x2c/0x110 [ 2385.207474] ? __might_fault+0xd3/0x180 [ 2385.208650] ? lock_downgrade+0x6d0/0x6d0 [ 2385.209859] ? lock_downgrade+0x6d0/0x6d0 [ 2385.211058] ? sock_has_perm+0x1ea/0x280 [ 2385.212224] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2385.213723] ? _copy_from_user+0xfb/0x1b0 [ 2385.214908] ? __import_iovec+0x458/0x590 [ 2385.216103] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.217585] inet6_sendmsg+0x105/0x140 [ 2385.218705] ? inet6_compat_ioctl+0x320/0x320 [ 2385.219989] __sock_sendmsg+0xf2/0x190 [ 2385.221106] ____sys_sendmsg+0x70d/0x870 [ 2385.222262] ? sock_write_iter+0x3d0/0x3d0 [ 2385.223491] ? do_recvmmsg+0x6d0/0x6d0 [ 2385.224611] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.225771] ? lock_downgrade+0x6d0/0x6d0 [ 2385.226948] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.228454] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.229627] ___sys_sendmsg+0xf3/0x170 [ 2385.230743] ? sendmsg_copy_msghdr+0x160/0x160 [ 2385.232063] ? __fget_files+0x2cf/0x520 [ 2385.233204] ? lock_downgrade+0x6d0/0x6d0 [ 2385.234382] ? find_held_lock+0x2c/0x110 [ 2385.235590] ? __fget_files+0x2f8/0x520 [ 2385.236098] ? __fget_light+0xea/0x290 [ 2385.236606] __sys_sendmsg+0xe5/0x1b0 [ 2385.237102] ? __sys_sendmsg_sock+0x40/0x40 [ 2385.237654] ? rcu_read_lock_any_held+0x75/0xa0 [ 2385.238272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2385.238964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2385.239659] ? trace_hardirqs_on+0x5b/0x180 [ 2385.240233] do_syscall_64+0x33/0x40 [ 2385.240737] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2385.241544] RIP: 0033:0x7f3f9ec55b19 [ 2385.242029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2385.244559] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2385.245627] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2385.246584] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2385.247575] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2385.248561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2385.249533] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2385.250574] CPU: 0 PID: 11017 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2385.251532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2385.252618] Call Trace: [ 2385.252964] dump_stack+0x107/0x167 [ 2385.253438] should_fail.cold+0x5/0xa [ 2385.253944] ? trace_hardirqs_on+0x5b/0x180 [ 2385.254511] ? __alloc_skb+0x6d/0x5b0 [ 2385.255007] should_failslab+0x5/0x20 [ 2385.255541] kmem_cache_alloc_node+0x55/0x330 [ 2385.256148] __alloc_skb+0x6d/0x5b0 [ 2385.256643] skb_segment+0x9d8/0x3aa0 [ 2385.257165] ? __lock_acquire+0xbb1/0x5b00 [ 2385.257747] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2385.258397] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.259075] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.259647] __udp_gso_segment+0x11c6/0x1830 [ 2385.260218] ? __sk_receive_skb+0x830/0x830 [ 2385.260814] udp4_ufo_fragment+0x528/0x720 [ 2385.261392] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2385.262067] inet_gso_segment+0x4fb/0x11a0 [ 2385.262649] skb_mac_gso_segment+0x273/0x570 [ 2385.263245] ? inet_sock_destruct+0x840/0x840 [ 2385.263843] ? skb_network_protocol+0x650/0x650 [ 2385.264443] ? skb_crc32c_csum_help+0x80/0x80 [ 2385.265021] ? lock_acquire+0x197/0x470 [ 2385.265536] ? __dev_queue_xmit+0x1c6/0x2690 [ 2385.266108] __skb_gso_segment+0x32d/0x6d0 [ 2385.266657] ? mark_lock+0xf5/0x2df0 [ 2385.267142] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2385.267863] ? lock_chain_count+0x20/0x20 [ 2385.268401] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2385.268994] __dev_queue_xmit+0x825/0x2690 [ 2385.269548] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2385.270219] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2385.270820] ? mark_held_locks+0x9e/0xe0 [ 2385.271393] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2385.272079] neigh_connected_output+0x382/0x4d0 [ 2385.272692] ip_finish_output2+0x6f1/0x21f0 [ 2385.273257] ? nf_hook_slow+0xfc/0x1e0 [ 2385.273763] ? ip_frag_next+0x9e0/0x9e0 [ 2385.274277] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2385.274931] __ip_finish_output.part.0+0x5f3/0xb50 [ 2385.275609] ? ip_fragment.constprop.0+0x240/0x240 [ 2385.276244] ? netif_rx_ni+0xe7/0x300 [ 2385.276744] ip_mc_output+0x401/0xa30 [ 2385.277241] ip_send_skb+0xdd/0x260 [ 2385.277717] udp_send_skb+0x6da/0x11d0 [ 2385.278230] udp_sendmsg+0x139a/0x2160 [ 2385.278735] ? mark_lock+0xf5/0x2df0 [ 2385.279245] ? ip_frag_init+0x350/0x350 [ 2385.279780] ? lock_chain_count+0x20/0x20 [ 2385.280322] ? udp_setsockopt+0xc0/0xc0 [ 2385.280834] ? mark_lock+0xf5/0x2df0 [ 2385.281317] ? lock_acquire+0x197/0x470 [ 2385.281835] ? lock_chain_count+0x20/0x20 [ 2385.282373] ? mark_lock+0xf5/0x2df0 [ 2385.282858] ? mark_lock+0xf5/0x2df0 [ 2385.283380] ? lock_chain_count+0x20/0x20 [ 2385.283918] ? __lock_acquire+0xbb1/0x5b00 [ 2385.284468] ? lock_chain_count+0x20/0x20 [ 2385.285013] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.285691] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.286223] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2385.286763] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.287466] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.287996] ? mark_lock+0xf5/0x2df0 [ 2385.288485] ? lock_acquire+0x197/0x470 [ 2385.288997] ? find_held_lock+0x2c/0x110 [ 2385.289528] ? __might_fault+0xd3/0x180 [ 2385.290042] ? lock_downgrade+0x6d0/0x6d0 [ 2385.290583] ? lock_downgrade+0x6d0/0x6d0 [ 2385.291121] ? sock_has_perm+0x1ea/0x280 [ 2385.291688] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2385.292359] ? _copy_from_user+0xfb/0x1b0 [ 2385.292905] ? __import_iovec+0x458/0x590 [ 2385.293444] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.294113] inet6_sendmsg+0x105/0x140 [ 2385.294619] ? inet6_compat_ioctl+0x320/0x320 [ 2385.295218] __sock_sendmsg+0xf2/0x190 [ 2385.295743] ____sys_sendmsg+0x70d/0x870 [ 2385.296272] ? sock_write_iter+0x3d0/0x3d0 [ 2385.296819] ? do_recvmmsg+0x6d0/0x6d0 [ 2385.297327] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.297851] ? lock_downgrade+0x6d0/0x6d0 [ 2385.298390] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.299066] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.299645] ___sys_sendmsg+0xf3/0x170 [ 2385.300154] ? sendmsg_copy_msghdr+0x160/0x160 [ 2385.300752] ? __fget_files+0x2cf/0x520 [ 2385.301265] ? lock_downgrade+0x6d0/0x6d0 [ 2385.301803] ? find_held_lock+0x2c/0x110 [ 2385.302337] ? __fget_files+0x2f8/0x520 [ 2385.302859] ? __fget_light+0xea/0x290 [ 2385.303411] __sys_sendmsg+0xe5/0x1b0 [ 2385.303910] ? __sys_sendmsg_sock+0x40/0x40 [ 2385.304500] ? rcu_read_lock_any_held+0x75/0xa0 [ 2385.305145] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2385.305854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2385.306553] ? trace_hardirqs_on+0x5b/0x180 [ 2385.307136] do_syscall_64+0x33/0x40 [ 2385.307661] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2385.308326] RIP: 0033:0x7f251a6f7b19 [ 2385.308810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2385.311193] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2385.312202] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2385.313124] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2385.314045] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2385.314967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2385.315926] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:51:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 64) 09:51:36 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 63) 09:51:36 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:36 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xe00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x20002b80}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2385.489365] FAULT_INJECTION: forcing a failure. [ 2385.489365] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.498904] CPU: 1 PID: 11045 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2385.500726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2385.501937] Call Trace: [ 2385.502337] dump_stack+0x107/0x167 [ 2385.502879] should_fail.cold+0x5/0xa [ 2385.503466] ? create_object.isra.0+0x3a/0xa20 [ 2385.504133] should_failslab+0x5/0x20 [ 2385.504696] kmem_cache_alloc+0x5b/0x310 [ 2385.505289] create_object.isra.0+0x3a/0xa20 [ 2385.505928] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2385.506680] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2385.509057] ? skb_segment+0x9d8/0x3aa0 [ 2385.509647] __alloc_skb+0xb1/0x5b0 [ 2385.510179] skb_segment+0x9d8/0x3aa0 [ 2385.510747] ? __lock_acquire+0xbb1/0x5b00 [ 2385.512941] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2385.513679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.514433] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.515026] __udp_gso_segment+0x11c6/0x1830 [ 2385.515690] ? __sk_receive_skb+0x830/0x830 [ 2385.516321] udp4_ufo_fragment+0x528/0x720 [ 2385.516943] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2385.517668] inet_gso_segment+0x4fb/0x11a0 [ 2385.518297] skb_mac_gso_segment+0x273/0x570 [ 2385.518944] ? inet_sock_destruct+0x840/0x840 [ 2385.519627] ? skb_network_protocol+0x650/0x650 [ 2385.520302] ? skb_crc32c_csum_help+0x80/0x80 [ 2385.520963] ? lock_acquire+0x197/0x470 [ 2385.521555] ? __dev_queue_xmit+0x1c6/0x2690 [ 2385.522196] __skb_gso_segment+0x32d/0x6d0 [ 2385.522803] ? mark_lock+0xf5/0x2df0 [ 2385.532767] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2385.533531] ? lock_chain_count+0x20/0x20 [ 2385.534127] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2385.534807] __dev_queue_xmit+0x825/0x2690 [ 2385.535427] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2385.536151] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2385.536827] ? mark_held_locks+0x9e/0xe0 [ 2385.537435] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2385.538205] neigh_connected_output+0x382/0x4d0 [ 2385.538903] ip_finish_output2+0x6f1/0x21f0 [ 2385.539564] ? nf_hook_slow+0xfc/0x1e0 [ 2385.540125] ? ip_frag_next+0x9e0/0x9e0 [ 2385.540708] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2385.541427] __ip_finish_output.part.0+0x5f3/0xb50 [ 2385.542146] ? ip_fragment.constprop.0+0x240/0x240 [ 2385.542854] ? netif_rx_ni+0xe7/0x300 [ 2385.558394] ip_mc_output+0x401/0xa30 [ 2385.558953] ip_send_skb+0xdd/0x260 [ 2385.559511] udp_send_skb+0x6da/0x11d0 [ 2385.560082] udp_sendmsg+0x139a/0x2160 [ 2385.560647] ? mark_lock+0xf5/0x2df0 [ 2385.561193] ? ip_frag_init+0x350/0x350 [ 2385.561785] ? lock_chain_count+0x20/0x20 [ 2385.562411] ? udp_setsockopt+0xc0/0xc0 [ 2385.563007] ? mark_lock+0xf5/0x2df0 [ 2385.563580] ? lock_acquire+0x197/0x470 [ 2385.564158] ? lock_chain_count+0x20/0x20 [ 2385.564765] ? mark_lock+0xf5/0x2df0 [ 2385.565323] ? mark_lock+0xf5/0x2df0 [ 2385.565873] ? lock_chain_count+0x20/0x20 [ 2385.566502] ? __lock_acquire+0xbb1/0x5b00 [ 2385.567123] ? lock_chain_count+0x20/0x20 [ 2385.567755] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.568511] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.569219] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2385.569902] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.570729] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.571409] ? mark_lock+0xf5/0x2df0 [ 2385.571969] ? lock_acquire+0x197/0x470 [ 2385.572654] ? find_held_lock+0x2c/0x110 [ 2385.573288] ? __might_fault+0xd3/0x180 [ 2385.573861] ? lock_downgrade+0x6d0/0x6d0 [ 2385.574450] ? lock_downgrade+0x6d0/0x6d0 [ 2385.574996] ? sock_has_perm+0x1ea/0x280 [ 2385.575584] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2385.576366] ? _copy_from_user+0xfb/0x1b0 [ 2385.576974] ? __import_iovec+0x458/0x590 [ 2385.577635] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.578437] inet6_sendmsg+0x105/0x140 [ 2385.578995] ? inet6_compat_ioctl+0x320/0x320 [ 2385.579704] __sock_sendmsg+0xf2/0x190 [ 2385.580302] ____sys_sendmsg+0x70d/0x870 [ 2385.580888] ? sock_write_iter+0x3d0/0x3d0 [ 2385.581577] ? do_recvmmsg+0x6d0/0x6d0 [ 2385.583397] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.583968] ? lock_downgrade+0x6d0/0x6d0 [ 2385.584607] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.585385] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.585952] ___sys_sendmsg+0xf3/0x170 [ 2385.586583] ? sendmsg_copy_msghdr+0x160/0x160 [ 2385.587286] ? __fget_files+0x2cf/0x520 [ 2385.587870] ? lock_downgrade+0x6d0/0x6d0 [ 2385.588538] ? find_held_lock+0x2c/0x110 [ 2385.589136] ? __fget_files+0x2f8/0x520 [ 2385.589782] ? __fget_light+0xea/0x290 [ 2385.590408] __sys_sendmsg+0xe5/0x1b0 [ 2385.590956] ? __sys_sendmsg_sock+0x40/0x40 [ 2385.591667] ? rcu_read_lock_any_held+0x75/0xa0 [ 2385.592417] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2385.601817] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2385.602652] ? trace_hardirqs_on+0x5b/0x180 [ 2385.603368] do_syscall_64+0x33/0x40 [ 2385.603910] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2385.604720] RIP: 0033:0x7f251a6f7b19 [ 2385.605350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2385.608147] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2385.609361] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2385.610467] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2385.611589] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2385.612683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2385.613747] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:51:36 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x7ffff000}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2385.731181] FAULT_INJECTION: forcing a failure. [ 2385.731181] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.737843] CPU: 1 PID: 11053 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2385.738970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2385.742490] Call Trace: [ 2385.742883] dump_stack+0x107/0x167 [ 2385.744077] should_fail.cold+0x5/0xa [ 2385.744740] should_failslab+0x5/0x20 [ 2385.745338] __kmalloc_node_track_caller+0x74/0x3b0 [ 2385.746306] ? skb_segment+0x9d8/0x3aa0 [ 2385.751617] __alloc_skb+0xb1/0x5b0 [ 2385.752123] skb_segment+0x9d8/0x3aa0 [ 2385.752730] ? __lock_acquire+0xbb1/0x5b00 [ 2385.753912] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2385.755472] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.757013] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.758278] __udp_gso_segment+0x11c6/0x1830 [ 2385.759638] ? __sk_receive_skb+0x830/0x830 [ 2385.761039] udp4_ufo_fragment+0x528/0x720 [ 2385.762407] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2385.764032] inet_gso_segment+0x4fb/0x11a0 [ 2385.765430] skb_mac_gso_segment+0x273/0x570 [ 2385.766834] ? inet_sock_destruct+0x840/0x840 [ 2385.768298] ? skb_network_protocol+0x650/0x650 [ 2385.769779] ? skb_crc32c_csum_help+0x80/0x80 [ 2385.771199] ? lock_acquire+0x197/0x470 [ 2385.772438] ? __dev_queue_xmit+0x1c6/0x2690 [ 2385.773794] __skb_gso_segment+0x32d/0x6d0 [ 2385.775126] ? mark_lock+0xf5/0x2df0 [ 2385.776303] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2385.777961] ? lock_chain_count+0x20/0x20 [ 2385.779244] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2385.780694] __dev_queue_xmit+0x825/0x2690 [ 2385.782059] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2385.783772] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2385.785259] ? mark_held_locks+0x9e/0xe0 [ 2385.786527] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2385.788212] neigh_connected_output+0x382/0x4d0 [ 2385.789730] ip_finish_output2+0x6f1/0x21f0 [ 2385.791129] ? nf_hook_slow+0xfc/0x1e0 [ 2385.792408] ? ip_frag_next+0x9e0/0x9e0 [ 2385.793668] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2385.795260] __ip_finish_output.part.0+0x5f3/0xb50 [ 2385.796809] ? ip_fragment.constprop.0+0x240/0x240 [ 2385.798377] ? netif_rx_ni+0xe7/0x300 [ 2385.799564] ip_mc_output+0x401/0xa30 [ 2385.800714] ip_send_skb+0xdd/0x260 [ 2385.801811] udp_send_skb+0x6da/0x11d0 [ 2385.802961] udp_sendmsg+0x139a/0x2160 [ 2385.804111] ? mark_lock+0xf5/0x2df0 [ 2385.805236] ? ip_frag_init+0x350/0x350 [ 2385.806417] ? lock_chain_count+0x20/0x20 [ 2385.807680] ? lock_chain_count+0x20/0x20 [ 2385.808943] ? udp_setsockopt+0xc0/0xc0 [ 2385.810266] ? __bad_area_nosemaphore+0xa1/0x310 [ 2385.811756] ? lock_chain_count+0x20/0x20 [ 2385.813041] ? mark_lock+0xf5/0x2df0 [ 2385.814277] ? mark_lock+0xf5/0x2df0 [ 2385.815459] ? lock_chain_count+0x20/0x20 [ 2385.816774] ? lock_chain_count+0x20/0x20 [ 2385.818156] ? mark_lock+0xf5/0x2df0 [ 2385.819332] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2385.820666] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.822330] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.823674] ? mark_lock+0xf5/0x2df0 [ 2385.824895] ? lock_acquire+0x197/0x470 [ 2385.826118] ? find_held_lock+0x2c/0x110 [ 2385.827481] ? __might_fault+0xd3/0x180 [ 2385.828716] ? lock_downgrade+0x6d0/0x6d0 [ 2385.830024] ? lock_downgrade+0x6d0/0x6d0 [ 2385.831400] ? sock_has_perm+0x1ea/0x280 [ 2385.832611] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2385.834119] ? _copy_from_user+0xfb/0x1b0 [ 2385.835411] ? __import_iovec+0x458/0x590 [ 2385.836720] ? udp_v6_push_pending_frames+0x360/0x360 [ 2385.838388] inet6_sendmsg+0x105/0x140 [ 2385.839675] ? inet6_compat_ioctl+0x320/0x320 [ 2385.841059] __sock_sendmsg+0xf2/0x190 [ 2385.842349] ____sys_sendmsg+0x70d/0x870 [ 2385.843634] ? sock_write_iter+0x3d0/0x3d0 [ 2385.845029] ? do_recvmmsg+0x6d0/0x6d0 [ 2385.846273] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.847455] ? lock_downgrade+0x6d0/0x6d0 [ 2385.848648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2385.850288] ? SOFTIRQ_verbose+0x10/0x10 [ 2385.851640] ___sys_sendmsg+0xf3/0x170 [ 2385.852811] ? sendmsg_copy_msghdr+0x160/0x160 [ 2385.854323] ? __fget_files+0x2cf/0x520 [ 2385.855634] ? lock_downgrade+0x6d0/0x6d0 [ 2385.856842] ? find_held_lock+0x2c/0x110 [ 2385.858135] ? __fget_files+0x2f8/0x520 [ 2385.859460] ? __fget_light+0xea/0x290 [ 2385.860667] __sys_sendmsg+0xe5/0x1b0 [ 2385.861875] ? __sys_sendmsg_sock+0x40/0x40 [ 2385.863306] ? rcu_read_lock_any_held+0x75/0xa0 [ 2385.864749] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2385.866415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2385.868133] ? trace_hardirqs_on+0x5b/0x180 [ 2385.869476] do_syscall_64+0x33/0x40 [ 2385.870702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2385.872314] RIP: 0033:0x7f3f9ec55b19 [ 2385.873543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2385.878822] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2385.879805] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2385.880725] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2385.881596] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2385.882509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2385.883424] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:51:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x1c00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 65) [ 2386.002168] FAULT_INJECTION: forcing a failure. [ 2386.002168] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.004941] CPU: 0 PID: 11069 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2386.007022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.009522] Call Trace: [ 2386.010300] dump_stack+0x107/0x167 [ 2386.011394] should_fail.cold+0x5/0xa [ 2386.012526] ? create_object.isra.0+0x3a/0xa20 [ 2386.013893] should_failslab+0x5/0x20 [ 2386.015023] kmem_cache_alloc+0x5b/0x310 [ 2386.016250] create_object.isra.0+0x3a/0xa20 [ 2386.017557] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2386.019068] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2386.020598] ? skb_segment+0x9d8/0x3aa0 [ 2386.021787] __alloc_skb+0xb1/0x5b0 [ 2386.022869] skb_segment+0x9d8/0x3aa0 [ 2386.024015] ? __lock_acquire+0xbb1/0x5b00 [ 2386.025301] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2386.026783] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.028366] ? SOFTIRQ_verbose+0x10/0x10 [ 2386.029583] __udp_gso_segment+0x11c6/0x1830 [ 2386.030889] ? __sk_receive_skb+0x830/0x830 [ 2386.032203] udp4_ufo_fragment+0x528/0x720 [ 2386.033463] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2386.034953] inet_gso_segment+0x4fb/0x11a0 [ 2386.036237] skb_mac_gso_segment+0x273/0x570 [ 2386.037546] ? inet_sock_destruct+0x840/0x840 [ 2386.038876] ? skb_network_protocol+0x650/0x650 [ 2386.040270] ? skb_crc32c_csum_help+0x80/0x80 [ 2386.041603] ? lock_acquire+0x197/0x470 [ 2386.042782] ? __dev_queue_xmit+0x1c6/0x2690 [ 2386.044113] __skb_gso_segment+0x32d/0x6d0 [ 2386.045373] ? mark_lock+0xf5/0x2df0 [ 2386.046482] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2386.048056] ? lock_chain_count+0x20/0x20 [ 2386.049286] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2386.050646] __dev_queue_xmit+0x825/0x2690 [ 2386.051927] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2386.053462] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2386.054825] ? mark_held_locks+0x9e/0xe0 [ 2386.056049] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2386.057620] neigh_connected_output+0x382/0x4d0 [ 2386.059016] ip_finish_output2+0x6f1/0x21f0 [ 2386.060321] ? nf_hook_slow+0xfc/0x1e0 [ 2386.061480] ? ip_frag_next+0x9e0/0x9e0 [ 2386.062661] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2386.064173] __ip_finish_output.part.0+0x5f3/0xb50 [ 2386.065638] ? ip_fragment.constprop.0+0x240/0x240 [ 2386.067095] ? netif_rx_ni+0xe7/0x300 [ 2386.068242] ip_mc_output+0x401/0xa30 [ 2386.069380] ip_send_skb+0xdd/0x260 [ 2386.070465] udp_send_skb+0x6da/0x11d0 [ 2386.071650] udp_sendmsg+0x139a/0x2160 [ 2386.072806] ? mark_lock+0xf5/0x2df0 [ 2386.073914] ? ip_frag_init+0x350/0x350 [ 2386.075093] ? lock_chain_count+0x20/0x20 [ 2386.076343] ? udp_setsockopt+0xc0/0xc0 [ 2386.077523] ? mark_lock+0xf5/0x2df0 [ 2386.078628] ? lock_acquire+0x197/0x470 [ 2386.079846] ? lock_chain_count+0x20/0x20 [ 2386.081077] ? mark_lock+0xf5/0x2df0 [ 2386.082189] ? mark_lock+0xf5/0x2df0 [ 2386.083335] ? lock_chain_count+0x20/0x20 [ 2386.084567] ? __lock_acquire+0xbb1/0x5b00 [ 2386.085824] ? lock_chain_count+0x20/0x20 [ 2386.087057] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.088627] ? SOFTIRQ_verbose+0x10/0x10 [ 2386.089833] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2386.091042] ? udp_v6_push_pending_frames+0x360/0x360 [ 2386.092577] ? SOFTIRQ_verbose+0x10/0x10 [ 2386.093775] ? mark_lock+0xf5/0x2df0 [ 2386.094874] ? lock_acquire+0x197/0x470 [ 2386.096064] ? find_held_lock+0x2c/0x110 [ 2386.097271] ? __might_fault+0xd3/0x180 [ 2386.098446] ? lock_downgrade+0x6d0/0x6d0 [ 2386.099692] ? lock_downgrade+0x6d0/0x6d0 [ 2386.100927] ? sock_has_perm+0x1ea/0x280 [ 2386.102125] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2386.103674] ? _copy_from_user+0xfb/0x1b0 [ 2386.104916] ? __import_iovec+0x458/0x590 [ 2386.106142] ? udp_v6_push_pending_frames+0x360/0x360 [ 2386.107684] inet6_sendmsg+0x105/0x140 [ 2386.108838] ? inet6_compat_ioctl+0x320/0x320 [ 2386.110165] __sock_sendmsg+0xf2/0x190 [ 2386.111327] ____sys_sendmsg+0x70d/0x870 [ 2386.112529] ? sock_write_iter+0x3d0/0x3d0 [ 2386.113782] ? do_recvmmsg+0x6d0/0x6d0 [ 2386.114934] ? SOFTIRQ_verbose+0x10/0x10 [ 2386.116150] ? lock_downgrade+0x6d0/0x6d0 [ 2386.117378] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.118928] ? SOFTIRQ_verbose+0x10/0x10 [ 2386.120148] ___sys_sendmsg+0xf3/0x170 [ 2386.121298] ? sendmsg_copy_msghdr+0x160/0x160 [ 2386.122653] ? __fget_files+0x2cf/0x520 [ 2386.123850] ? lock_downgrade+0x6d0/0x6d0 [ 2386.125079] ? find_held_lock+0x2c/0x110 [ 2386.126287] ? __fget_files+0x2f8/0x520 [ 2386.127486] ? __fget_light+0xea/0x290 [ 2386.128645] __sys_sendmsg+0xe5/0x1b0 [ 2386.129766] ? __sys_sendmsg_sock+0x40/0x40 [ 2386.131041] ? rcu_read_lock_any_held+0x75/0xa0 [ 2386.132455] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.134006] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2386.135544] ? trace_hardirqs_on+0x5b/0x180 [ 2386.136826] do_syscall_64+0x33/0x40 [ 2386.137925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2386.139466] RIP: 0033:0x7f251a6f7b19 [ 2386.140567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.146129] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2386.148406] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2386.150531] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2386.152666] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.154787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.156925] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2401.666262] FAULT_INJECTION: forcing a failure. [ 2401.666262] name failslab, interval 1, probability 0, space 0, times 0 09:51:52 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:52 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:51:52 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:52 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:52 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 64) 09:51:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0xfffffdef}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x2800, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 66) [ 2401.667990] CPU: 0 PID: 11085 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2401.668958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.670082] Call Trace: [ 2401.670437] dump_stack+0x107/0x167 [ 2401.670921] should_fail.cold+0x5/0xa [ 2401.671444] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2401.672180] ? create_object.isra.0+0x3a/0xa20 [ 2401.672813] should_failslab+0x5/0x20 [ 2401.673314] kmem_cache_alloc+0x5b/0x310 [ 2401.673854] ? mark_held_locks+0x9e/0xe0 [ 2401.674392] create_object.isra.0+0x3a/0xa20 [ 2401.675013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2401.675718] kmem_cache_alloc_node+0x169/0x330 [ 2401.676344] __alloc_skb+0x6d/0x5b0 [ 2401.676834] skb_segment+0x9d8/0x3aa0 [ 2401.677337] ? __lock_acquire+0xbb1/0x5b00 [ 2401.677970] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2401.678642] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.679329] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.679933] __udp_gso_segment+0x11c6/0x1830 [ 2401.680563] ? __sk_receive_skb+0x830/0x830 [ 2401.681138] udp4_ufo_fragment+0x528/0x720 [ 2401.681703] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2401.682375] inet_gso_segment+0x4fb/0x11a0 [ 2401.683005] skb_mac_gso_segment+0x273/0x570 [ 2401.683626] ? inet_sock_destruct+0x840/0x840 [ 2401.684234] ? skb_network_protocol+0x650/0x650 [ 2401.684860] ? skb_crc32c_csum_help+0x80/0x80 [ 2401.685459] ? lock_acquire+0x197/0x470 [ 2401.686045] ? __dev_queue_xmit+0x1c6/0x2690 [ 2401.686663] __skb_gso_segment+0x32d/0x6d0 [ 2401.687220] ? mark_lock+0xf5/0x2df0 [ 2401.687718] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2401.688426] ? lock_chain_count+0x20/0x20 [ 2401.689013] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2401.689653] __dev_queue_xmit+0x825/0x2690 [ 2401.690214] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2401.690946] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2401.691605] ? mark_held_locks+0x9e/0xe0 [ 2401.692690] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2401.694044] neigh_connected_output+0x382/0x4d0 [ 2401.695269] ip_finish_output2+0x6f1/0x21f0 [ 2401.696483] ? nf_hook_slow+0xfc/0x1e0 [ 2401.697547] ? ip_frag_next+0x9e0/0x9e0 [ 2401.698599] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2401.700009] __ip_finish_output.part.0+0x5f3/0xb50 [ 2401.701287] ? ip_fragment.constprop.0+0x240/0x240 [ 2401.702566] ? netif_rx_ni+0xe7/0x300 [ 2401.703537] ip_mc_output+0x401/0xa30 [ 2401.704662] ip_send_skb+0xdd/0x260 [ 2401.705637] udp_send_skb+0x6da/0x11d0 [ 2401.706624] udp_sendmsg+0x139a/0x2160 [ 2401.707621] ? ip_frag_init+0x350/0x350 [ 2401.708861] ? lock_chain_count+0x20/0x20 [ 2401.709904] ? udp_setsockopt+0xc0/0xc0 [ 2401.710954] ? __bad_area_nosemaphore+0xa1/0x310 [ 2401.712285] ? mark_lock+0xf5/0x2df0 [ 2401.713237] ? mark_lock+0xf5/0x2df0 [ 2401.714231] ? lock_chain_count+0x20/0x20 [ 2401.714945] FAULT_INJECTION: forcing a failure. [ 2401.714945] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.715309] ? lock_chain_count+0x20/0x20 [ 2401.718039] ? mark_lock+0xf5/0x2df0 [ 2401.719015] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2401.720195] ? udp_v6_push_pending_frames+0x360/0x360 [ 2401.721504] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.722556] ? mark_lock+0xf5/0x2df0 [ 2401.723495] ? lock_acquire+0x197/0x470 [ 2401.724734] ? find_held_lock+0x2c/0x110 [ 2401.725765] ? __might_fault+0xd3/0x180 [ 2401.726812] ? lock_downgrade+0x6d0/0x6d0 [ 2401.727923] ? lock_downgrade+0x6d0/0x6d0 [ 2401.728972] ? sock_has_perm+0x1ea/0x280 [ 2401.729992] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2401.731311] ? _copy_from_user+0xfb/0x1b0 [ 2401.732133] ? __import_iovec+0x458/0x590 [ 2401.732687] ? udp_v6_push_pending_frames+0x360/0x360 [ 2401.733368] inet6_sendmsg+0x105/0x140 [ 2401.733927] ? inet6_compat_ioctl+0x320/0x320 [ 2401.734525] __sock_sendmsg+0xf2/0x190 [ 2401.735067] ____sys_sendmsg+0x70d/0x870 [ 2401.735613] ? sock_write_iter+0x3d0/0x3d0 [ 2401.736668] ? do_recvmmsg+0x6d0/0x6d0 [ 2401.737651] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.738717] ? lock_downgrade+0x6d0/0x6d0 [ 2401.739776] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.741401] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.742438] ___sys_sendmsg+0xf3/0x170 [ 2401.743425] ? sendmsg_copy_msghdr+0x160/0x160 [ 2401.744249] ? __fget_files+0x2cf/0x520 [ 2401.744818] ? lock_downgrade+0x6d0/0x6d0 [ 2401.745362] ? find_held_lock+0x2c/0x110 [ 2401.745913] ? __fget_files+0x2f8/0x520 [ 2401.746443] ? __fget_light+0xea/0x290 [ 2401.746973] __sys_sendmsg+0xe5/0x1b0 [ 2401.747477] ? __sys_sendmsg_sock+0x40/0x40 [ 2401.748105] ? rcu_read_lock_any_held+0x75/0xa0 [ 2401.748748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.749445] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.750133] ? trace_hardirqs_on+0x5b/0x180 [ 2401.750715] do_syscall_64+0x33/0x40 [ 2401.751219] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.752164] RIP: 0033:0x7f251a6f7b19 [ 2401.753102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.758348] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2401.760388] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2401.762202] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2401.764143] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.765967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.767828] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2401.768798] CPU: 1 PID: 11094 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2401.769681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.770739] Call Trace: [ 2401.771066] dump_stack+0x107/0x167 [ 2401.771513] should_fail.cold+0x5/0xa [ 2401.772043] ? create_object.isra.0+0x3a/0xa20 [ 2401.772723] should_failslab+0x5/0x20 [ 2401.773292] kmem_cache_alloc+0x5b/0x310 [ 2401.773953] create_object.isra.0+0x3a/0xa20 [ 2401.774616] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2401.775384] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2401.776141] ? skb_segment+0x9d8/0x3aa0 [ 2401.776739] __alloc_skb+0xb1/0x5b0 [ 2401.777305] skb_segment+0x9d8/0x3aa0 [ 2401.777902] ? __lock_acquire+0xbb1/0x5b00 [ 2401.778547] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2401.779271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.780058] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.780657] __udp_gso_segment+0x11c6/0x1830 [ 2401.781293] ? __sk_receive_skb+0x830/0x830 [ 2401.781913] udp4_ufo_fragment+0x528/0x720 [ 2401.782519] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2401.783241] inet_gso_segment+0x4fb/0x11a0 [ 2401.783909] skb_mac_gso_segment+0x273/0x570 [ 2401.784524] ? inet_sock_destruct+0x840/0x840 [ 2401.785171] ? skb_network_protocol+0x650/0x650 [ 2401.785863] ? skb_crc32c_csum_help+0x80/0x80 [ 2401.786520] ? lock_acquire+0x197/0x470 [ 2401.787116] ? __dev_queue_xmit+0x1c6/0x2690 [ 2401.790860] __skb_gso_segment+0x32d/0x6d0 [ 2401.791397] ? mark_lock+0xf5/0x2df0 [ 2401.792009] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2401.792758] ? lock_chain_count+0x20/0x20 [ 2401.793350] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2401.794044] __dev_queue_xmit+0x825/0x2690 [ 2401.794661] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2401.795408] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2401.796203] ? mark_held_locks+0x9e/0xe0 [ 2401.796810] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2401.797585] neigh_connected_output+0x382/0x4d0 [ 2401.798282] ip_finish_output2+0x6f1/0x21f0 [ 2401.798899] ? nf_hook_slow+0xfc/0x1e0 [ 2401.799451] ? ip_frag_next+0x9e0/0x9e0 [ 2401.800219] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2401.800948] __ip_finish_output.part.0+0x5f3/0xb50 [ 2401.801663] ? ip_fragment.constprop.0+0x240/0x240 [ 2401.802384] ? netif_rx_ni+0xe7/0x300 [ 2401.802937] ip_mc_output+0x401/0xa30 [ 2401.803487] ip_send_skb+0xdd/0x260 [ 2401.804012] udp_send_skb+0x6da/0x11d0 [ 2401.804581] udp_sendmsg+0x139a/0x2160 [ 2401.805129] ? mark_lock+0xf5/0x2df0 [ 2401.805667] ? ip_frag_init+0x350/0x350 [ 2401.806283] ? lock_chain_count+0x20/0x20 [ 2401.806900] ? udp_setsockopt+0xc0/0xc0 [ 2401.807457] ? mark_lock+0xf5/0x2df0 [ 2401.807989] ? lock_acquire+0x197/0x470 [ 2401.808557] ? lock_chain_count+0x20/0x20 [ 2401.809190] ? mark_lock+0xf5/0x2df0 [ 2401.809731] ? mark_lock+0xf5/0x2df0 [ 2401.810272] ? lock_chain_count+0x20/0x20 [ 2401.810858] ? __lock_acquire+0xbb1/0x5b00 [ 2401.811457] ? lock_chain_count+0x20/0x20 [ 2401.814063] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.814819] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.815399] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2401.816020] ? udp_v6_push_pending_frames+0x360/0x360 [ 2401.816648] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.817176] ? mark_lock+0xf5/0x2df0 [ 2401.817632] ? lock_acquire+0x197/0x470 [ 2401.818113] ? find_held_lock+0x2c/0x110 [ 2401.818611] ? __might_fault+0xd3/0x180 [ 2401.819136] ? lock_downgrade+0x6d0/0x6d0 [ 2401.819646] ? lock_downgrade+0x6d0/0x6d0 [ 2401.826057] ? sock_has_perm+0x1ea/0x280 [ 2401.826642] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2401.827395] ? _copy_from_user+0xfb/0x1b0 [ 2401.827992] ? __import_iovec+0x458/0x590 [ 2401.828578] ? udp_v6_push_pending_frames+0x360/0x360 [ 2401.829358] inet6_sendmsg+0x105/0x140 [ 2401.829939] ? inet6_compat_ioctl+0x320/0x320 [ 2401.830566] __sock_sendmsg+0xf2/0x190 [ 2401.831113] ____sys_sendmsg+0x70d/0x870 [ 2401.831688] ? sock_write_iter+0x3d0/0x3d0 [ 2401.834397] ? do_recvmmsg+0x6d0/0x6d0 [ 2401.834954] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.835527] ? lock_downgrade+0x6d0/0x6d0 [ 2401.836173] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.836948] ? SOFTIRQ_verbose+0x10/0x10 [ 2401.837531] ___sys_sendmsg+0xf3/0x170 [ 2401.838087] ? sendmsg_copy_msghdr+0x160/0x160 [ 2401.838742] ? __fget_files+0x2cf/0x520 [ 2401.839355] ? lock_downgrade+0x6d0/0x6d0 [ 2401.843462] ? find_held_lock+0x2c/0x110 [ 2401.844027] ? __fget_files+0x2f8/0x520 [ 2401.844518] ? __fget_light+0xea/0x290 [ 2401.845044] __sys_sendmsg+0xe5/0x1b0 [ 2401.845511] ? __sys_sendmsg_sock+0x40/0x40 [ 2401.846066] ? rcu_read_lock_any_held+0x75/0xa0 [ 2401.846645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.847281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.849243] ? trace_hardirqs_on+0x5b/0x180 [ 2401.849858] do_syscall_64+0x33/0x40 [ 2401.850384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.851147] RIP: 0033:0x7f3f9ec55b19 [ 2401.851676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.854275] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2401.855404] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2401.868368] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2401.869269] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.870178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.871076] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:51:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x2}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:51:53 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:51:53 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:51:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 67) 09:51:53 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 65) 09:51:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3600, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:51:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2402.066695] FAULT_INJECTION: forcing a failure. [ 2402.066695] name failslab, interval 1, probability 0, space 0, times 0 [ 2402.068245] CPU: 0 PID: 11111 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2402.069180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2402.070358] Call Trace: [ 2402.070721] dump_stack+0x107/0x167 [ 2402.071207] should_fail.cold+0x5/0xa [ 2402.071633] FAULT_INJECTION: forcing a failure. [ 2402.071633] name failslab, interval 1, probability 0, space 0, times 0 [ 2402.071718] ? trace_hardirqs_on+0x5b/0x180 [ 2402.071737] ? __alloc_skb+0x6d/0x5b0 [ 2402.074354] should_failslab+0x5/0x20 [ 2402.074865] kmem_cache_alloc_node+0x55/0x330 [ 2402.075510] __alloc_skb+0x6d/0x5b0 [ 2402.076033] skb_segment+0x9d8/0x3aa0 [ 2402.076576] ? __lock_acquire+0xbb1/0x5b00 [ 2402.077162] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2402.077872] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.078600] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.079139] __udp_gso_segment+0x11c6/0x1830 [ 2402.079727] ? __sk_receive_skb+0x830/0x830 [ 2402.080342] udp4_ufo_fragment+0x528/0x720 [ 2402.080943] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2402.081632] inet_gso_segment+0x4fb/0x11a0 [ 2402.082199] skb_mac_gso_segment+0x273/0x570 [ 2402.082796] ? inet_sock_destruct+0x840/0x840 [ 2402.083418] ? skb_network_protocol+0x650/0x650 [ 2402.084054] ? skb_crc32c_csum_help+0x80/0x80 [ 2402.084714] ? lock_acquire+0x197/0x470 [ 2402.085237] ? __dev_queue_xmit+0x1c6/0x2690 [ 2402.085879] __skb_gso_segment+0x32d/0x6d0 [ 2402.086470] ? mark_lock+0xf5/0x2df0 [ 2402.086969] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2402.087714] ? lock_chain_count+0x20/0x20 [ 2402.088305] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2402.088920] __dev_queue_xmit+0x825/0x2690 [ 2402.089485] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2402.090166] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2402.090832] ? mark_held_locks+0x9e/0xe0 [ 2402.091403] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2402.092123] neigh_connected_output+0x382/0x4d0 [ 2402.092758] ip_finish_output2+0x6f1/0x21f0 [ 2402.093338] ? nf_hook_slow+0xfc/0x1e0 [ 2402.093894] ? ip_frag_next+0x9e0/0x9e0 [ 2402.094451] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2402.095121] __ip_finish_output.part.0+0x5f3/0xb50 [ 2402.095788] ? ip_fragment.constprop.0+0x240/0x240 [ 2402.096487] ? netif_rx_ni+0xe7/0x300 [ 2402.097007] ip_mc_output+0x401/0xa30 [ 2402.097551] ip_send_skb+0xdd/0x260 [ 2402.098035] udp_send_skb+0x6da/0x11d0 [ 2402.098567] udp_sendmsg+0x139a/0x2160 [ 2402.099077] ? mark_lock+0xf5/0x2df0 [ 2402.099586] ? ip_frag_init+0x350/0x350 [ 2402.100133] ? lock_chain_count+0x20/0x20 [ 2402.100692] ? udp_setsockopt+0xc0/0xc0 [ 2402.101221] ? mark_lock+0xf5/0x2df0 [ 2402.101765] ? lock_acquire+0x197/0x470 [ 2402.102316] ? lock_chain_count+0x20/0x20 [ 2402.102878] ? mark_lock+0xf5/0x2df0 [ 2402.103371] ? mark_lock+0xf5/0x2df0 [ 2402.103926] ? lock_chain_count+0x20/0x20 [ 2402.104519] ? __lock_acquire+0xbb1/0x5b00 [ 2402.105088] ? lock_chain_count+0x20/0x20 [ 2402.105681] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.106370] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.106924] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2402.107522] ? udp_v6_push_pending_frames+0x360/0x360 [ 2402.108229] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.108811] ? mark_lock+0xf5/0x2df0 [ 2402.109312] ? lock_acquire+0x197/0x470 [ 2402.109843] ? find_held_lock+0x2c/0x110 [ 2402.110406] ? __might_fault+0xd3/0x180 [ 2402.110964] ? lock_downgrade+0x6d0/0x6d0 [ 2402.111550] ? lock_downgrade+0x6d0/0x6d0 [ 2402.112116] ? sock_has_perm+0x1ea/0x280 [ 2402.112706] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2402.113395] ? _copy_from_user+0xfb/0x1b0 [ 2402.113959] ? __import_iovec+0x458/0x590 [ 2402.114511] ? udp_v6_push_pending_frames+0x360/0x360 [ 2402.115195] inet6_sendmsg+0x105/0x140 [ 2402.115723] ? inet6_compat_ioctl+0x320/0x320 [ 2402.116328] __sock_sendmsg+0xf2/0x190 [ 2402.116852] ____sys_sendmsg+0x70d/0x870 [ 2402.117409] ? sock_write_iter+0x3d0/0x3d0 [ 2402.118000] ? do_recvmmsg+0x6d0/0x6d0 [ 2402.118555] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.119088] ? lock_downgrade+0x6d0/0x6d0 [ 2402.119645] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.120349] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.120936] ___sys_sendmsg+0xf3/0x170 [ 2402.121488] ? sendmsg_copy_msghdr+0x160/0x160 [ 2402.122097] ? __fget_files+0x2cf/0x520 [ 2402.122629] ? lock_downgrade+0x6d0/0x6d0 [ 2402.123176] ? find_held_lock+0x2c/0x110 [ 2402.123781] ? __fget_files+0x2f8/0x520 [ 2402.124346] ? __fget_light+0xea/0x290 [ 2402.124884] __sys_sendmsg+0xe5/0x1b0 [ 2402.125399] ? __sys_sendmsg_sock+0x40/0x40 [ 2402.126009] ? rcu_read_lock_any_held+0x75/0xa0 [ 2402.126677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2402.127376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2402.128116] ? trace_hardirqs_on+0x5b/0x180 [ 2402.128726] do_syscall_64+0x33/0x40 [ 2402.129217] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2402.129901] RIP: 0033:0x7f3f9ec55b19 [ 2402.130406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2402.134486] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2402.135667] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2402.136764] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2402.137850] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2402.138985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.140106] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2402.141341] CPU: 1 PID: 11114 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2402.143733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2402.146364] Call Trace: [ 2402.147217] dump_stack+0x107/0x167 [ 2402.148667] should_fail.cold+0x5/0xa [ 2402.149769] should_failslab+0x5/0x20 [ 2402.150909] __kmalloc_node_track_caller+0x74/0x3b0 [ 2402.152374] ? skb_segment+0x9d8/0x3aa0 [ 2402.153524] __alloc_skb+0xb1/0x5b0 [ 2402.154615] skb_segment+0x9d8/0x3aa0 [ 2402.155710] ? __lock_acquire+0xbb1/0x5b00 [ 2402.156967] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2402.158481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.160001] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.161223] __udp_gso_segment+0x11c6/0x1830 [ 2402.162489] ? __sk_receive_skb+0x830/0x830 09:51:53 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2402.163737] udp4_ufo_fragment+0x528/0x720 [ 2402.169234] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2402.170750] inet_gso_segment+0x4fb/0x11a0 [ 2402.172015] skb_mac_gso_segment+0x273/0x570 [ 2402.173282] ? inet_sock_destruct+0x840/0x840 [ 2402.174650] ? skb_network_protocol+0x650/0x650 [ 2402.176019] ? skb_crc32c_csum_help+0x80/0x80 [ 2402.177364] ? lock_acquire+0x197/0x470 [ 2402.178529] ? __dev_queue_xmit+0x1c6/0x2690 [ 2402.179869] __skb_gso_segment+0x32d/0x6d0 [ 2402.181120] ? mark_lock+0xf5/0x2df0 [ 2402.182188] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2402.183739] ? lock_chain_count+0x20/0x20 [ 2402.185000] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2402.186314] __dev_queue_xmit+0x825/0x2690 [ 2402.187614] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2402.188388] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2402.188952] ? mark_held_locks+0x9e/0xe0 [ 2402.189451] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2402.190140] neigh_connected_output+0x382/0x4d0 [ 2402.190754] ip_finish_output2+0x6f1/0x21f0 [ 2402.191281] ? nf_hook_slow+0xfc/0x1e0 [ 2402.191756] ? ip_frag_next+0x9e0/0x9e0 [ 2402.192279] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2402.192894] __ip_finish_output.part.0+0x5f3/0xb50 [ 2402.193503] ? ip_fragment.constprop.0+0x240/0x240 [ 2402.194139] ? netif_rx_ni+0xe7/0x300 [ 2402.194635] ip_mc_output+0x401/0xa30 [ 2402.195111] ip_send_skb+0xdd/0x260 [ 2402.195585] udp_send_skb+0x6da/0x11d0 [ 2402.196148] udp_sendmsg+0x139a/0x2160 [ 2402.196663] ? mark_lock+0xf5/0x2df0 [ 2402.197116] ? ip_frag_init+0x350/0x350 [ 2402.197599] ? lock_chain_count+0x20/0x20 [ 2402.198106] ? udp_setsockopt+0xc0/0xc0 [ 2402.198603] ? mark_lock+0xf5/0x2df0 [ 2402.199074] ? lock_acquire+0x197/0x470 [ 2402.199591] ? lock_chain_count+0x20/0x20 [ 2402.200132] ? mark_lock+0xf5/0x2df0 [ 2402.200596] ? mark_lock+0xf5/0x2df0 [ 2402.201045] ? lock_chain_count+0x20/0x20 [ 2402.201550] ? __lock_acquire+0xbb1/0x5b00 [ 2402.202075] ? lock_chain_count+0x20/0x20 [ 2402.202621] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.203251] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.203753] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2402.204311] ? udp_v6_push_pending_frames+0x360/0x360 [ 2402.204983] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.205500] ? mark_lock+0xf5/0x2df0 [ 2402.205969] ? lock_acquire+0x197/0x470 [ 2402.206448] ? find_held_lock+0x2c/0x110 [ 2402.206950] ? __might_fault+0xd3/0x180 [ 2402.207430] ? lock_downgrade+0x6d0/0x6d0 [ 2402.208015] ? lock_downgrade+0x6d0/0x6d0 [ 2402.208547] ? sock_has_perm+0x1ea/0x280 [ 2402.209050] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2402.209681] ? _copy_from_user+0xfb/0x1b0 [ 2402.210194] ? __import_iovec+0x458/0x590 [ 2402.210744] ? udp_v6_push_pending_frames+0x360/0x360 [ 2402.211377] inet6_sendmsg+0x105/0x140 [ 2402.211913] ? inet6_compat_ioctl+0x320/0x320 [ 2402.212459] __sock_sendmsg+0xf2/0x190 [ 2402.212931] ____sys_sendmsg+0x70d/0x870 [ 2402.213428] ? sock_write_iter+0x3d0/0x3d0 [ 2402.213986] ? do_recvmmsg+0x6d0/0x6d0 [ 2402.214473] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.214983] ? lock_downgrade+0x6d0/0x6d0 [ 2402.215488] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2402.216148] ? SOFTIRQ_verbose+0x10/0x10 [ 2402.216684] ___sys_sendmsg+0xf3/0x170 [ 2402.217172] ? sendmsg_copy_msghdr+0x160/0x160 [ 2402.217780] ? __fget_files+0x2cf/0x520 [ 2402.218283] ? lock_downgrade+0x6d0/0x6d0 [ 2402.218811] ? find_held_lock+0x2c/0x110 [ 2402.219337] ? __fget_files+0x2f8/0x520 [ 2402.219920] ? __fget_light+0xea/0x290 [ 2402.220402] __sys_sendmsg+0xe5/0x1b0 [ 2402.220894] ? __sys_sendmsg_sock+0x40/0x40 [ 2402.221416] ? rcu_read_lock_any_held+0x75/0xa0 [ 2402.221992] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2402.222656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2402.223299] ? trace_hardirqs_on+0x5b/0x180 [ 2402.223891] do_syscall_64+0x33/0x40 [ 2402.224346] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2402.224971] RIP: 0033:0x7f251a6f7b19 [ 2402.225423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2402.227719] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2402.228715] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2402.229619] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2402.230478] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2402.231336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2402.232215] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:52:09 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:09 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3f00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:09 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x4}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:09 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 66) 09:52:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 68) 09:52:09 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) [ 2418.012025] FAULT_INJECTION: forcing a failure. [ 2418.012025] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.013554] CPU: 1 PID: 11146 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2418.014407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2418.015473] Call Trace: [ 2418.015819] dump_stack+0x107/0x167 [ 2418.016325] should_fail.cold+0x5/0xa [ 2418.016825] ? create_object.isra.0+0x3a/0xa20 [ 2418.017426] should_failslab+0x5/0x20 [ 2418.017878] kmem_cache_alloc+0x5b/0x310 [ 2418.018408] create_object.isra.0+0x3a/0xa20 [ 2418.018929] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2418.019579] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2418.020173] ? skb_segment+0x9d8/0x3aa0 [ 2418.020739] __alloc_skb+0xb1/0x5b0 [ 2418.029922] skb_segment+0x9d8/0x3aa0 [ 2418.030426] ? __lock_acquire+0xbb1/0x5b00 [ 2418.030956] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2418.031619] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.032313] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.032814] __udp_gso_segment+0x11c6/0x1830 [ 2418.033379] ? __sk_receive_skb+0x830/0x830 [ 2418.033937] udp4_ufo_fragment+0x528/0x720 [ 2418.034492] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2418.035104] inet_gso_segment+0x4fb/0x11a0 [ 2418.035681] skb_mac_gso_segment+0x273/0x570 [ 2418.036303] ? inet_sock_destruct+0x840/0x840 [ 2418.036865] ? skb_network_protocol+0x650/0x650 [ 2418.037456] ? skb_crc32c_csum_help+0x80/0x80 [ 2418.037983] ? lock_acquire+0x197/0x470 [ 2418.038498] ? __dev_queue_xmit+0x1c6/0x2690 [ 2418.039059] __skb_gso_segment+0x32d/0x6d0 [ 2418.039628] ? mark_lock+0xf5/0x2df0 [ 2418.040091] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2418.040780] ? lock_chain_count+0x20/0x20 [ 2418.041326] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2418.041893] __dev_queue_xmit+0x825/0x2690 [ 2418.042445] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2418.043090] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2418.043716] ? mark_held_locks+0x9e/0xe0 [ 2418.044206] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2418.044920] neigh_connected_output+0x382/0x4d0 [ 2418.045533] ip_finish_output2+0x6f1/0x21f0 [ 2418.046087] ? nf_hook_slow+0xfc/0x1e0 [ 2418.046598] ? ip_frag_next+0x9e0/0x9e0 [ 2418.047093] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2418.047759] __ip_finish_output.part.0+0x5f3/0xb50 [ 2418.048453] ? ip_fragment.constprop.0+0x240/0x240 [ 2418.049053] ? netif_rx_ni+0xe7/0x300 [ 2418.049557] ip_mc_output+0x401/0xa30 [ 2418.050054] ip_send_skb+0xdd/0x260 [ 2418.050574] udp_send_skb+0x6da/0x11d0 [ 2418.051068] udp_sendmsg+0x139a/0x2160 [ 2418.052571] ? mark_lock+0xf5/0x2df0 [ 2418.053039] ? ip_frag_init+0x350/0x350 [ 2418.053559] ? lock_chain_count+0x20/0x20 [ 2418.054055] ? udp_setsockopt+0xc0/0xc0 [ 2418.054594] ? mark_lock+0xf5/0x2df0 [ 2418.055032] ? lock_acquire+0x197/0x470 [ 2418.055552] ? lock_chain_count+0x20/0x20 [ 2418.056035] ? mark_lock+0xf5/0x2df0 [ 2418.056553] ? mark_lock+0xf5/0x2df0 [ 2418.056988] ? lock_chain_count+0x20/0x20 [ 2418.057522] ? __lock_acquire+0xbb1/0x5b00 [ 2418.058016] ? lock_chain_count+0x20/0x20 [ 2418.058586] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.059195] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.059731] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2418.060267] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.060899] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.061430] ? mark_lock+0xf5/0x2df0 [ 2418.061869] ? lock_acquire+0x197/0x470 [ 2418.062404] ? find_held_lock+0x2c/0x110 [ 2418.062886] ? __might_fault+0xd3/0x180 [ 2418.063403] ? lock_downgrade+0x6d0/0x6d0 [ 2418.063888] ? lock_downgrade+0x6d0/0x6d0 [ 2418.064449] ? sock_has_perm+0x1ea/0x280 [ 2418.064924] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2418.065582] ? _copy_from_user+0xfb/0x1b0 [ 2418.066080] ? __import_iovec+0x458/0x590 [ 2418.066638] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.067293] inet6_sendmsg+0x105/0x140 [ 2418.067751] ? inet6_compat_ioctl+0x320/0x320 [ 2418.068355] __sock_sendmsg+0xf2/0x190 [ 2418.068851] ____sys_sendmsg+0x70d/0x870 [ 2418.069380] ? sock_write_iter+0x3d0/0x3d0 [ 2418.069872] ? do_recvmmsg+0x6d0/0x6d0 [ 2418.070402] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.070896] ? lock_downgrade+0x6d0/0x6d0 [ 2418.071454] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.072095] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.072684] ___sys_sendmsg+0xf3/0x170 [ 2418.073140] ? sendmsg_copy_msghdr+0x160/0x160 [ 2418.074334] ? __fget_files+0x2cf/0x520 [ 2418.074825] ? lock_downgrade+0x6d0/0x6d0 [ 2418.075420] ? find_held_lock+0x2c/0x110 [ 2418.075939] ? __fget_files+0x2f8/0x520 [ 2418.076496] ? __fget_light+0xea/0x290 [ 2418.076988] __sys_sendmsg+0xe5/0x1b0 [ 2418.077490] ? __sys_sendmsg_sock+0x40/0x40 [ 2418.077989] ? rcu_read_lock_any_held+0x75/0xa0 [ 2418.078619] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2418.079326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2418.079955] ? trace_hardirqs_on+0x5b/0x180 [ 2418.080527] do_syscall_64+0x33/0x40 [ 2418.081013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2418.081669] RIP: 0033:0x7f251a6f7b19 [ 2418.082130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2418.084483] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2418.085431] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2418.086331] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2418.087156] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2418.088044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2418.088933] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2418.119760] FAULT_INJECTION: forcing a failure. [ 2418.119760] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.121201] CPU: 1 PID: 11151 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2418.122052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2418.123099] Call Trace: [ 2418.127001] dump_stack+0x107/0x167 [ 2418.127490] should_fail.cold+0x5/0xa [ 2418.127938] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2418.128619] ? create_object.isra.0+0x3a/0xa20 [ 2418.129160] should_failslab+0x5/0x20 [ 2418.129655] kmem_cache_alloc+0x5b/0x310 [ 2418.130133] create_object.isra.0+0x3a/0xa20 [ 2418.130715] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2418.131417] kmem_cache_alloc_node+0x169/0x330 [ 2418.132006] __alloc_skb+0x6d/0x5b0 [ 2418.132510] skb_segment+0x9d8/0x3aa0 [ 2418.132958] ? __lock_acquire+0xbb1/0x5b00 [ 2418.133532] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2418.134162] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.134865] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.135417] __udp_gso_segment+0x11c6/0x1830 [ 2418.135927] ? __sk_receive_skb+0x830/0x830 [ 2418.136505] udp4_ufo_fragment+0x528/0x720 [ 2418.137030] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2418.137684] inet_gso_segment+0x4fb/0x11a0 [ 2418.138209] skb_mac_gso_segment+0x273/0x570 [ 2418.138797] ? inet_sock_destruct+0x840/0x840 [ 2418.139378] ? skb_network_protocol+0x650/0x650 [ 2418.139923] ? skb_crc32c_csum_help+0x80/0x80 [ 2418.140564] ? lock_acquire+0x197/0x470 [ 2418.141059] ? __dev_queue_xmit+0x1c6/0x2690 [ 2418.141630] __skb_gso_segment+0x32d/0x6d0 [ 2418.142122] ? mark_lock+0xf5/0x2df0 [ 2418.142634] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2418.143351] ? lock_chain_count+0x20/0x20 [ 2418.143841] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2418.144469] __dev_queue_xmit+0x825/0x2690 [ 2418.144972] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2418.145658] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2418.146318] ? mark_held_locks+0x9e/0xe0 [ 2418.146802] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2418.147478] neigh_connected_output+0x382/0x4d0 [ 2418.148036] ip_finish_output2+0x6f1/0x21f0 [ 2418.148616] ? nf_hook_slow+0xfc/0x1e0 [ 2418.149070] ? ip_frag_next+0x9e0/0x9e0 [ 2418.149589] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2418.150175] __ip_finish_output.part.0+0x5f3/0xb50 [ 2418.150823] ? ip_fragment.constprop.0+0x240/0x240 [ 2418.151450] ? netif_rx_ni+0xe7/0x300 [ 2418.151906] ip_mc_output+0x401/0xa30 [ 2418.152417] ip_send_skb+0xdd/0x260 [ 2418.152849] udp_send_skb+0x6da/0x11d0 [ 2418.153367] udp_sendmsg+0x139a/0x2160 [ 2418.153820] ? mark_lock+0xf5/0x2df0 [ 2418.154332] ? ip_frag_init+0x350/0x350 [ 2418.154796] ? lock_chain_count+0x20/0x20 [ 2418.155339] ? udp_setsockopt+0xc0/0xc0 [ 2418.155800] ? mark_lock+0xf5/0x2df0 [ 2418.156283] ? lock_acquire+0x197/0x470 [ 2418.156763] ? lock_chain_count+0x20/0x20 [ 2418.157299] ? mark_lock+0xf5/0x2df0 [ 2418.157737] ? mark_lock+0xf5/0x2df0 [ 2418.158170] ? lock_chain_count+0x20/0x20 [ 2418.158725] ? __lock_acquire+0xbb1/0x5b00 [ 2418.159270] ? lock_chain_count+0x20/0x20 09:52:09 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:09 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2418.159774] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 09:52:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 69) 09:52:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x5803, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2418.168945] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.176521] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2418.184867] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.185472] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.185956] ? mark_lock+0xf5/0x2df0 [ 2418.186395] ? lock_acquire+0x197/0x470 [ 2418.186857] ? find_held_lock+0x2c/0x110 [ 2418.187336] ? __might_fault+0xd3/0x180 [ 2418.187799] ? lock_downgrade+0x6d0/0x6d0 [ 2418.188286] ? lock_downgrade+0x6d0/0x6d0 [ 2418.188802] ? sock_has_perm+0x1ea/0x280 [ 2418.189279] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2418.189884] ? _copy_from_user+0xfb/0x1b0 [ 2418.190385] ? __import_iovec+0x458/0x590 [ 2418.190868] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.191478] inet6_sendmsg+0x105/0x140 [ 2418.191940] ? inet6_compat_ioctl+0x320/0x320 [ 2418.192504] __sock_sendmsg+0xf2/0x190 [ 2418.192971] ____sys_sendmsg+0x70d/0x870 [ 2418.193451] ? sock_write_iter+0x3d0/0x3d0 [ 2418.193967] ? do_recvmmsg+0x6d0/0x6d0 [ 2418.194446] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.194947] ? lock_downgrade+0x6d0/0x6d0 [ 2418.195509] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.196184] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.196706] ___sys_sendmsg+0xf3/0x170 [ 2418.197163] ? sendmsg_copy_msghdr+0x160/0x160 [ 2418.197701] ? __fget_files+0x2cf/0x520 [ 2418.198211] ? lock_downgrade+0x6d0/0x6d0 [ 2418.198702] ? find_held_lock+0x2c/0x110 [ 2418.199217] ? __fget_files+0x2f8/0x520 [ 2418.199686] ? __fget_light+0xea/0x290 [ 2418.200179] __sys_sendmsg+0xe5/0x1b0 [ 2418.200683] ? __sys_sendmsg_sock+0x40/0x40 [ 2418.201254] ? rcu_read_lock_any_held+0x75/0xa0 [ 2418.201857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2418.202509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2418.203172] ? trace_hardirqs_on+0x5b/0x180 [ 2418.203726] do_syscall_64+0x33/0x40 [ 2418.204200] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2418.204844] RIP: 0033:0x7f3f9ec55b19 [ 2418.205295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2418.207560] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2418.208517] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2418.209405] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2418.210267] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2418.211112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2418.211981] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2418.332072] FAULT_INJECTION: forcing a failure. [ 2418.332072] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.333510] CPU: 1 PID: 11162 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2418.340678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2418.341649] Call Trace: [ 2418.341964] dump_stack+0x107/0x167 [ 2418.342423] should_fail.cold+0x5/0xa [ 2418.342866] ? trace_hardirqs_on+0x5b/0x180 [ 2418.343376] ? __alloc_skb+0x6d/0x5b0 [ 2418.343826] should_failslab+0x5/0x20 [ 2418.344276] kmem_cache_alloc_node+0x55/0x330 [ 2418.344842] __alloc_skb+0x6d/0x5b0 [ 2418.345272] skb_segment+0x9d8/0x3aa0 [ 2418.345730] ? __lock_acquire+0xbb1/0x5b00 [ 2418.346251] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2418.346836] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.347483] ? SOFTIRQ_verbose+0x10/0x10 09:52:09 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 67) [ 2418.347969] __udp_gso_segment+0x11c6/0x1830 [ 2418.348551] ? __sk_receive_skb+0x830/0x830 [ 2418.356729] udp4_ufo_fragment+0x528/0x720 [ 2418.357226] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2418.357814] inet_gso_segment+0x4fb/0x11a0 [ 2418.358318] skb_mac_gso_segment+0x273/0x570 [ 2418.358835] ? inet_sock_destruct+0x840/0x840 [ 2418.359356] ? skb_network_protocol+0x650/0x650 [ 2418.359898] ? skb_crc32c_csum_help+0x80/0x80 [ 2418.360452] ? lock_acquire+0x197/0x470 [ 2418.360927] ? __dev_queue_xmit+0x1c6/0x2690 [ 2418.361444] __skb_gso_segment+0x32d/0x6d0 [ 2418.361936] ? mark_lock+0xf5/0x2df0 [ 2418.362374] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2418.362982] ? lock_chain_count+0x20/0x20 [ 2418.363465] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2418.363997] __dev_queue_xmit+0x825/0x2690 [ 2418.364538] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2418.365161] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2418.365730] ? mark_held_locks+0x9e/0xe0 [ 2418.366226] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2418.366868] neigh_connected_output+0x382/0x4d0 [ 2418.367442] ip_finish_output2+0x6f1/0x21f0 [ 2418.367965] ? nf_hook_slow+0xfc/0x1e0 [ 2418.368470] ? ip_frag_next+0x9e0/0x9e0 [ 2418.368960] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2418.369590] __ip_finish_output.part.0+0x5f3/0xb50 [ 2418.370178] ? ip_fragment.constprop.0+0x240/0x240 [ 2418.370763] ? netif_rx_ni+0xe7/0x300 [ 2418.371228] ip_mc_output+0x401/0xa30 [ 2418.371727] ip_send_skb+0xdd/0x260 [ 2418.372189] udp_send_skb+0x6da/0x11d0 [ 2418.372735] udp_sendmsg+0x139a/0x2160 [ 2418.373221] ? mark_lock+0xf5/0x2df0 [ 2418.373738] ? ip_frag_init+0x350/0x350 [ 2418.374231] ? lock_chain_count+0x20/0x20 [ 2418.374774] ? udp_setsockopt+0xc0/0xc0 [ 2418.375261] ? mark_lock+0xf5/0x2df0 [ 2418.375718] ? lock_acquire+0x197/0x470 [ 2418.376206] ? lock_chain_count+0x20/0x20 [ 2418.376805] ? mark_lock+0xf5/0x2df0 [ 2418.377272] ? mark_lock+0xf5/0x2df0 [ 2418.377759] ? lock_chain_count+0x20/0x20 [ 2418.378269] ? __lock_acquire+0xbb1/0x5b00 [ 2418.378847] ? lock_chain_count+0x20/0x20 [ 2418.379398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.380052] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.380608] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2418.381131] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.381820] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.382342] ? mark_lock+0xf5/0x2df0 [ 2418.382830] ? lock_acquire+0x197/0x470 [ 2418.383320] ? find_held_lock+0x2c/0x110 [ 2418.383831] ? __might_fault+0xd3/0x180 [ 2418.384325] ? lock_downgrade+0x6d0/0x6d0 [ 2418.384923] ? lock_downgrade+0x6d0/0x6d0 [ 2418.385474] ? sock_has_perm+0x1ea/0x280 [ 2418.385976] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2418.386652] ? _copy_from_user+0xfb/0x1b0 [ 2418.387174] ? __import_iovec+0x458/0x590 [ 2418.387714] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.388346] inet6_sendmsg+0x105/0x140 [ 2418.388864] ? inet6_compat_ioctl+0x320/0x320 [ 2418.389433] __sock_sendmsg+0xf2/0x190 [ 2418.389953] ____sys_sendmsg+0x70d/0x870 [ 2418.390493] ? sock_write_iter+0x3d0/0x3d0 [ 2418.391015] ? do_recvmmsg+0x6d0/0x6d0 [ 2418.391502] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.392002] ? lock_downgrade+0x6d0/0x6d0 [ 2418.392849] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.394196] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.395260] ___sys_sendmsg+0xf3/0x170 [ 2418.396262] ? sendmsg_copy_msghdr+0x160/0x160 [ 2418.396984] ? __fget_files+0x2cf/0x520 [ 2418.397508] ? lock_downgrade+0x6d0/0x6d0 [ 2418.398015] ? find_held_lock+0x2c/0x110 [ 2418.398526] ? __fget_files+0x2f8/0x520 [ 2418.399025] ? __fget_light+0xea/0x290 [ 2418.399552] __sys_sendmsg+0xe5/0x1b0 [ 2418.400039] ? __sys_sendmsg_sock+0x40/0x40 [ 2418.400650] ? rcu_read_lock_any_held+0x75/0xa0 [ 2418.401246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2418.401947] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2418.402619] ? trace_hardirqs_on+0x5b/0x180 [ 2418.403159] do_syscall_64+0x33/0x40 [ 2418.403677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2418.404323] RIP: 0033:0x7f251a6f7b19 [ 2418.404835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2418.407174] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2418.408129] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2418.409017] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2418.409926] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2418.410793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2418.411696] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2418.504164] FAULT_INJECTION: forcing a failure. [ 2418.504164] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.505642] CPU: 1 PID: 11171 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2418.506493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2418.507577] Call Trace: [ 2418.507933] dump_stack+0x107/0x167 [ 2418.508403] should_fail.cold+0x5/0xa [ 2418.508896] should_failslab+0x5/0x20 [ 2418.509375] __kmalloc_node_track_caller+0x74/0x3b0 [ 2418.510011] ? skb_segment+0x9d8/0x3aa0 [ 2418.510523] __alloc_skb+0xb1/0x5b0 [ 2418.510989] skb_segment+0x9d8/0x3aa0 [ 2418.511473] ? __lock_acquire+0xbb1/0x5b00 [ 2418.512046] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2418.512714] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.513391] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.513939] __udp_gso_segment+0x11c6/0x1830 [ 2418.514491] ? __sk_receive_skb+0x830/0x830 [ 2418.515040] udp4_ufo_fragment+0x528/0x720 [ 2418.515577] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2418.516242] inet_gso_segment+0x4fb/0x11a0 [ 2418.520863] skb_mac_gso_segment+0x273/0x570 [ 2418.521410] ? inet_sock_destruct+0x840/0x840 [ 2418.521966] ? skb_network_protocol+0x650/0x650 [ 2418.522541] ? skb_crc32c_csum_help+0x80/0x80 [ 2418.523099] ? lock_acquire+0x197/0x470 [ 2418.523596] ? __dev_queue_xmit+0x1c6/0x2690 [ 2418.524151] __skb_gso_segment+0x32d/0x6d0 [ 2418.528897] ? mark_lock+0xf5/0x2df0 [ 2418.529364] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2418.530015] ? lock_chain_count+0x20/0x20 [ 2418.530529] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2418.531100] __dev_queue_xmit+0x825/0x2690 [ 2418.531636] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2418.532277] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2418.532887] ? mark_held_locks+0x9e/0xe0 [ 2418.533398] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2418.534056] neigh_connected_output+0x382/0x4d0 [ 2418.534653] ip_finish_output2+0x6f1/0x21f0 [ 2418.535196] ? nf_hook_slow+0xfc/0x1e0 [ 2418.535690] ? ip_frag_next+0x9e0/0x9e0 [ 2418.536188] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2418.536839] __ip_finish_output.part.0+0x5f3/0xb50 [ 2418.537453] ? ip_fragment.constprop.0+0x240/0x240 [ 2418.538066] ? netif_rx_ni+0xe7/0x300 [ 2418.538550] ip_mc_output+0x401/0xa30 [ 2418.539081] ip_send_skb+0xdd/0x260 [ 2418.539547] udp_send_skb+0x6da/0x11d0 [ 2418.540078] udp_sendmsg+0x139a/0x2160 [ 2418.540586] ? mark_lock+0xf5/0x2df0 [ 2418.541057] ? ip_frag_init+0x350/0x350 [ 2418.541554] ? lock_chain_count+0x20/0x20 [ 2418.542076] ? udp_setsockopt+0xc0/0xc0 [ 2418.542569] ? mark_lock+0xf5/0x2df0 [ 2418.543031] ? lock_acquire+0x197/0x470 [ 2418.543533] ? lock_chain_count+0x20/0x20 [ 2418.544050] ? mark_lock+0xf5/0x2df0 [ 2418.544543] ? mark_lock+0xf5/0x2df0 [ 2418.545007] ? lock_chain_count+0x20/0x20 [ 2418.545523] ? __lock_acquire+0xbb1/0x5b00 [ 2418.546052] ? lock_chain_count+0x20/0x20 [ 2418.546585] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.547229] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.547748] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2418.548272] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.552985] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.553499] ? mark_lock+0xf5/0x2df0 [ 2418.553968] ? lock_acquire+0x197/0x470 [ 2418.554462] ? find_held_lock+0x2c/0x110 [ 2418.555025] ? __might_fault+0xd3/0x180 [ 2418.555526] ? lock_downgrade+0x6d0/0x6d0 [ 2418.556078] ? lock_downgrade+0x6d0/0x6d0 [ 2418.556622] ? sock_has_perm+0x1ea/0x280 [ 2418.557128] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2418.557772] ? _copy_from_user+0xfb/0x1b0 [ 2418.558305] ? __import_iovec+0x458/0x590 [ 2418.558828] ? udp_v6_push_pending_frames+0x360/0x360 [ 2418.559474] inet6_sendmsg+0x105/0x140 [ 2418.559963] ? inet6_compat_ioctl+0x320/0x320 [ 2418.560539] __sock_sendmsg+0xf2/0x190 [ 2418.561028] ____sys_sendmsg+0x70d/0x870 [ 2418.561542] ? sock_write_iter+0x3d0/0x3d0 [ 2418.562078] ? do_recvmmsg+0x6d0/0x6d0 [ 2418.562573] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.563079] ? lock_downgrade+0x6d0/0x6d0 [ 2418.563600] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2418.564261] ? SOFTIRQ_verbose+0x10/0x10 [ 2418.564801] ___sys_sendmsg+0xf3/0x170 [ 2418.565289] ? sendmsg_copy_msghdr+0x160/0x160 [ 2418.565872] ? __fget_files+0x2cf/0x520 [ 2418.566373] ? lock_downgrade+0x6d0/0x6d0 [ 2418.566897] ? find_held_lock+0x2c/0x110 [ 2418.567417] ? __fget_files+0x2f8/0x520 [ 2418.567971] ? __fget_light+0xea/0x290 [ 2418.568487] __sys_sendmsg+0xe5/0x1b0 [ 2418.568992] ? __sys_sendmsg_sock+0x40/0x40 [ 2418.569521] ? rcu_read_lock_any_held+0x75/0xa0 [ 2418.570115] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2418.570779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2418.571451] ? trace_hardirqs_on+0x5b/0x180 [ 2418.572023] do_syscall_64+0x33/0x40 [ 2418.572507] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2418.573143] RIP: 0033:0x7f3f9ec55b19 [ 2418.573610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2418.575946] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2418.576915] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2418.577792] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2418.578669] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2418.579544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2418.580440] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:52:24 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc04812b9, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:24 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb9", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:52:24 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 68) 09:52:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2433.670064] FAULT_INJECTION: forcing a failure. [ 2433.670064] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.671541] CPU: 1 PID: 11186 Comm: syz-executor.6 Not tainted 5.10.232 #1 09:52:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d780", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:24 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 70) [ 2433.672425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.673545] Call Trace: [ 2433.673892] dump_stack+0x107/0x167 [ 2433.674370] should_fail.cold+0x5/0xa [ 2433.674865] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2433.675544] ? create_object.isra.0+0x3a/0xa20 [ 2433.676140] should_failslab+0x5/0x20 [ 2433.676632] kmem_cache_alloc+0x5b/0x310 [ 2433.677177] ? mark_held_locks+0x9e/0xe0 [ 2433.677709] create_object.isra.0+0x3a/0xa20 [ 2433.678264] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2433.678915] kmem_cache_alloc_node+0x169/0x330 [ 2433.679509] __alloc_skb+0x6d/0x5b0 [ 2433.679992] skb_segment+0x9d8/0x3aa0 [ 2433.680483] ? __lock_acquire+0xbb1/0x5b00 [ 2433.681066] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2433.681719] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2433.682399] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.682938] __udp_gso_segment+0x11c6/0x1830 [ 2433.683512] ? __sk_receive_skb+0x830/0x830 [ 2433.684085] udp4_ufo_fragment+0x528/0x720 [ 2433.684636] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2433.685301] inet_gso_segment+0x4fb/0x11a0 [ 2433.685865] skb_mac_gso_segment+0x273/0x570 [ 2433.686437] ? inet_sock_destruct+0x840/0x840 [ 2433.687015] ? skb_network_protocol+0x650/0x650 [ 2433.687619] ? skb_crc32c_csum_help+0x80/0x80 [ 2433.688196] ? lock_acquire+0x197/0x470 [ 2433.688719] ? __dev_queue_xmit+0x1c6/0x2690 [ 2433.689323] __skb_gso_segment+0x32d/0x6d0 [ 2433.689881] ? mark_lock+0xf5/0x2df0 [ 2433.690368] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2433.691054] ? lock_chain_count+0x20/0x20 [ 2433.691610] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2433.692217] __dev_queue_xmit+0x825/0x2690 [ 2433.692798] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2433.693490] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2433.694115] ? mark_held_locks+0x9e/0xe0 [ 2433.694673] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2433.695368] neigh_connected_output+0x382/0x4d0 [ 2433.695998] ip_finish_output2+0x6f1/0x21f0 [ 2433.696589] ? nf_hook_slow+0xfc/0x1e0 [ 2433.697127] ? ip_frag_next+0x9e0/0x9e0 [ 2433.697658] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2433.698320] __ip_finish_output.part.0+0x5f3/0xb50 [ 2433.698973] ? ip_fragment.constprop.0+0x240/0x240 [ 2433.699623] ? netif_rx_ni+0xe7/0x300 [ 2433.700126] ip_mc_output+0x401/0xa30 [ 2433.700638] ip_send_skb+0xdd/0x260 [ 2433.701136] udp_send_skb+0x6da/0x11d0 [ 2433.701660] udp_sendmsg+0x139a/0x2160 [ 2433.702164] ? mark_lock+0xf5/0x2df0 [ 2433.702657] ? ip_frag_init+0x350/0x350 [ 2433.703178] ? lock_chain_count+0x20/0x20 [ 2433.703735] ? udp_setsockopt+0xc0/0xc0 [ 2433.704269] ? mark_lock+0xf5/0x2df0 [ 2433.704764] ? lock_acquire+0x197/0x470 [ 2433.705303] ? lock_chain_count+0x20/0x20 [ 2433.705854] ? mark_lock+0xf5/0x2df0 [ 2433.706360] ? mark_lock+0xf5/0x2df0 [ 2433.706853] ? lock_chain_count+0x20/0x20 [ 2433.707396] ? __lock_acquire+0xbb1/0x5b00 [ 2433.707957] ? lock_chain_count+0x20/0x20 [ 2433.709074] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2433.710407] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.711444] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2433.712474] ? udp_v6_push_pending_frames+0x360/0x360 [ 2433.713976] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.715001] ? mark_lock+0xf5/0x2df0 [ 2433.715938] ? lock_acquire+0x197/0x470 [ 2433.716984] ? find_held_lock+0x2c/0x110 [ 2433.718222] ? __might_fault+0xd3/0x180 [ 2433.719224] ? lock_downgrade+0x6d0/0x6d0 [ 2433.720279] ? lock_downgrade+0x6d0/0x6d0 [ 2433.721431] ? sock_has_perm+0x1ea/0x280 [ 2433.721623] FAULT_INJECTION: forcing a failure. [ 2433.721623] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.722457] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2433.722487] ? _copy_from_user+0xfb/0x1b0 [ 2433.726798] ? __import_iovec+0x458/0x590 [ 2433.727853] ? udp_v6_push_pending_frames+0x360/0x360 [ 2433.729224] inet6_sendmsg+0x105/0x140 [ 2433.730213] ? inet6_compat_ioctl+0x320/0x320 [ 2433.731341] __sock_sendmsg+0xf2/0x190 [ 2433.732340] ____sys_sendmsg+0x70d/0x870 [ 2433.733552] ? sock_write_iter+0x3d0/0x3d0 [ 2433.734633] ? do_recvmmsg+0x6d0/0x6d0 [ 2433.735622] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.736648] ? lock_downgrade+0x6d0/0x6d0 [ 2433.737888] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2433.739212] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.740218] ___sys_sendmsg+0xf3/0x170 [ 2433.741207] ? sendmsg_copy_msghdr+0x160/0x160 [ 2433.742316] ? __fget_files+0x2cf/0x520 [ 2433.743317] ? lock_downgrade+0x6d0/0x6d0 [ 2433.744363] ? find_held_lock+0x2c/0x110 [ 2433.745517] ? __fget_files+0x2f8/0x520 [ 2433.746528] ? __fget_light+0xea/0x290 [ 2433.747513] __sys_sendmsg+0xe5/0x1b0 [ 2433.748467] ? __sys_sendmsg_sock+0x40/0x40 [ 2433.749709] ? rcu_read_lock_any_held+0x75/0xa0 [ 2433.750913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.752254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.753831] ? trace_hardirqs_on+0x5b/0x180 [ 2433.754938] do_syscall_64+0x33/0x40 [ 2433.755879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2433.757087] RIP: 0033:0x7f251a6f7b19 [ 2433.757579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.759963] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2433.760976] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2433.761909] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2433.762836] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2433.763758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2433.764680] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2433.769010] CPU: 0 PID: 11182 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2433.769930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.771026] Call Trace: [ 2433.771376] dump_stack+0x107/0x167 [ 2433.771865] should_fail.cold+0x5/0xa [ 2433.772366] ? create_object.isra.0+0x3a/0xa20 [ 2433.772987] should_failslab+0x5/0x20 [ 2433.773494] kmem_cache_alloc+0x5b/0x310 [ 2433.774035] create_object.isra.0+0x3a/0xa20 [ 2433.774616] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2433.775283] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2433.775959] ? skb_segment+0x9d8/0x3aa0 [ 2433.776487] __alloc_skb+0xb1/0x5b0 [ 2433.776977] skb_segment+0x9d8/0x3aa0 [ 2433.777487] ? __lock_acquire+0xbb1/0x5b00 [ 2433.778068] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2433.778724] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2433.779409] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.779948] __udp_gso_segment+0x11c6/0x1830 [ 2433.780524] ? __sk_receive_skb+0x830/0x830 [ 2433.781114] udp4_ufo_fragment+0x528/0x720 [ 2433.781673] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2433.782326] inet_gso_segment+0x4fb/0x11a0 [ 2433.782894] skb_mac_gso_segment+0x273/0x570 [ 2433.783471] ? inet_sock_destruct+0x840/0x840 [ 2433.784061] ? skb_network_protocol+0x650/0x650 [ 2433.784668] ? skb_crc32c_csum_help+0x80/0x80 [ 2433.785276] ? lock_acquire+0x197/0x470 [ 2433.785803] ? __dev_queue_xmit+0x1c6/0x2690 [ 2433.786402] __skb_gso_segment+0x32d/0x6d0 [ 2433.786968] ? mark_lock+0xf5/0x2df0 [ 2433.787481] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2433.788171] ? lock_chain_count+0x20/0x20 [ 2433.788732] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2433.789372] __dev_queue_xmit+0x825/0x2690 [ 2433.789942] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2433.790642] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2433.791264] ? mark_held_locks+0x9e/0xe0 [ 2433.791803] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2433.792512] neigh_connected_output+0x382/0x4d0 [ 2433.793165] ip_finish_output2+0x6f1/0x21f0 [ 2433.793744] ? nf_hook_slow+0xfc/0x1e0 [ 2433.794253] ? ip_frag_next+0x9e0/0x9e0 [ 2433.794783] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2433.795442] __ip_finish_output.part.0+0x5f3/0xb50 [ 2433.796093] ? ip_fragment.constprop.0+0x240/0x240 [ 2433.796743] ? netif_rx_ni+0xe7/0x300 [ 2433.797266] ip_mc_output+0x401/0xa30 [ 2433.797780] ip_send_skb+0xdd/0x260 [ 2433.798261] udp_send_skb+0x6da/0x11d0 [ 2433.798789] udp_sendmsg+0x139a/0x2160 [ 2433.799301] ? clockevents_program_event+0x14b/0x360 [ 2433.799972] ? ip_frag_init+0x350/0x350 [ 2433.800497] ? lock_acquire+0x197/0x470 [ 2433.801040] ? find_held_lock+0x2c/0x110 [ 2433.801577] ? udp_setsockopt+0xc0/0xc0 [ 2433.802100] ? perf_event_update_userpage+0x4aa/0x7f0 [ 2433.802778] ? lock_downgrade+0x6d0/0x6d0 [ 2433.803329] ? mark_lock+0xf5/0x2df0 [ 2433.803820] ? mark_lock+0xf5/0x2df0 [ 2433.804310] ? lock_chain_count+0x20/0x20 [ 2433.804851] ? perf_event_task_disable+0x390/0x390 [ 2433.805517] ? lock_chain_count+0x20/0x20 [ 2433.806057] ? hrtimer_start_range_ns+0x3b2/0xb30 [ 2433.806689] ? mark_lock+0xf5/0x2df0 [ 2433.807177] ? lock_chain_count+0x20/0x20 [ 2433.807726] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2433.808266] ? udp_v6_push_pending_frames+0x360/0x360 [ 2433.808954] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.809492] ? mark_lock+0xf5/0x2df0 [ 2433.809981] ? lock_acquire+0x197/0x470 [ 2433.810496] ? find_held_lock+0x2c/0x110 [ 2433.811031] ? __might_fault+0xd3/0x180 [ 2433.811553] ? lock_downgrade+0x6d0/0x6d0 [ 2433.812102] ? lock_downgrade+0x6d0/0x6d0 [ 2433.812642] ? sock_has_perm+0x1ea/0x280 [ 2433.813192] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2433.813864] ? _copy_from_user+0xfb/0x1b0 [ 2433.814413] ? __import_iovec+0x458/0x590 [ 2433.814951] ? udp_v6_push_pending_frames+0x360/0x360 [ 2433.815635] inet6_sendmsg+0x105/0x140 [ 2433.816139] ? inet6_compat_ioctl+0x320/0x320 [ 2433.816740] __sock_sendmsg+0xf2/0x190 [ 2433.817265] ____sys_sendmsg+0x70d/0x870 [ 2433.817798] ? sock_write_iter+0x3d0/0x3d0 [ 2433.818342] ? do_recvmmsg+0x6d0/0x6d0 [ 2433.818854] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.819377] ? lock_downgrade+0x6d0/0x6d0 [ 2433.819920] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2433.820596] ? SOFTIRQ_verbose+0x10/0x10 [ 2433.821144] ___sys_sendmsg+0xf3/0x170 [ 2433.821651] ? sendmsg_copy_msghdr+0x160/0x160 [ 2433.822250] ? __fget_files+0x2cf/0x520 [ 2433.822766] ? lock_downgrade+0x6d0/0x6d0 [ 2433.823307] ? find_held_lock+0x2c/0x110 [ 2433.823841] ? __fget_files+0x2f8/0x520 [ 2433.824365] ? __fget_light+0xea/0x290 [ 2433.824877] __sys_sendmsg+0xe5/0x1b0 [ 2433.825392] ? __sys_sendmsg_sock+0x40/0x40 [ 2433.825951] ? rcu_read_lock_any_held+0x75/0xa0 [ 2433.826571] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2433.827249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2433.827919] ? trace_hardirqs_on+0x5b/0x180 [ 2433.828479] do_syscall_64+0x33/0x40 [ 2433.828987] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2433.829658] RIP: 0033:0x7f3f9ec55b19 [ 2433.830144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.832522] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2433.833537] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2433.834463] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2433.835395] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2433.836354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2433.837315] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:52:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 71) 09:52:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x6c03, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x8}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:25 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 69) 09:52:25 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:25 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2434.091192] FAULT_INJECTION: forcing a failure. [ 2434.091192] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.092737] CPU: 1 PID: 11215 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2434.093684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2434.094773] Call Trace: [ 2434.095127] dump_stack+0x107/0x167 [ 2434.095609] should_fail.cold+0x5/0xa [ 2434.096113] ? trace_hardirqs_on+0x5b/0x180 [ 2434.096679] ? __alloc_skb+0x6d/0x5b0 [ 2434.097222] should_failslab+0x5/0x20 [ 2434.097723] kmem_cache_alloc_node+0x55/0x330 [ 2434.098317] __alloc_skb+0x6d/0x5b0 [ 2434.098807] skb_segment+0x9d8/0x3aa0 [ 2434.099314] ? __lock_acquire+0xbb1/0x5b00 [ 2434.099905] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2434.100569] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2434.101279] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.101820] __udp_gso_segment+0x11c6/0x1830 [ 2434.102408] ? __sk_receive_skb+0x830/0x830 [ 2434.102980] udp4_ufo_fragment+0x528/0x720 [ 2434.103544] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2434.104200] inet_gso_segment+0x4fb/0x11a0 [ 2434.104765] skb_mac_gso_segment+0x273/0x570 [ 2434.105389] ? inet_sock_destruct+0x840/0x840 [ 2434.105966] ? skb_network_protocol+0x650/0x650 [ 2434.106571] ? skb_crc32c_csum_help+0x80/0x80 [ 2434.107161] ? lock_acquire+0x197/0x470 [ 2434.107684] ? __dev_queue_xmit+0x1c6/0x2690 [ 2434.108265] __skb_gso_segment+0x32d/0x6d0 [ 2434.108824] ? mark_lock+0xf5/0x2df0 [ 2434.109349] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2434.110034] ? lock_chain_count+0x20/0x20 [ 2434.110573] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2434.111171] __dev_queue_xmit+0x825/0x2690 [ 2434.111734] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2434.112416] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2434.113048] ? mark_held_locks+0x9e/0xe0 [ 2434.113585] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2434.114277] neigh_connected_output+0x382/0x4d0 [ 2434.114900] ip_finish_output2+0x6f1/0x21f0 [ 2434.115470] ? nf_hook_slow+0xfc/0x1e0 [ 2434.115987] ? ip_frag_next+0x9e0/0x9e0 [ 2434.116511] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2434.117199] __ip_finish_output.part.0+0x5f3/0xb50 [ 2434.117842] ? ip_fragment.constprop.0+0x240/0x240 [ 2434.118481] ? netif_rx_ni+0xe7/0x300 [ 2434.118993] ip_mc_output+0x401/0xa30 [ 2434.119499] ip_send_skb+0xdd/0x260 [ 2434.119977] udp_send_skb+0x6da/0x11d0 [ 2434.120498] udp_sendmsg+0x139a/0x2160 [ 2434.121029] ? mark_lock+0xf5/0x2df0 [ 2434.121519] ? ip_frag_init+0x350/0x350 [ 2434.122043] ? lock_chain_count+0x20/0x20 [ 2434.122591] ? udp_setsockopt+0xc0/0xc0 [ 2434.123103] ? mark_lock+0xf5/0x2df0 [ 2434.123595] ? lock_acquire+0x197/0x470 [ 2434.124115] ? lock_chain_count+0x20/0x20 [ 2434.124664] ? mark_lock+0xf5/0x2df0 [ 2434.125178] ? mark_lock+0xf5/0x2df0 [ 2434.125668] ? lock_chain_count+0x20/0x20 [ 2434.126215] ? __lock_acquire+0xbb1/0x5b00 [ 2434.126773] ? lock_chain_count+0x20/0x20 [ 2434.127328] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2434.128018] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.128565] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2434.129139] ? udp_v6_push_pending_frames+0x360/0x360 [ 2434.129813] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.130358] ? mark_lock+0xf5/0x2df0 [ 2434.130851] ? lock_acquire+0x197/0x470 [ 2434.131370] ? find_held_lock+0x2c/0x110 [ 2434.131912] ? __might_fault+0xd3/0x180 [ 2434.132433] ? lock_downgrade+0x6d0/0x6d0 [ 2434.133000] ? lock_downgrade+0x6d0/0x6d0 [ 2434.133550] ? sock_has_perm+0x1ea/0x280 [ 2434.134086] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2434.134776] ? _copy_from_user+0xfb/0x1b0 [ 2434.135336] ? __import_iovec+0x458/0x590 [ 2434.135882] ? udp_v6_push_pending_frames+0x360/0x360 [ 2434.136563] inet6_sendmsg+0x105/0x140 [ 2434.137101] ? inet6_compat_ioctl+0x320/0x320 [ 2434.137696] __sock_sendmsg+0xf2/0x190 [ 2434.138211] ____sys_sendmsg+0x70d/0x870 [ 2434.138749] ? sock_write_iter+0x3d0/0x3d0 [ 2434.139304] ? do_recvmmsg+0x6d0/0x6d0 [ 2434.139818] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.140353] ? lock_downgrade+0x6d0/0x6d0 [ 2434.140901] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2434.141604] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.142142] ___sys_sendmsg+0xf3/0x170 [ 2434.142660] ? sendmsg_copy_msghdr+0x160/0x160 [ 2434.143267] ? __fget_files+0x2cf/0x520 [ 2434.143789] ? lock_downgrade+0x6d0/0x6d0 [ 2434.144333] ? find_held_lock+0x2c/0x110 [ 2434.144882] ? __fget_files+0x2f8/0x520 [ 2434.145442] ? __fget_light+0xea/0x290 [ 2434.145964] __sys_sendmsg+0xe5/0x1b0 [ 2434.146468] ? __sys_sendmsg_sock+0x40/0x40 [ 2434.147031] ? rcu_read_lock_any_held+0x75/0xa0 [ 2434.147659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2434.148346] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.149048] ? trace_hardirqs_on+0x5b/0x180 [ 2434.149623] do_syscall_64+0x33/0x40 [ 2434.150115] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2434.150784] RIP: 0033:0x7f3f9ec55b19 [ 2434.151276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2434.153711] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2434.154670] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2434.155597] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2434.156519] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2434.157457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2434.158379] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:52:25 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x13a, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x8003, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1f4}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2434.281087] blktrace: Concurrent blktraces are not allowed on loop14 [ 2434.344151] FAULT_INJECTION: forcing a failure. [ 2434.344151] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.345589] CPU: 1 PID: 11231 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2434.346412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2434.347388] Call Trace: [ 2434.347713] dump_stack+0x107/0x167 [ 2434.348155] should_fail.cold+0x5/0xa [ 2434.348620] should_failslab+0x5/0x20 [ 2434.349123] __kmalloc_node_track_caller+0x74/0x3b0 [ 2434.349736] ? skb_segment+0x9d8/0x3aa0 [ 2434.350211] __alloc_skb+0xb1/0x5b0 [ 2434.350644] skb_segment+0x9d8/0x3aa0 [ 2434.351096] ? __lock_acquire+0xbb1/0x5b00 [ 2434.351620] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2434.352204] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2434.352817] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.353333] __udp_gso_segment+0x11c6/0x1830 [ 2434.353851] ? __sk_receive_skb+0x830/0x830 [ 2434.354373] udp4_ufo_fragment+0x528/0x720 [ 2434.354880] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2434.355471] inet_gso_segment+0x4fb/0x11a0 [ 2434.355984] skb_mac_gso_segment+0x273/0x570 [ 2434.356507] ? inet_sock_destruct+0x840/0x840 [ 2434.357082] ? skb_network_protocol+0x650/0x650 [ 2434.357635] ? skb_crc32c_csum_help+0x80/0x80 [ 2434.358166] ? lock_acquire+0x197/0x470 [ 2434.358637] ? __dev_queue_xmit+0x1c6/0x2690 [ 2434.359164] __skb_gso_segment+0x32d/0x6d0 [ 2434.359664] ? mark_lock+0xf5/0x2df0 [ 2434.360108] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2434.360727] ? lock_chain_count+0x20/0x20 [ 2434.361242] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2434.361788] __dev_queue_xmit+0x825/0x2690 [ 2434.362295] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2434.362908] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2434.363459] ? mark_held_locks+0x9e/0xe0 [ 2434.363940] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2434.364617] neigh_connected_output+0x382/0x4d0 [ 2434.365220] ip_finish_output2+0x6f1/0x21f0 [ 2434.365733] ? nf_hook_slow+0xfc/0x1e0 [ 2434.366198] ? ip_frag_next+0x9e0/0x9e0 [ 2434.366667] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2434.367264] __ip_finish_output.part.0+0x5f3/0xb50 [ 2434.367848] ? ip_fragment.constprop.0+0x240/0x240 [ 2434.368428] ? netif_rx_ni+0xe7/0x300 [ 2434.368885] ip_mc_output+0x401/0xa30 [ 2434.369374] ip_send_skb+0xdd/0x260 [ 2434.369808] udp_send_skb+0x6da/0x11d0 [ 2434.370278] udp_sendmsg+0x139a/0x2160 [ 2434.370737] ? mark_lock+0xf5/0x2df0 [ 2434.371180] ? ip_frag_init+0x350/0x350 [ 2434.371651] ? lock_chain_count+0x20/0x20 [ 2434.372140] ? lock_chain_count+0x20/0x20 [ 2434.372634] ? udp_setsockopt+0xc0/0xc0 [ 2434.373151] ? mark_lock+0xf5/0x2df0 [ 2434.373599] ? __bad_area_nosemaphore+0xa1/0x310 [ 2434.374159] ? lock_chain_count+0x20/0x20 [ 2434.374655] ? mark_lock+0xf5/0x2df0 [ 2434.375103] ? mark_lock+0xf5/0x2df0 [ 2434.375546] ? lock_chain_count+0x20/0x20 [ 2434.376045] ? lock_chain_count+0x20/0x20 [ 2434.376554] ? mark_lock+0xf5/0x2df0 [ 2434.377025] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2434.377530] ? udp_v6_push_pending_frames+0x360/0x360 [ 2434.378142] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.378630] ? mark_lock+0xf5/0x2df0 [ 2434.379075] ? lock_acquire+0x197/0x470 [ 2434.379546] ? find_held_lock+0x2c/0x110 [ 2434.380033] ? __might_fault+0xd3/0x180 [ 2434.380507] ? lock_downgrade+0x6d0/0x6d0 [ 2434.381050] ? lock_downgrade+0x6d0/0x6d0 [ 2434.381585] ? sock_has_perm+0x1ea/0x280 [ 2434.382101] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2434.382768] ? _copy_from_user+0xfb/0x1b0 [ 2434.383307] ? __import_iovec+0x458/0x590 [ 2434.383838] ? udp_v6_push_pending_frames+0x360/0x360 [ 2434.384497] inet6_sendmsg+0x105/0x140 [ 2434.385011] ? inet6_compat_ioctl+0x320/0x320 [ 2434.385575] __sock_sendmsg+0xf2/0x190 [ 2434.386068] ____sys_sendmsg+0x70d/0x870 [ 2434.386593] ? sock_write_iter+0x3d0/0x3d0 [ 2434.387128] ? do_recvmmsg+0x6d0/0x6d0 [ 2434.387624] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.388142] ? lock_downgrade+0x6d0/0x6d0 [ 2434.388675] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2434.389378] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.389895] ___sys_sendmsg+0xf3/0x170 [ 2434.390397] ? sendmsg_copy_msghdr+0x160/0x160 [ 2434.390983] ? __fget_files+0x2cf/0x520 [ 2434.391491] ? lock_downgrade+0x6d0/0x6d0 [ 2434.392017] ? find_held_lock+0x2c/0x110 [ 2434.392541] ? __fget_files+0x2f8/0x520 [ 2434.393081] ? __fget_light+0xea/0x290 [ 2434.393592] __sys_sendmsg+0xe5/0x1b0 [ 2434.394080] ? __sys_sendmsg_sock+0x40/0x40 [ 2434.394629] ? rcu_read_lock_any_held+0x75/0xa0 [ 2434.395241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2434.395910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.396561] ? trace_hardirqs_on+0x5b/0x180 [ 2434.397176] do_syscall_64+0x33/0x40 [ 2434.397661] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2434.398317] RIP: 0033:0x7f251a6f7b19 [ 2434.398794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2434.401124] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2434.402089] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2434.402992] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2434.403907] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2434.404816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2434.405764] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2449.750211] FAULT_INJECTION: forcing a failure. [ 2449.750211] name failslab, interval 1, probability 0, space 0, times 0 [ 2449.751865] CPU: 0 PID: 11245 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2449.752819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2449.753993] Call Trace: [ 2449.754374] dump_stack+0x107/0x167 [ 2449.754890] should_fail.cold+0x5/0xa [ 2449.757067] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2449.758124] ? create_object.isra.0+0x3a/0xa20 [ 2449.758734] should_failslab+0x5/0x20 [ 2449.759225] kmem_cache_alloc+0x5b/0x310 [ 2449.759763] ? mark_held_locks+0x9e/0xe0 [ 2449.760299] create_object.isra.0+0x3a/0xa20 [ 2449.760881] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2449.761588] kmem_cache_alloc_node+0x169/0x330 [ 2449.762206] __alloc_skb+0x6d/0x5b0 [ 2449.762698] skb_segment+0x9d8/0x3aa0 [ 2449.763193] ? __lock_acquire+0xbb1/0x5b00 [ 2449.763793] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2449.764446] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.765133] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.765737] __udp_gso_segment+0x11c6/0x1830 [ 2449.766312] ? __sk_receive_skb+0x830/0x830 [ 2449.766929] udp4_ufo_fragment+0x528/0x720 [ 2449.767493] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2449.768146] inet_gso_segment+0x4fb/0x11a0 [ 2449.768719] skb_mac_gso_segment+0x273/0x570 [ 2449.769292] ? inet_sock_destruct+0x840/0x840 [ 2449.769916] ? skb_network_protocol+0x650/0x650 [ 2449.770549] ? __skb_gso_segment+0x7f/0x6d0 [ 2449.771115] __skb_gso_segment+0x32d/0x6d0 [ 2449.771675] ? mark_lock+0xf5/0x2df0 [ 2449.772161] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2449.772854] ? lock_chain_count+0x20/0x20 [ 2449.773396] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2449.774051] __dev_queue_xmit+0x825/0x2690 [ 2449.774621] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2449.775213] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2449.775919] ? trace_hardirqs_on+0x5b/0x180 [ 2449.776495] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2449.777214] neigh_connected_output+0x382/0x4d0 [ 2449.777885] ip_finish_output2+0x6f1/0x21f0 [ 2449.778460] ? nf_hook_slow+0xfc/0x1e0 [ 2449.778974] ? ip_frag_next+0x9e0/0x9e0 [ 2449.779507] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2449.780164] __ip_finish_output.part.0+0x5f3/0xb50 [ 2449.780812] ? ip_fragment.constprop.0+0x240/0x240 [ 2449.781451] ? netif_rx_ni+0xe7/0x300 [ 2449.782010] ip_mc_output+0x401/0xa30 [ 2449.782530] ip_send_skb+0xdd/0x260 [ 2449.783011] udp_send_skb+0x6da/0x11d0 [ 2449.783542] udp_sendmsg+0x139a/0x2160 [ 2449.784046] ? mark_lock+0xf5/0x2df0 [ 2449.784541] ? ip_frag_init+0x350/0x350 [ 2449.785057] ? lock_chain_count+0x20/0x20 [ 2449.785656] ? udp_setsockopt+0xc0/0xc0 [ 2449.786169] ? mark_lock+0xf5/0x2df0 [ 2449.786662] ? lock_acquire+0x197/0x470 [ 2449.787180] ? lock_chain_count+0x20/0x20 [ 2449.787730] ? mark_lock+0xf5/0x2df0 [ 2449.788217] ? mark_lock+0xf5/0x2df0 [ 2449.788713] ? lock_chain_count+0x20/0x20 [ 2449.789247] ? __lock_acquire+0xbb1/0x5b00 [ 2449.789824] ? lock_chain_count+0x20/0x20 [ 2449.790421] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.791108] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.791658] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2449.792200] ? udp_v6_push_pending_frames+0x360/0x360 [ 2449.792884] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.793420] ? mark_lock+0xf5/0x2df0 [ 2449.793967] ? lock_acquire+0x197/0x470 [ 2449.794497] ? find_held_lock+0x2c/0x110 [ 2449.795035] ? __might_fault+0xd3/0x180 [ 2449.795562] ? lock_downgrade+0x6d0/0x6d0 [ 2449.796102] ? lock_downgrade+0x6d0/0x6d0 [ 2449.796653] ? sock_has_perm+0x1ea/0x280 [ 2449.797178] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2449.797908] ? _copy_from_user+0xfb/0x1b0 [ 2449.798470] ? __import_iovec+0x458/0x590 [ 2449.799016] ? udp_v6_push_pending_frames+0x360/0x360 [ 2449.799704] inet6_sendmsg+0x105/0x140 [ 2449.800211] ? inet6_compat_ioctl+0x320/0x320 [ 2449.800802] __sock_sendmsg+0xf2/0x190 [ 2449.801310] ____sys_sendmsg+0x70d/0x870 [ 2449.801902] ? sock_write_iter+0x3d0/0x3d0 [ 2449.802456] ? do_recvmmsg+0x6d0/0x6d0 [ 2449.802973] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.803510] ? lock_downgrade+0x6d0/0x6d0 [ 2449.804051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.804738] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.805267] ___sys_sendmsg+0xf3/0x170 [ 2449.805834] ? sendmsg_copy_msghdr+0x160/0x160 [ 2449.806435] ? __fget_files+0x2cf/0x520 [ 2449.806961] ? lock_downgrade+0x6d0/0x6d0 [ 2449.807518] ? find_held_lock+0x2c/0x110 [ 2449.808058] ? __fget_files+0x2f8/0x520 [ 2449.808594] ? __fget_light+0xea/0x290 [ 2449.809106] __sys_sendmsg+0xe5/0x1b0 [ 2449.809659] ? __sys_sendmsg_sock+0x40/0x40 [ 2449.810316] ? rcu_read_lock_any_held+0x75/0xa0 [ 2449.811043] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2449.811856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2449.812639] ? trace_hardirqs_on+0x5b/0x180 [ 2449.813295] do_syscall_64+0x33/0x40 [ 2449.813852] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2449.814530] RIP: 0033:0x7f3f9ec55b19 [ 2449.815016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2449.817410] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2449.818473] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2449.819401] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2449.820332] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2449.821261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2449.822236] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:52:40 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x381}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:40 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:40 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb9", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:52:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 72) 09:52:40 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 70) 09:52:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x8e03, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:40 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1e5, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2449.853976] FAULT_INJECTION: forcing a failure. [ 2449.853976] name failslab, interval 1, probability 0, space 0, times 0 [ 2449.855572] CPU: 0 PID: 11249 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2449.856539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2449.857770] Call Trace: [ 2449.858152] dump_stack+0x107/0x167 [ 2449.858664] should_fail.cold+0x5/0xa [ 2449.859200] ? ___slab_alloc+0x360/0x700 [ 2449.859767] ? create_object.isra.0+0x3a/0xa20 [ 2449.860408] should_failslab+0x5/0x20 [ 2449.860937] kmem_cache_alloc+0x5b/0x310 [ 2449.861553] create_object.isra.0+0x3a/0xa20 [ 2449.862200] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2449.862920] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2449.863624] ? skb_segment+0x9d8/0x3aa0 [ 2449.864187] __alloc_skb+0xb1/0x5b0 [ 2449.864701] skb_segment+0x9d8/0x3aa0 [ 2449.865247] ? __lock_acquire+0xbb1/0x5b00 [ 2449.865894] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2449.866630] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.867357] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.867934] __udp_gso_segment+0x11c6/0x1830 [ 2449.868547] ? __sk_receive_skb+0x830/0x830 [ 2449.869168] udp4_ufo_fragment+0x528/0x720 [ 2449.869835] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2449.870540] inet_gso_segment+0x4fb/0x11a0 [ 2449.871140] skb_mac_gso_segment+0x273/0x570 [ 2449.871755] ? inet_sock_destruct+0x840/0x840 [ 2449.872378] ? skb_network_protocol+0x650/0x650 [ 2449.873020] ? skb_crc32c_csum_help+0x80/0x80 [ 2449.873726] ? lock_acquire+0x197/0x470 [ 2449.874286] ? __dev_queue_xmit+0x1c6/0x2690 [ 2449.874910] __skb_gso_segment+0x32d/0x6d0 [ 2449.875498] ? mark_lock+0xf5/0x2df0 [ 2449.876021] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2449.876747] ? lock_chain_count+0x20/0x20 [ 2449.877322] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2449.878013] __dev_queue_xmit+0x825/0x2690 [ 2449.878616] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2449.879331] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2449.879982] ? mark_held_locks+0x9e/0xe0 [ 2449.880586] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2449.881320] neigh_connected_output+0x382/0x4d0 [ 2449.882013] ip_finish_output2+0x6f1/0x21f0 [ 2449.882666] ? nf_hook_slow+0xfc/0x1e0 [ 2449.883214] ? ip_frag_next+0x9e0/0x9e0 [ 2449.883773] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2449.884485] __ip_finish_output.part.0+0x5f3/0xb50 [ 2449.885181] ? ip_fragment.constprop.0+0x240/0x240 [ 2449.885941] ? netif_rx_ni+0xe7/0x300 [ 2449.886489] ip_mc_output+0x401/0xa30 [ 2449.887025] ip_send_skb+0xdd/0x260 [ 2449.887541] udp_send_skb+0x6da/0x11d0 [ 2449.888096] udp_sendmsg+0x139a/0x2160 [ 2449.888643] ? mark_lock+0xf5/0x2df0 [ 2449.889162] ? ip_frag_init+0x350/0x350 [ 2449.889776] ? lock_chain_count+0x20/0x20 [ 2449.890369] ? udp_setsockopt+0xc0/0xc0 [ 2449.890928] ? mark_lock+0xf5/0x2df0 [ 2449.891457] ? lock_acquire+0x197/0x470 [ 2449.892015] ? lock_chain_count+0x20/0x20 [ 2449.892598] ? mark_lock+0xf5/0x2df0 [ 2449.893118] ? mark_lock+0xf5/0x2df0 [ 2449.893692] ? lock_chain_count+0x20/0x20 [ 2449.894267] ? __lock_acquire+0xbb1/0x5b00 [ 2449.894870] ? lock_chain_count+0x20/0x20 [ 2449.895473] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.896215] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.896810] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2449.897397] ? udp_v6_push_pending_frames+0x360/0x360 [ 2449.898174] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.898753] ? mark_lock+0xf5/0x2df0 [ 2449.899285] ? lock_acquire+0x197/0x470 [ 2449.899842] ? find_held_lock+0x2c/0x110 [ 2449.900419] ? __might_fault+0xd3/0x180 [ 2449.900975] ? lock_downgrade+0x6d0/0x6d0 [ 2449.901535] ? lock_downgrade+0x6d0/0x6d0 [ 2449.902135] ? sock_has_perm+0x1ea/0x280 [ 2449.902710] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2449.903437] ? _copy_from_user+0xfb/0x1b0 [ 2449.904032] ? __import_iovec+0x458/0x590 09:52:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x3e8}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2449.904615] ? udp_v6_push_pending_frames+0x360/0x360 [ 2449.906463] inet6_sendmsg+0x105/0x140 [ 2449.907555] ? inet6_compat_ioctl+0x320/0x320 [ 2449.908916] __sock_sendmsg+0xf2/0x190 [ 2449.910201] ____sys_sendmsg+0x70d/0x870 [ 2449.911322] ? sock_write_iter+0x3d0/0x3d0 [ 2449.912521] ? do_recvmmsg+0x6d0/0x6d0 [ 2449.913641] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.915080] ? lock_downgrade+0x6d0/0x6d0 [ 2449.916485] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2449.918011] ? SOFTIRQ_verbose+0x10/0x10 [ 2449.919175] ___sys_sendmsg+0xf3/0x170 [ 2449.920421] ? sendmsg_copy_msghdr+0x160/0x160 [ 2449.921759] ? __fget_files+0x2cf/0x520 [ 2449.923063] ? lock_downgrade+0x6d0/0x6d0 [ 2449.924456] ? find_held_lock+0x2c/0x110 [ 2449.925725] ? __fget_files+0x2f8/0x520 [ 2449.926894] ? __fget_light+0xea/0x290 [ 2449.928033] __sys_sendmsg+0xe5/0x1b0 [ 2449.929064] ? __sys_sendmsg_sock+0x40/0x40 [ 2449.930474] ? rcu_read_lock_any_held+0x75/0xa0 [ 2449.931822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2449.933346] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2449.935048] ? trace_hardirqs_on+0x5b/0x180 [ 2449.936308] do_syscall_64+0x33/0x40 [ 2449.937377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2449.939194] RIP: 0033:0x7f251a6f7b19 [ 2449.940287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2449.946709] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2449.948846] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2449.951235] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2449.953345] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2449.955800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2449.957985] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:52:41 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:41 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 71) 09:52:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xb005, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 73) [ 2450.105280] FAULT_INJECTION: forcing a failure. [ 2450.105280] name failslab, interval 1, probability 0, space 0, times 0 [ 2450.108669] CPU: 1 PID: 11271 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2450.110907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2450.113337] Call Trace: [ 2450.114231] dump_stack+0x107/0x167 [ 2450.115276] should_fail.cold+0x5/0xa [ 2450.116387] should_failslab+0x5/0x20 [ 2450.117507] __kmalloc_node_track_caller+0x74/0x3b0 [ 2450.119261] ? skb_segment+0x9d8/0x3aa0 [ 2450.120446] __alloc_skb+0xb1/0x5b0 [ 2450.121569] skb_segment+0x9d8/0x3aa0 [ 2450.122884] ? __lock_acquire+0xbb1/0x5b00 [ 2450.124102] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2450.125537] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.127359] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.128549] __udp_gso_segment+0x11c6/0x1830 [ 2450.129847] ? __sk_receive_skb+0x830/0x830 [ 2450.131103] udp4_ufo_fragment+0x528/0x720 [ 2450.132288] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2450.133669] inet_gso_segment+0x4fb/0x11a0 [ 2450.135083] skb_mac_gso_segment+0x273/0x570 [ 2450.136309] ? inet_sock_destruct+0x840/0x840 [ 2450.137582] ? skb_network_protocol+0x650/0x650 [ 2450.138874] ? skb_crc32c_csum_help+0x80/0x80 [ 2450.140130] ? lock_acquire+0x197/0x470 [ 2450.141246] ? __dev_queue_xmit+0x1c6/0x2690 [ 2450.142010] __skb_gso_segment+0x32d/0x6d0 [ 2450.142576] ? mark_lock+0xf5/0x2df0 [ 2450.143100] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2450.143817] ? lock_chain_count+0x20/0x20 [ 2450.144369] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2450.145008] __dev_queue_xmit+0x825/0x2690 [ 2450.145643] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2450.147150] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2450.148453] ? mark_held_locks+0x9e/0xe0 [ 2450.149628] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2450.151148] neigh_connected_output+0x382/0x4d0 [ 2450.152442] ip_finish_output2+0x6f1/0x21f0 [ 2450.153695] ? ip_frag_next+0x9e0/0x9e0 [ 2450.154870] ? skb_gso_validate_network_len+0x13/0x290 [ 2450.156365] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2450.157845] __ip_finish_output.part.0+0x5f3/0xb50 [ 2450.159237] ? ip_fragment.constprop.0+0x240/0x240 [ 2450.160639] ? netif_rx_ni+0xe7/0x300 [ 2450.161754] ip_mc_output+0x401/0xa30 [ 2450.162873] ip_send_skb+0xdd/0x260 [ 2450.163956] udp_send_skb+0x6da/0x11d0 [ 2450.165100] udp_sendmsg+0x139a/0x2160 [ 2450.166356] ? mark_lock+0xf5/0x2df0 [ 2450.167414] ? ip_frag_init+0x350/0x350 [ 2450.168557] ? lock_chain_count+0x20/0x20 [ 2450.169796] ? udp_setsockopt+0xc0/0xc0 [ 2450.170944] ? mark_lock+0xf5/0x2df0 [ 2450.172034] ? lock_acquire+0x197/0x470 [ 2450.173196] ? lock_chain_count+0x20/0x20 [ 2450.174584] ? mark_lock+0xf5/0x2df0 [ 2450.175658] ? mark_lock+0xf5/0x2df0 [ 2450.176714] ? lock_chain_count+0x20/0x20 [ 2450.177999] ? __lock_acquire+0xbb1/0x5b00 [ 2450.179245] ? lock_chain_count+0x20/0x20 [ 2450.180459] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.182090] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.183181] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2450.184310] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.185345] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.185943] ? mark_lock+0xf5/0x2df0 [ 2450.186487] ? lock_acquire+0x197/0x470 [ 2450.187058] ? find_held_lock+0x2c/0x110 [ 2450.187635] ? __might_fault+0xd3/0x180 [ 2450.188198] ? lock_downgrade+0x6d0/0x6d0 [ 2450.188795] ? lock_downgrade+0x6d0/0x6d0 [ 2450.189388] ? sock_has_perm+0x1ea/0x280 [ 2450.189977] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2450.190717] ? _copy_from_user+0xfb/0x1b0 [ 2450.191301] ? __import_iovec+0x458/0x590 [ 2450.193766] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.195540] inet6_sendmsg+0x105/0x140 [ 2450.196893] ? inet6_compat_ioctl+0x320/0x320 [ 2450.197942] __sock_sendmsg+0xf2/0x190 [ 2450.199172] ____sys_sendmsg+0x70d/0x870 [ 2450.199935] ? sock_write_iter+0x3d0/0x3d0 [ 2450.201138] ? do_recvmmsg+0x6d0/0x6d0 [ 2450.201752] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.203264] ? lock_downgrade+0x6d0/0x6d0 [ 2450.203894] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.205323] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.206073] ___sys_sendmsg+0xf3/0x170 [ 2450.207298] ? sendmsg_copy_msghdr+0x160/0x160 [ 2450.208017] ? __fget_files+0x2cf/0x520 [ 2450.209065] ? lock_downgrade+0x6d0/0x6d0 [ 2450.210199] ? find_held_lock+0x2c/0x110 [ 2450.211526] ? __fget_files+0x2f8/0x520 [ 2450.213040] ? __fget_light+0xea/0x290 [ 2450.213778] __sys_sendmsg+0xe5/0x1b0 [ 2450.214905] ? __sys_sendmsg_sock+0x40/0x40 [ 2450.216214] ? rcu_read_lock_any_held+0x75/0xa0 [ 2450.216980] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2450.218453] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2450.219221] ? trace_hardirqs_on+0x5b/0x180 [ 2450.220560] do_syscall_64+0x33/0x40 [ 2450.221175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2450.222841] RIP: 0033:0x7f3f9ec55b19 [ 2450.223408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2450.229095] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2450.230293] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2450.231388] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2450.232510] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2450.233666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2450.234711] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2450.281017] FAULT_INJECTION: forcing a failure. [ 2450.281017] name failslab, interval 1, probability 0, space 0, times 0 [ 2450.282731] CPU: 1 PID: 11281 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2450.283763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2450.284984] Call Trace: [ 2450.285384] dump_stack+0x107/0x167 [ 2450.285961] should_fail.cold+0x5/0xa [ 2450.286541] ? trace_hardirqs_on+0x5b/0x180 [ 2450.287176] ? __alloc_skb+0x6d/0x5b0 [ 2450.287743] should_failslab+0x5/0x20 [ 2450.288295] kmem_cache_alloc_node+0x55/0x330 [ 2450.288961] __alloc_skb+0x6d/0x5b0 [ 2450.289526] skb_segment+0x9d8/0x3aa0 [ 2450.290102] ? __lock_acquire+0xbb1/0x5b00 [ 2450.290764] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2450.291519] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.292282] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.292896] __udp_gso_segment+0x11c6/0x1830 [ 2450.293563] ? __sk_receive_skb+0x830/0x830 [ 2450.294211] udp4_ufo_fragment+0x528/0x720 [ 2450.294824] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2450.295539] inet_gso_segment+0x4fb/0x11a0 [ 2450.296162] skb_mac_gso_segment+0x273/0x570 [ 2450.296799] ? inet_sock_destruct+0x840/0x840 [ 2450.297453] ? skb_network_protocol+0x650/0x650 [ 2450.298131] ? skb_crc32c_csum_help+0x80/0x80 [ 2450.298793] ? lock_acquire+0x197/0x470 [ 2450.299379] ? __dev_queue_xmit+0x1c6/0x2690 [ 2450.300011] __skb_gso_segment+0x32d/0x6d0 [ 2450.300631] ? mark_lock+0xf5/0x2df0 [ 2450.301172] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2450.301934] ? lock_chain_count+0x20/0x20 [ 2450.302546] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2450.303975] __dev_queue_xmit+0x825/0x2690 [ 2450.304620] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2450.306270] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2450.306971] ? mark_held_locks+0x9e/0xe0 [ 2450.308266] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2450.309071] neigh_connected_output+0x382/0x4d0 [ 2450.310610] ip_finish_output2+0x6f1/0x21f0 [ 2450.311271] ? nf_hook_slow+0xfc/0x1e0 [ 2450.312511] ? ip_frag_next+0x9e0/0x9e0 [ 2450.313125] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2450.314786] __ip_finish_output.part.0+0x5f3/0xb50 [ 2450.315529] ? ip_fragment.constprop.0+0x240/0x240 [ 2450.317140] ? netif_rx_ni+0xe7/0x300 [ 2450.317738] ip_mc_output+0x401/0xa30 [ 2450.318980] ip_send_skb+0xdd/0x260 [ 2450.319553] udp_send_skb+0x6da/0x11d0 [ 2450.320828] udp_sendmsg+0x139a/0x2160 [ 2450.321433] ? lock_acquire+0x197/0x470 [ 2450.322764] ? ip_frag_init+0x350/0x350 [ 2450.324053] ? mark_lock+0xf5/0x2df0 [ 2450.324626] ? lock_chain_count+0x20/0x20 [ 2450.326005] ? udp_setsockopt+0xc0/0xc0 [ 2450.327302] ? lock_chain_count+0x20/0x20 [ 2450.327938] ? mark_lock+0xf5/0x2df0 [ 2450.329141] ? mark_lock+0xf5/0x2df0 [ 2450.329717] ? lock_chain_count+0x20/0x20 [ 2450.331102] ? lock_chain_count+0x20/0x20 [ 2450.332461] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.333252] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2450.334571] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.335346] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.336701] ? mark_lock+0xf5/0x2df0 [ 2450.337272] ? lock_acquire+0x197/0x470 [ 2450.338572] ? find_held_lock+0x2c/0x110 [ 2450.339211] ? __might_fault+0xd3/0x180 [ 2450.340512] ? lock_downgrade+0x6d0/0x6d0 [ 2450.341150] ? lock_downgrade+0x6d0/0x6d0 [ 2450.342512] ? sock_has_perm+0x1ea/0x280 [ 2450.343133] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2450.344818] ? _copy_from_user+0xfb/0x1b0 [ 2450.345473] ? __import_iovec+0x458/0x590 [ 2450.346853] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.347632] inet6_sendmsg+0x105/0x140 [ 2450.348900] ? inet6_compat_ioctl+0x320/0x320 [ 2450.349597] __sock_sendmsg+0xf2/0x190 [ 2450.350867] ____sys_sendmsg+0x70d/0x870 [ 2450.351494] ? sock_write_iter+0x3d0/0x3d0 [ 2450.352886] ? do_recvmmsg+0x6d0/0x6d0 [ 2450.353485] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.354807] ? lock_downgrade+0x6d0/0x6d0 [ 2450.355448] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.357209] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.357839] ___sys_sendmsg+0xf3/0x170 [ 2450.359153] ? sendmsg_copy_msghdr+0x160/0x160 [ 2450.359853] ? __fget_files+0x2cf/0x520 [ 2450.361174] ? lock_downgrade+0x6d0/0x6d0 [ 2450.361825] ? find_held_lock+0x2c/0x110 [ 2450.363178] ? __fget_files+0x2f8/0x520 [ 2450.363798] ? __fget_light+0xea/0x290 [ 2450.365104] __sys_sendmsg+0xe5/0x1b0 [ 2450.365693] ? __sys_sendmsg_sock+0x40/0x40 [ 2450.367070] ? rcu_read_lock_any_held+0x75/0xa0 [ 2450.367802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2450.369517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2450.370285] ? trace_hardirqs_on+0x5b/0x180 [ 2450.371621] do_syscall_64+0x33/0x40 [ 2450.372187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2450.373799] RIP: 0033:0x7f251a6f7b19 [ 2450.374370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2450.380361] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2450.381528] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2450.382599] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2450.383680] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2450.385966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2450.388293] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:52:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x700}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:41 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:41 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2b6, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:41 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 72) 09:52:41 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2450.510201] FAULT_INJECTION: forcing a failure. [ 2450.510201] name failslab, interval 1, probability 0, space 0, times 0 [ 2450.514597] CPU: 0 PID: 11289 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2450.516981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2450.519919] Call Trace: [ 2450.520849] dump_stack+0x107/0x167 [ 2450.522136] should_fail.cold+0x5/0xa [ 2450.523588] ? create_object.isra.0+0x3a/0xa20 [ 2450.525250] should_failslab+0x5/0x20 [ 2450.526614] kmem_cache_alloc+0x5b/0x310 [ 2450.528041] create_object.isra.0+0x3a/0xa20 [ 2450.529589] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2450.531374] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2450.533203] ? skb_segment+0x9d8/0x3aa0 [ 2450.534678] __alloc_skb+0xb1/0x5b0 [ 2450.536093] skb_segment+0x9d8/0x3aa0 [ 2450.537436] ? __lock_acquire+0xbb1/0x5b00 [ 2450.539018] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2450.540871] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.542713] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.544179] __udp_gso_segment+0x11c6/0x1830 [ 2450.545742] ? __sk_receive_skb+0x830/0x830 [ 2450.547340] udp4_ufo_fragment+0x528/0x720 [ 2450.548886] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2450.550750] inet_gso_segment+0x4fb/0x11a0 [ 2450.552385] skb_mac_gso_segment+0x273/0x570 [ 2450.553973] ? inet_sock_destruct+0x840/0x840 [ 2450.555690] ? skb_network_protocol+0x650/0x650 [ 2450.557474] ? skb_crc32c_csum_help+0x80/0x80 [ 2450.559119] ? lock_acquire+0x197/0x470 [ 2450.560507] ? __dev_queue_xmit+0x1c6/0x2690 [ 2450.562107] __skb_gso_segment+0x32d/0x6d0 [ 2450.563675] ? mark_lock+0xf5/0x2df0 [ 2450.565020] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2450.566928] ? lock_chain_count+0x20/0x20 [ 2450.568372] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2450.570015] __dev_queue_xmit+0x825/0x2690 [ 2450.571623] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2450.573473] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2450.575164] ? mark_held_locks+0x9e/0xe0 [ 2450.576707] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2450.578719] neigh_connected_output+0x382/0x4d0 [ 2450.580510] ip_finish_output2+0x6f1/0x21f0 [ 2450.582112] ? nf_hook_slow+0xfc/0x1e0 [ 2450.583563] ? ip_frag_next+0x9e0/0x9e0 [ 2450.585091] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2450.587013] __ip_finish_output.part.0+0x5f3/0xb50 [ 2450.588872] ? ip_fragment.constprop.0+0x240/0x240 [ 2450.590722] ? netif_rx_ni+0xe7/0x300 [ 2450.592182] ip_mc_output+0x401/0xa30 [ 2450.593684] ip_send_skb+0xdd/0x260 [ 2450.595063] udp_send_skb+0x6da/0x11d0 [ 2450.596598] udp_sendmsg+0x139a/0x2160 [ 2450.598109] ? mark_lock+0xf5/0x2df0 [ 2450.599521] ? ip_frag_init+0x350/0x350 [ 2450.601054] ? lock_chain_count+0x20/0x20 [ 2450.602661] ? udp_setsockopt+0xc0/0xc0 [ 2450.604205] ? mark_lock+0xf5/0x2df0 [ 2450.605653] ? lock_acquire+0x197/0x470 [ 2450.607278] ? lock_chain_count+0x20/0x20 [ 2450.608889] ? mark_lock+0xf5/0x2df0 [ 2450.610334] ? mark_lock+0xf5/0x2df0 [ 2450.611763] ? lock_chain_count+0x20/0x20 [ 2450.613338] ? __lock_acquire+0xbb1/0x5b00 [ 2450.614973] ? lock_chain_count+0x20/0x20 [ 2450.616602] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.618628] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.620197] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2450.621787] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.623757] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.625341] ? mark_lock+0xf5/0x2df0 [ 2450.626807] ? lock_acquire+0x197/0x470 [ 2450.628349] ? find_held_lock+0x2c/0x110 [ 2450.629853] ? __might_fault+0xd3/0x180 [ 2450.631389] ? lock_downgrade+0x6d0/0x6d0 [ 2450.632984] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2450.635065] ? trace_hardirqs_on+0x5b/0x180 [ 2450.636638] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2450.638719] ? sock_has_perm+0x1ea/0x280 [ 2450.640302] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2450.642363] ? _copy_from_user+0xfb/0x1b0 [ 2450.644038] ? __import_iovec+0x458/0x590 [ 2450.645649] ? udp_v6_push_pending_frames+0x360/0x360 [ 2450.647625] inet6_sendmsg+0x105/0x140 [ 2450.649111] ? inet6_compat_ioctl+0x320/0x320 [ 2450.650797] __sock_sendmsg+0xf2/0x190 [ 2450.652256] ____sys_sendmsg+0x70d/0x870 [ 2450.653804] ? sock_write_iter+0x3d0/0x3d0 [ 2450.655382] ? do_recvmmsg+0x6d0/0x6d0 [ 2450.656874] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.658588] ? lock_downgrade+0x6d0/0x6d0 [ 2450.660207] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2450.662289] ? SOFTIRQ_verbose+0x10/0x10 [ 2450.663889] ___sys_sendmsg+0xf3/0x170 [ 2450.665388] ? sendmsg_copy_msghdr+0x160/0x160 [ 2450.667221] ? __fget_files+0x2cf/0x520 [ 2450.668782] ? lock_downgrade+0x6d0/0x6d0 [ 2450.670285] ? find_held_lock+0x2c/0x110 [ 2450.671808] ? __fget_files+0x2f8/0x520 [ 2450.673272] ? __fget_light+0xea/0x290 [ 2450.674769] __sys_sendmsg+0xe5/0x1b0 [ 2450.676207] ? __sys_sendmsg_sock+0x40/0x40 [ 2450.677830] ? rcu_read_lock_any_held+0x75/0xa0 [ 2450.679542] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2450.681533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2450.683476] ? trace_hardirqs_on+0x5b/0x180 [ 2450.685028] do_syscall_64+0x33/0x40 [ 2450.686509] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2450.688320] RIP: 0033:0x7f3f9ec55b19 [ 2450.689717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2450.696133] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2450.697443] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2450.699138] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2450.700397] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2450.703169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2450.705831] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2450.731441] blktrace: Concurrent blktraces are not allowed on loop14 [ 2466.171762] FAULT_INJECTION: forcing a failure. [ 2466.171762] name failslab, interval 1, probability 0, space 0, times 0 [ 2466.173256] CPU: 1 PID: 11312 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2466.178163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2466.182355] Call Trace: [ 2466.182692] dump_stack+0x107/0x167 [ 2466.183134] should_fail.cold+0x5/0xa [ 2466.183598] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2466.184223] ? create_object.isra.0+0x3a/0xa20 [ 2466.184778] should_failslab+0x5/0x20 [ 2466.185237] kmem_cache_alloc+0x5b/0x310 [ 2466.185729] ? mark_held_locks+0x9e/0xe0 [ 2466.194243] create_object.isra.0+0x3a/0xa20 [ 2466.194775] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2466.195395] kmem_cache_alloc_node+0x169/0x330 09:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xc405, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:57 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:52:57 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2c5, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:57 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:52:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb9", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:52:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0xa7f}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:52:57 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 73) 09:52:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 74) [ 2466.195960] __alloc_skb+0x6d/0x5b0 [ 2466.202387] skb_segment+0x9d8/0x3aa0 [ 2466.202876] ? __lock_acquire+0xbb1/0x5b00 [ 2466.203427] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2466.204042] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.204688] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.205190] __udp_gso_segment+0x11c6/0x1830 [ 2466.205735] ? __sk_receive_skb+0x830/0x830 [ 2466.214352] udp4_ufo_fragment+0x528/0x720 [ 2466.214881] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2466.215491] inet_gso_segment+0x4fb/0x11a0 [ 2466.216030] skb_mac_gso_segment+0x273/0x570 [ 2466.216572] ? inet_sock_destruct+0x840/0x840 [ 2466.217123] ? skb_network_protocol+0x650/0x650 [ 2466.217696] ? skb_crc32c_csum_help+0x80/0x80 [ 2466.218262] ? lock_acquire+0x197/0x470 [ 2466.218749] ? __dev_queue_xmit+0x1c6/0x2690 [ 2466.219291] __skb_gso_segment+0x32d/0x6d0 [ 2466.219818] ? mark_lock+0xf5/0x2df0 [ 2466.220281] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2466.220927] ? lock_chain_count+0x20/0x20 [ 2466.221432] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2466.222002] __dev_queue_xmit+0x825/0x2690 [ 2466.222542] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2466.223175] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2466.223749] ? mark_held_locks+0x9e/0xe0 [ 2466.224253] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2466.224904] neigh_connected_output+0x382/0x4d0 [ 2466.225488] ip_finish_output2+0x6f1/0x21f0 [ 2466.226029] ? nf_hook_slow+0xfc/0x1e0 [ 2466.226542] ? ip_frag_next+0x9e0/0x9e0 [ 2466.227038] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2466.227656] __ip_finish_output.part.0+0x5f3/0xb50 [ 2466.228272] ? ip_fragment.constprop.0+0x240/0x240 [ 2466.228878] ? netif_rx_ni+0xe7/0x300 [ 2466.229353] ip_mc_output+0x401/0xa30 [ 2466.229829] ip_send_skb+0xdd/0x260 [ 2466.230298] udp_send_skb+0x6da/0x11d0 [ 2466.230793] udp_sendmsg+0x139a/0x2160 [ 2466.231273] ? mark_lock+0xf5/0x2df0 [ 2466.231736] ? ip_frag_init+0x350/0x350 [ 2466.232224] ? lock_chain_count+0x20/0x20 [ 2466.232741] ? udp_setsockopt+0xc0/0xc0 [ 2466.233232] ? mark_lock+0xf5/0x2df0 [ 2466.233693] ? lock_acquire+0x197/0x470 [ 2466.234203] ? lock_chain_count+0x20/0x20 [ 2466.234715] ? mark_lock+0xf5/0x2df0 [ 2466.235182] ? mark_lock+0xf5/0x2df0 [ 2466.235641] ? lock_chain_count+0x20/0x20 [ 2466.236151] ? __lock_acquire+0xbb1/0x5b00 [ 2466.236676] ? lock_chain_count+0x20/0x20 [ 2466.237194] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.237841] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.238369] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2466.238884] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.239510] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.240021] ? mark_lock+0xf5/0x2df0 [ 2466.240486] ? lock_acquire+0x197/0x470 [ 2466.240974] ? find_held_lock+0x2c/0x110 [ 2466.241477] ? __might_fault+0xd3/0x180 [ 2466.241972] ? lock_downgrade+0x6d0/0x6d0 [ 2466.245522] ? lock_downgrade+0x6d0/0x6d0 [ 2466.246041] ? sock_has_perm+0x1ea/0x280 [ 2466.246550] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2466.247225] ? _copy_from_user+0xfb/0x1b0 [ 2466.247774] ? __import_iovec+0x458/0x590 [ 2466.248304] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.248947] inet6_sendmsg+0x105/0x140 [ 2466.249429] ? inet6_compat_ioctl+0x320/0x320 [ 2466.249980] __sock_sendmsg+0xf2/0x190 [ 2466.250474] ____sys_sendmsg+0x70d/0x870 [ 2466.250982] ? sock_write_iter+0x3d0/0x3d0 [ 2466.251502] ? do_recvmmsg+0x6d0/0x6d0 [ 2466.251984] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.252478] ? lock_downgrade+0x6d0/0x6d0 [ 2466.252999] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.253642] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.254158] ___sys_sendmsg+0xf3/0x170 [ 2466.254642] ? sendmsg_copy_msghdr+0x160/0x160 [ 2466.255219] ? __fget_files+0x2cf/0x520 [ 2466.255729] ? lock_downgrade+0x6d0/0x6d0 [ 2466.256237] ? find_held_lock+0x2c/0x110 [ 2466.256742] ? __fget_files+0x2f8/0x520 [ 2466.257246] ? __fget_light+0xea/0x290 [ 2466.257734] __sys_sendmsg+0xe5/0x1b0 [ 2466.258477] ? __sys_sendmsg_sock+0x40/0x40 [ 2466.259014] ? rcu_read_lock_any_held+0x75/0xa0 [ 2466.259808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2466.263565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2466.264351] ? trace_hardirqs_on+0x5b/0x180 [ 2466.264964] do_syscall_64+0x33/0x40 [ 2466.265686] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2466.266547] RIP: 0033:0x7f251a6f7b19 [ 2466.267077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2466.270062] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2466.271307] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2466.272490] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2466.273902] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2466.275232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2466.280283] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xc805, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:52:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0xdfe}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2466.335952] FAULT_INJECTION: forcing a failure. [ 2466.335952] name failslab, interval 1, probability 0, space 0, times 0 [ 2466.337576] CPU: 0 PID: 11305 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2466.342545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2466.343699] Call Trace: [ 2466.344087] dump_stack+0x107/0x167 [ 2466.344606] should_fail.cold+0x5/0xa [ 2466.345151] ? trace_hardirqs_on+0x5b/0x180 [ 2466.345756] ? __alloc_skb+0x6d/0x5b0 [ 2466.346329] should_failslab+0x5/0x20 [ 2466.346870] kmem_cache_alloc_node+0x55/0x330 [ 2466.347505] __alloc_skb+0x6d/0x5b0 [ 2466.348034] skb_segment+0x9d8/0x3aa0 [ 2466.348575] ? __lock_acquire+0xbb1/0x5b00 [ 2466.349209] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2466.349912] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.350676] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.351256] __udp_gso_segment+0x11c6/0x1830 [ 2466.351870] ? __sk_receive_skb+0x830/0x830 [ 2466.352508] udp4_ufo_fragment+0x528/0x720 [ 2466.353119] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2466.353819] inet_gso_segment+0x4fb/0x11a0 [ 2466.354456] skb_mac_gso_segment+0x273/0x570 [ 2466.355077] ? inet_sock_destruct+0x840/0x840 [ 2466.355703] ? skb_network_protocol+0x650/0x650 [ 2466.356362] ? skb_crc32c_csum_help+0x80/0x80 [ 2466.356998] ? lock_acquire+0x197/0x470 [ 2466.357554] ? __dev_queue_xmit+0x1c6/0x2690 [ 2466.358193] __skb_gso_segment+0x32d/0x6d0 [ 2466.358789] ? mark_lock+0xf5/0x2df0 [ 2466.359328] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2466.360067] ? lock_chain_count+0x20/0x20 [ 2466.360647] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2466.361300] __dev_queue_xmit+0x825/0x2690 [ 2466.361907] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2466.362650] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2466.363309] ? mark_held_locks+0x9e/0xe0 [ 2466.363889] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2466.364610] neigh_connected_output+0x382/0x4d0 [ 2466.365242] ip_finish_output2+0x6f1/0x21f0 [ 2466.365860] ? nf_hook_slow+0xfc/0x1e0 [ 2466.366440] ? ip_frag_next+0x9e0/0x9e0 [ 2466.366996] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2466.367728] __ip_finish_output.part.0+0x5f3/0xb50 [ 2466.368415] ? ip_fragment.constprop.0+0x240/0x240 [ 2466.369119] ? netif_rx_ni+0xe7/0x300 [ 2466.369666] ip_mc_output+0x401/0xa30 [ 2466.370254] ip_send_skb+0xdd/0x260 [ 2466.370775] udp_send_skb+0x6da/0x11d0 [ 2466.371359] udp_sendmsg+0x139a/0x2160 [ 2466.371908] ? mark_lock+0xf5/0x2df0 [ 2466.372448] ? ip_frag_init+0x350/0x350 [ 2466.373014] ? lock_chain_count+0x20/0x20 [ 2466.373614] ? udp_setsockopt+0xc0/0xc0 [ 2466.374193] ? mark_lock+0xf5/0x2df0 [ 2466.374733] ? __lock_acquire+0x1657/0x5b00 [ 2466.375363] ? lock_chain_count+0x20/0x20 [ 2466.375960] ? mark_lock+0xf5/0x2df0 [ 2466.376496] ? mark_lock+0xf5/0x2df0 [ 2466.377032] ? lock_chain_count+0x20/0x20 [ 2466.377625] ? __lock_acquire+0xbb1/0x5b00 [ 2466.378251] ? lock_chain_count+0x20/0x20 [ 2466.378859] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.379603] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.380208] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2466.380801] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.381606] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.382234] ? mark_lock+0xf5/0x2df0 [ 2466.382786] ? lock_acquire+0x197/0x470 [ 2466.383360] ? find_held_lock+0x2c/0x110 [ 2466.383949] ? __might_fault+0xd3/0x180 [ 2466.384530] ? lock_downgrade+0x6d0/0x6d0 [ 2466.385132] ? lock_downgrade+0x6d0/0x6d0 [ 2466.385734] ? sock_has_perm+0x1ea/0x280 [ 2466.386348] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2466.387103] ? _copy_from_user+0xfb/0x1b0 [ 2466.387729] ? __import_iovec+0x458/0x590 [ 2466.388327] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.389096] inet6_sendmsg+0x105/0x140 [ 2466.389663] ? inet6_compat_ioctl+0x320/0x320 [ 2466.390350] __sock_sendmsg+0xf2/0x190 [ 2466.390923] ____sys_sendmsg+0x70d/0x870 [ 2466.391521] ? sock_write_iter+0x3d0/0x3d0 [ 2466.392141] ? do_recvmmsg+0x6d0/0x6d0 [ 2466.392702] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.393305] ? lock_downgrade+0x6d0/0x6d0 [ 2466.393906] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.394700] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.395303] ___sys_sendmsg+0xf3/0x170 [ 2466.395881] ? sendmsg_copy_msghdr+0x160/0x160 [ 2466.396556] ? __fget_files+0x2cf/0x520 [ 2466.397134] ? lock_downgrade+0x6d0/0x6d0 [ 2466.397756] ? find_held_lock+0x2c/0x110 [ 2466.398375] ? __fget_files+0x2f8/0x520 [ 2466.398979] ? __fget_light+0xea/0x290 [ 2466.399549] __sys_sendmsg+0xe5/0x1b0 [ 2466.400117] ? __sys_sendmsg_sock+0x40/0x40 [ 2466.400737] ? rcu_read_lock_any_held+0x75/0xa0 [ 2466.401435] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2466.402244] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2466.402981] ? trace_hardirqs_on+0x5b/0x180 [ 2466.403614] do_syscall_64+0x33/0x40 [ 2466.404165] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2466.404881] RIP: 0033:0x7f3f9ec55b19 [ 2466.405404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2466.407985] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2466.409074] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2466.410095] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2466.411114] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2466.412123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2466.413133] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:52:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 75) 09:52:57 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2466.524739] FAULT_INJECTION: forcing a failure. [ 2466.524739] name failslab, interval 1, probability 0, space 0, times 0 [ 2466.542521] CPU: 0 PID: 11335 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2466.547006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2466.548199] Call Trace: [ 2466.548601] dump_stack+0x107/0x167 [ 2466.549112] should_fail.cold+0x5/0xa [ 2466.549693] should_failslab+0x5/0x20 [ 2466.550271] __kmalloc_node_track_caller+0x74/0x3b0 [ 2466.550935] ? skb_segment+0x9d8/0x3aa0 [ 2466.551460] __alloc_skb+0xb1/0x5b0 [ 2466.551940] skb_segment+0x9d8/0x3aa0 [ 2466.552472] ? __lock_acquire+0xbb1/0x5b00 [ 2466.553060] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2466.553744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.554518] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.555092] __udp_gso_segment+0x11c6/0x1830 [ 2466.555727] ? __sk_receive_skb+0x830/0x830 [ 2466.556332] udp4_ufo_fragment+0x528/0x720 [ 2466.556922] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2466.557614] inet_gso_segment+0x4fb/0x11a0 [ 2466.558237] skb_mac_gso_segment+0x273/0x570 [ 2466.558848] ? inet_sock_destruct+0x840/0x840 [ 2466.559472] ? skb_network_protocol+0x650/0x650 [ 2466.560107] ? skb_crc32c_csum_help+0x80/0x80 [ 2466.560726] ? lock_acquire+0x197/0x470 [ 2466.561274] ? __dev_queue_xmit+0x1c6/0x2690 [ 2466.561886] __skb_gso_segment+0x32d/0x6d0 [ 2466.562494] ? mark_lock+0xf5/0x2df0 [ 2466.563013] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2466.563737] ? lock_chain_count+0x20/0x20 [ 2466.564308] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2466.564940] __dev_queue_xmit+0x825/0x2690 [ 2466.565534] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2466.566266] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2466.566908] ? mark_held_locks+0x9e/0xe0 [ 2466.567476] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2466.568203] neigh_connected_output+0x382/0x4d0 [ 2466.568908] ip_finish_output2+0x6f1/0x21f0 [ 2466.569516] ? nf_hook_slow+0xfc/0x1e0 [ 2466.570056] ? ip_frag_next+0x9e0/0x9e0 [ 2466.570634] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2466.571335] __ip_finish_output.part.0+0x5f3/0xb50 [ 2466.572014] ? ip_fragment.constprop.0+0x240/0x240 [ 2466.572693] ? netif_rx_ni+0xe7/0x300 [ 2466.573226] ip_mc_output+0x401/0xa30 [ 2466.573762] ip_send_skb+0xdd/0x260 [ 2466.574298] udp_send_skb+0x6da/0x11d0 [ 2466.574848] udp_sendmsg+0x139a/0x2160 [ 2466.575385] ? mark_lock+0xf5/0x2df0 [ 2466.575901] ? ip_frag_init+0x350/0x350 [ 2466.576452] ? lock_chain_count+0x20/0x20 [ 2466.577029] ? udp_setsockopt+0xc0/0xc0 [ 2466.577577] ? mark_lock+0xf5/0x2df0 [ 2466.578109] ? lock_acquire+0x197/0x470 [ 2466.578652] ? lock_chain_count+0x20/0x20 [ 2466.579194] ? mark_lock+0xf5/0x2df0 [ 2466.579682] ? mark_lock+0xf5/0x2df0 [ 2466.580167] ? lock_chain_count+0x20/0x20 [ 2466.580706] ? __lock_acquire+0xbb1/0x5b00 [ 2466.581259] ? lock_chain_count+0x20/0x20 [ 2466.581809] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.582549] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.583125] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2466.583706] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.584415] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.584980] ? mark_lock+0xf5/0x2df0 [ 2466.585508] ? lock_acquire+0x197/0x470 [ 2466.586057] ? find_held_lock+0x2c/0x110 [ 2466.586650] ? __might_fault+0xd3/0x180 [ 2466.587199] ? lock_downgrade+0x6d0/0x6d0 [ 2466.587776] ? lock_downgrade+0x6d0/0x6d0 [ 2466.588352] ? sock_has_perm+0x1ea/0x280 [ 2466.588913] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2466.589631] ? _copy_from_user+0xfb/0x1b0 [ 2466.590246] ? __import_iovec+0x458/0x590 [ 2466.590822] ? udp_v6_push_pending_frames+0x360/0x360 [ 2466.591539] inet6_sendmsg+0x105/0x140 [ 2466.592078] ? inet6_compat_ioctl+0x320/0x320 [ 2466.592697] __sock_sendmsg+0xf2/0x190 [ 2466.593237] ____sys_sendmsg+0x70d/0x870 [ 2466.593804] ? sock_write_iter+0x3d0/0x3d0 [ 2466.594415] ? do_recvmmsg+0x6d0/0x6d0 [ 2466.594958] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.595518] ? lock_downgrade+0x6d0/0x6d0 [ 2466.596092] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.596813] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.597387] ___sys_sendmsg+0xf3/0x170 [ 2466.597929] ? sendmsg_copy_msghdr+0x160/0x160 [ 2466.598589] ? __fget_files+0x2cf/0x520 [ 2466.599136] ? lock_downgrade+0x6d0/0x6d0 [ 2466.599709] ? find_held_lock+0x2c/0x110 [ 2466.600286] ? __fget_files+0x2f8/0x520 [ 2466.600849] ? __fget_light+0xea/0x290 [ 2466.601399] __sys_sendmsg+0xe5/0x1b0 [ 2466.601927] ? __sys_sendmsg_sock+0x40/0x40 [ 2466.602538] ? rcu_read_lock_any_held+0x75/0xa0 [ 2466.603160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2466.603844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2466.604514] ? trace_hardirqs_on+0x5b/0x180 [ 2466.605078] do_syscall_64+0x33/0x40 [ 2466.605566] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2466.606295] RIP: 0033:0x7f251a6f7b19 [ 2466.606811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2466.609319] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2466.610389] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2466.611366] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2466.612347] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2466.613325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2466.614326] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:53:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x117d}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:12 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:53:12 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x600, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 76) 09:53:12 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 74) 09:53:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xd205, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2481.669971] FAULT_INJECTION: forcing a failure. [ 2481.669971] name failslab, interval 1, probability 0, space 0, times 0 09:53:12 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2481.672624] CPU: 1 PID: 11350 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2481.673544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.678906] Call Trace: [ 2481.679260] dump_stack+0x107/0x167 [ 2481.679733] should_fail.cold+0x5/0xa [ 2481.680224] ? create_object.isra.0+0x3a/0xa20 [ 2481.680816] should_failslab+0x5/0x20 [ 2481.681305] kmem_cache_alloc+0x5b/0x310 [ 2481.681837] create_object.isra.0+0x3a/0xa20 [ 2481.682405] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2481.683122] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2481.683770] ? skb_segment+0x9d8/0x3aa0 [ 2481.684298] __alloc_skb+0xb1/0x5b0 [ 2481.684791] skb_segment+0x9d8/0x3aa0 [ 2481.685296] ? __lock_acquire+0xbb1/0x5b00 [ 2481.685874] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2481.686526] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.687229] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.687759] __udp_gso_segment+0x11c6/0x1830 [ 2481.688331] ? __sk_receive_skb+0x830/0x830 [ 2481.688893] udp4_ufo_fragment+0x528/0x720 [ 2481.689448] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2481.690088] inet_gso_segment+0x4fb/0x11a0 [ 2481.690638] skb_mac_gso_segment+0x273/0x570 [ 2481.691769] ? inet_sock_destruct+0x840/0x840 [ 2481.692316] ? skb_network_protocol+0x650/0x650 [ 2481.692882] ? skb_crc32c_csum_help+0x80/0x80 [ 2481.693429] ? lock_acquire+0x197/0x470 [ 2481.693916] ? __dev_queue_xmit+0x1c6/0x2690 [ 2481.694457] __skb_gso_segment+0x32d/0x6d0 [ 2481.697496] ? mark_lock+0xf5/0x2df0 [ 2481.697955] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2481.698592] ? lock_chain_count+0x20/0x20 [ 2481.699115] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2481.699687] __dev_queue_xmit+0x825/0x2690 [ 2481.700210] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2481.700853] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2481.701419] ? mark_held_locks+0x9e/0xe0 [ 2481.701923] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2481.702573] neigh_connected_output+0x382/0x4d0 [ 2481.709224] ip_finish_output2+0x6f1/0x21f0 [ 2481.709760] ? nf_hook_slow+0xfc/0x1e0 [ 2481.710238] ? ip_frag_next+0x9e0/0x9e0 [ 2481.710759] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2481.711376] __ip_finish_output.part.0+0x5f3/0xb50 [ 2481.711984] ? ip_fragment.constprop.0+0x240/0x240 [ 2481.712588] ? netif_rx_ni+0xe7/0x300 [ 2481.713058] ip_mc_output+0x401/0xa30 [ 2481.713535] ip_send_skb+0xdd/0x260 [ 2481.713984] udp_send_skb+0x6da/0x11d0 [ 2481.714482] udp_sendmsg+0x139a/0x2160 [ 2481.716314] ? mark_lock+0xf5/0x2df0 [ 2481.716781] ? ip_frag_init+0x350/0x350 [ 2481.717270] ? lock_chain_count+0x20/0x20 [ 2481.717785] ? udp_setsockopt+0xc0/0xc0 [ 2481.718264] ? mark_lock+0xf5/0x2df0 [ 2481.718746] ? lock_acquire+0x197/0x470 [ 2481.719235] ? lock_chain_count+0x20/0x20 [ 2481.719744] ? mark_lock+0xf5/0x2df0 [ 2481.720199] ? mark_lock+0xf5/0x2df0 [ 2481.720657] ? lock_chain_count+0x20/0x20 [ 2481.721164] ? __lock_acquire+0xbb1/0x5b00 [ 2481.721688] ? lock_chain_count+0x20/0x20 [ 2481.722205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.722870] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.723381] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2481.723895] ? udp_v6_push_pending_frames+0x360/0x360 [ 2481.724528] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.725029] ? mark_lock+0xf5/0x2df0 [ 2481.725494] ? lock_acquire+0x197/0x470 [ 2481.725979] ? find_held_lock+0x2c/0x110 [ 2481.726491] ? __might_fault+0xd3/0x180 [ 2481.726999] ? lock_downgrade+0x6d0/0x6d0 [ 2481.727515] ? lock_downgrade+0x6d0/0x6d0 [ 2481.728024] ? sock_has_perm+0x1ea/0x280 [ 2481.728529] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2481.729164] ? _copy_from_user+0xfb/0x1b0 [ 2481.729689] ? __import_iovec+0x458/0x590 [ 2481.730197] ? udp_v6_push_pending_frames+0x360/0x360 [ 2481.730859] inet6_sendmsg+0x105/0x140 [ 2481.731337] ? inet6_compat_ioctl+0x320/0x320 [ 2481.731894] __sock_sendmsg+0xf2/0x190 [ 2481.732372] ____sys_sendmsg+0x70d/0x870 [ 2481.732880] ? sock_write_iter+0x3d0/0x3d0 [ 2481.733401] ? do_recvmmsg+0x6d0/0x6d0 [ 2481.733887] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.734382] ? lock_downgrade+0x6d0/0x6d0 [ 2481.734919] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.735565] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.736065] ___sys_sendmsg+0xf3/0x170 [ 2481.736557] ? sendmsg_copy_msghdr+0x160/0x160 [ 2481.737120] ? __fget_files+0x2cf/0x520 [ 2481.737616] ? lock_downgrade+0x6d0/0x6d0 [ 2481.738139] ? find_held_lock+0x2c/0x110 [ 2481.738663] ? __fget_files+0x2f8/0x520 [ 2481.739163] ? __fget_light+0xea/0x290 [ 2481.739660] __sys_sendmsg+0xe5/0x1b0 [ 2481.740128] ? __sys_sendmsg_sock+0x40/0x40 [ 2481.740664] ? rcu_read_lock_any_held+0x75/0xa0 [ 2481.741247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.741898] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.742541] ? trace_hardirqs_on+0x5b/0x180 [ 2481.743091] do_syscall_64+0x33/0x40 [ 2481.743555] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2481.744182] RIP: 0033:0x7f251a6f7b19 [ 2481.744647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.746912] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2481.747850] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2481.748726] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2481.749602] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.750476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.751364] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:53:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x14fc}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xe803, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2481.809223] FAULT_INJECTION: forcing a failure. [ 2481.809223] name failslab, interval 1, probability 0, space 0, times 0 [ 2481.811909] CPU: 1 PID: 11353 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2481.813031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.815596] Call Trace: [ 2481.816374] dump_stack+0x107/0x167 [ 2481.817441] should_fail.cold+0x5/0xa [ 2481.818591] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2481.820335] ? create_object.isra.0+0x3a/0xa20 [ 2481.821824] should_failslab+0x5/0x20 [ 2481.823064] kmem_cache_alloc+0x5b/0x310 [ 2481.824370] ? mark_held_locks+0x9e/0xe0 [ 2481.825752] create_object.isra.0+0x3a/0xa20 [ 2481.827175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2481.828823] kmem_cache_alloc_node+0x169/0x330 [ 2481.830311] __alloc_skb+0x6d/0x5b0 [ 2481.831521] skb_segment+0x9d8/0x3aa0 [ 2481.832831] ? __lock_acquire+0xbb1/0x5b00 [ 2481.834232] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2481.835975] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.837725] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.839101] __udp_gso_segment+0x11c6/0x1830 [ 2481.840620] ? __sk_receive_skb+0x830/0x830 [ 2481.842081] udp4_ufo_fragment+0x528/0x720 [ 2481.843475] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2481.845153] inet_gso_segment+0x4fb/0x11a0 [ 2481.846577] skb_mac_gso_segment+0x273/0x570 [ 2481.848023] ? inet_sock_destruct+0x840/0x840 [ 2481.849479] ? skb_network_protocol+0x650/0x650 [ 2481.850994] ? skb_crc32c_csum_help+0x80/0x80 [ 2481.852474] ? lock_acquire+0x197/0x470 [ 2481.853821] ? __dev_queue_xmit+0x1c6/0x2690 [ 2481.855260] __skb_gso_segment+0x32d/0x6d0 [ 2481.856729] ? mark_lock+0xf5/0x2df0 [ 2481.857937] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2481.859648] ? lock_chain_count+0x20/0x20 [ 2481.860998] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2481.862513] __dev_queue_xmit+0x825/0x2690 [ 2481.863897] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2481.865573] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2481.867073] ? mark_held_locks+0x9e/0xe0 [ 2481.868394] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2481.870167] neigh_connected_output+0x382/0x4d0 [ 2481.871098] ip_finish_output2+0x6f1/0x21f0 [ 2481.871670] ? nf_hook_slow+0xfc/0x1e0 [ 2481.872162] ? ip_frag_next+0x9e0/0x9e0 [ 2481.872688] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2481.873303] __ip_finish_output.part.0+0x5f3/0xb50 [ 2481.873911] ? ip_fragment.constprop.0+0x240/0x240 [ 2481.874520] ? netif_rx_ni+0xe7/0x300 [ 2481.875013] ip_mc_output+0x401/0xa30 [ 2481.875490] ip_send_skb+0xdd/0x260 [ 2481.875940] udp_send_skb+0x6da/0x11d0 [ 2481.876426] udp_sendmsg+0x139a/0x2160 [ 2481.876906] ? mark_lock+0xf5/0x2df0 [ 2481.877362] ? ip_frag_init+0x350/0x350 [ 2481.877904] ? lock_chain_count+0x20/0x20 [ 2481.878420] ? udp_setsockopt+0xc0/0xc0 [ 2481.880701] ? mark_lock+0xf5/0x2df0 [ 2481.881157] ? lock_acquire+0x197/0x470 [ 2481.882867] ? lock_chain_count+0x20/0x20 [ 2481.883379] ? mark_lock+0xf5/0x2df0 [ 2481.883869] ? mark_lock+0xf5/0x2df0 [ 2481.884325] ? lock_chain_count+0x20/0x20 [ 2481.884834] ? __lock_acquire+0xbb1/0x5b00 [ 2481.885351] ? lock_chain_count+0x20/0x20 [ 2481.885884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.886547] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.888916] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2481.889430] ? udp_v6_push_pending_frames+0x360/0x360 [ 2481.890090] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.890611] ? mark_lock+0xf5/0x2df0 [ 2481.891122] ? lock_acquire+0x197/0x470 [ 2481.891647] ? find_held_lock+0x2c/0x110 [ 2481.892148] ? __might_fault+0xd3/0x180 [ 2481.892638] ? lock_downgrade+0x6d0/0x6d0 [ 2481.895867] ? lock_downgrade+0x6d0/0x6d0 [ 2481.896407] ? sock_has_perm+0x1ea/0x280 [ 2481.896919] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2481.897560] ? _copy_from_user+0xfb/0x1b0 [ 2481.898074] ? __import_iovec+0x458/0x590 [ 2481.898586] ? udp_v6_push_pending_frames+0x360/0x360 [ 2481.899243] inet6_sendmsg+0x105/0x140 [ 2481.899756] ? inet6_compat_ioctl+0x320/0x320 [ 2481.900303] __sock_sendmsg+0xf2/0x190 [ 2481.900788] ____sys_sendmsg+0x70d/0x870 [ 2481.901287] ? sock_write_iter+0x3d0/0x3d0 [ 2481.901852] ? do_recvmmsg+0x6d0/0x6d0 [ 2481.902334] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.906111] ? lock_downgrade+0x6d0/0x6d0 [ 2481.906654] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.907326] ? SOFTIRQ_verbose+0x10/0x10 [ 2481.907866] ___sys_sendmsg+0xf3/0x170 [ 2481.908343] ? sendmsg_copy_msghdr+0x160/0x160 [ 2481.908912] ? __fget_files+0x2cf/0x520 [ 2481.909397] ? lock_downgrade+0x6d0/0x6d0 [ 2481.909910] ? find_held_lock+0x2c/0x110 [ 2481.910414] ? __fget_files+0x2f8/0x520 [ 2481.913122] ? __fget_light+0xea/0x290 [ 2481.913623] __sys_sendmsg+0xe5/0x1b0 [ 2481.914093] ? __sys_sendmsg_sock+0x40/0x40 [ 2481.914626] ? rcu_read_lock_any_held+0x75/0xa0 [ 2481.915219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.915877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.916513] ? trace_hardirqs_on+0x5b/0x180 [ 2481.917042] do_syscall_64+0x33/0x40 [ 2481.917502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2481.918125] RIP: 0033:0x7f3f9ec55b19 [ 2481.918585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.923752] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2481.924689] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2481.925571] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2481.926444] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.927964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.928868] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:53:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:53:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 77) 09:53:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x187b}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2482.060851] FAULT_INJECTION: forcing a failure. [ 2482.060851] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.062334] CPU: 1 PID: 11381 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2482.063251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.064267] Call Trace: [ 2482.064596] dump_stack+0x107/0x167 [ 2482.065097] should_fail.cold+0x5/0xa [ 2482.065584] ? create_object.isra.0+0x3a/0xa20 [ 2482.066201] should_failslab+0x5/0x20 [ 2482.066739] kmem_cache_alloc+0x5b/0x310 [ 2482.067311] create_object.isra.0+0x3a/0xa20 [ 2482.067893] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2482.068555] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2482.069245] ? skb_segment+0x9d8/0x3aa0 [ 2482.069742] __alloc_skb+0xb1/0x5b0 [ 2482.070221] skb_segment+0x9d8/0x3aa0 [ 2482.070710] ? __lock_acquire+0xbb1/0x5b00 [ 2482.071261] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2482.071874] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.072526] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.073058] __udp_gso_segment+0x11c6/0x1830 [ 2482.073618] ? __sk_receive_skb+0x830/0x830 [ 2482.074222] udp4_ufo_fragment+0x528/0x720 [ 2482.074797] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2482.075458] inet_gso_segment+0x4fb/0x11a0 [ 2482.075988] skb_mac_gso_segment+0x273/0x570 [ 2482.076524] ? inet_sock_destruct+0x840/0x840 [ 2482.077069] ? skb_network_protocol+0x650/0x650 [ 2482.077633] ? skb_crc32c_csum_help+0x80/0x80 [ 2482.078180] ? lock_acquire+0x197/0x470 [ 2482.078689] ? __dev_queue_xmit+0x1c6/0x2690 [ 2482.079261] __skb_gso_segment+0x32d/0x6d0 [ 2482.079800] ? mark_lock+0xf5/0x2df0 [ 2482.080326] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2482.081004] ? lock_chain_count+0x20/0x20 [ 2482.081507] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2482.082065] __dev_queue_xmit+0x825/0x2690 [ 2482.082585] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2482.083287] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2482.083896] ? mark_held_locks+0x9e/0xe0 [ 2482.084428] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2482.085103] neigh_connected_output+0x382/0x4d0 [ 2482.085707] ip_finish_output2+0x6f1/0x21f0 [ 2482.086259] ? nf_hook_slow+0xfc/0x1e0 [ 2482.086753] ? ip_frag_next+0x9e0/0x9e0 [ 2482.087258] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2482.087908] __ip_finish_output.part.0+0x5f3/0xb50 [ 2482.088537] ? ip_fragment.constprop.0+0x240/0x240 [ 2482.089211] ? netif_rx_ni+0xe7/0x300 [ 2482.089712] ip_mc_output+0x401/0xa30 [ 2482.090189] ip_send_skb+0xdd/0x260 [ 2482.090651] udp_send_skb+0x6da/0x11d0 [ 2482.091173] udp_sendmsg+0x139a/0x2160 [ 2482.091669] ? mark_lock+0xf5/0x2df0 [ 2482.092149] ? ip_frag_init+0x350/0x350 [ 2482.092663] ? lock_chain_count+0x20/0x20 [ 2482.093182] ? udp_setsockopt+0xc0/0xc0 [ 2482.093666] ? mark_lock+0xf5/0x2df0 [ 2482.094123] ? lock_acquire+0x197/0x470 [ 2482.094651] ? lock_chain_count+0x20/0x20 [ 2482.095195] ? mark_lock+0xf5/0x2df0 [ 2482.095677] ? mark_lock+0xf5/0x2df0 [ 2482.096202] ? lock_chain_count+0x20/0x20 [ 2482.096735] ? __lock_acquire+0xbb1/0x5b00 [ 2482.097259] ? lock_chain_count+0x20/0x20 [ 2482.097778] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.098465] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.099015] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2482.099525] ? udp_v6_push_pending_frames+0x360/0x360 [ 2482.100206] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.100713] ? mark_lock+0xf5/0x2df0 [ 2482.101203] ? lock_acquire+0x197/0x470 [ 2482.101690] ? find_held_lock+0x2c/0x110 [ 2482.102196] ? __might_fault+0xd3/0x180 [ 2482.102710] ? lock_downgrade+0x6d0/0x6d0 [ 2482.103250] ? lock_downgrade+0x6d0/0x6d0 [ 2482.103782] ? sock_has_perm+0x1ea/0x280 [ 2482.104301] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2482.104964] ? _copy_from_user+0xfb/0x1b0 [ 2482.105510] ? __import_iovec+0x458/0x590 [ 2482.106046] ? udp_v6_push_pending_frames+0x360/0x360 [ 2482.106722] inet6_sendmsg+0x105/0x140 [ 2482.107268] ? inet6_compat_ioctl+0x320/0x320 [ 2482.107841] __sock_sendmsg+0xf2/0x190 [ 2482.108390] ____sys_sendmsg+0x70d/0x870 [ 2482.108925] ? sock_write_iter+0x3d0/0x3d0 [ 2482.109487] ? do_recvmmsg+0x6d0/0x6d0 [ 2482.109998] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.110534] ? lock_downgrade+0x6d0/0x6d0 [ 2482.111476] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.112770] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.113771] ___sys_sendmsg+0xf3/0x170 [ 2482.114807] ? sendmsg_copy_msghdr+0x160/0x160 [ 2482.116053] ? __fget_files+0x2cf/0x520 [ 2482.117093] ? lock_downgrade+0x6d0/0x6d0 [ 2482.118159] ? find_held_lock+0x2c/0x110 [ 2482.119166] ? __fget_files+0x2f8/0x520 [ 2482.120133] ? __fget_light+0xea/0x290 [ 2482.121107] __sys_sendmsg+0xe5/0x1b0 [ 2482.122082] ? __sys_sendmsg_sock+0x40/0x40 [ 2482.123288] ? rcu_read_lock_any_held+0x75/0xa0 [ 2482.124562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.125921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.127316] ? trace_hardirqs_on+0x5b/0x180 [ 2482.128384] do_syscall_64+0x33/0x40 [ 2482.129331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2482.130761] RIP: 0033:0x7f251a6f7b19 [ 2482.131741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.136758] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2482.138713] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2482.139620] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2482.140507] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.141442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.142363] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xf401, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1bfa}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:13 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 75) [ 2482.273794] FAULT_INJECTION: forcing a failure. [ 2482.273794] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.276951] CPU: 1 PID: 11394 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2482.278775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.280906] Call Trace: [ 2482.281642] dump_stack+0x107/0x167 [ 2482.282626] should_fail.cold+0x5/0xa [ 2482.283748] should_failslab+0x5/0x20 [ 2482.284707] __kmalloc_node_track_caller+0x74/0x3b0 [ 2482.285919] ? skb_segment+0x9d8/0x3aa0 [ 2482.287028] __alloc_skb+0xb1/0x5b0 [ 2482.288002] skb_segment+0x9d8/0x3aa0 [ 2482.288989] ? __lock_acquire+0xbb1/0x5b00 [ 2482.290129] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2482.291488] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.292891] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.293978] __udp_gso_segment+0x11c6/0x1830 [ 2482.295269] ? __sk_receive_skb+0x830/0x830 [ 2482.296348] udp4_ufo_fragment+0x528/0x720 [ 2482.297379] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2482.298596] inet_gso_segment+0x4fb/0x11a0 [ 2482.299936] skb_mac_gso_segment+0x273/0x570 [ 2482.301097] ? inet_sock_destruct+0x840/0x840 [ 2482.302237] ? skb_network_protocol+0x650/0x650 [ 2482.303547] ? skb_crc32c_csum_help+0x80/0x80 [ 2482.304737] ? lock_acquire+0x197/0x470 [ 2482.305758] ? __dev_queue_xmit+0x1c6/0x2690 [ 2482.306901] __skb_gso_segment+0x32d/0x6d0 [ 2482.307959] ? mark_lock+0xf5/0x2df0 [ 2482.308873] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2482.310179] ? lock_chain_count+0x20/0x20 [ 2482.311432] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2482.312610] __dev_queue_xmit+0x825/0x2690 [ 2482.313730] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2482.314910] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2482.315504] ? mark_held_locks+0x9e/0xe0 [ 2482.316004] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2482.316648] neigh_connected_output+0x382/0x4d0 [ 2482.317225] ip_finish_output2+0x6f1/0x21f0 [ 2482.317758] ? nf_hook_slow+0xfc/0x1e0 [ 2482.318234] ? ip_frag_next+0x9e0/0x9e0 [ 2482.318796] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2482.319474] __ip_finish_output.part.0+0x5f3/0xb50 [ 2482.320104] ? ip_fragment.constprop.0+0x240/0x240 [ 2482.320733] ? netif_rx_ni+0xe7/0x300 [ 2482.321206] ip_mc_output+0x401/0xa30 [ 2482.321677] ip_send_skb+0xdd/0x260 [ 2482.322125] udp_send_skb+0x6da/0x11d0 [ 2482.322610] udp_sendmsg+0x139a/0x2160 [ 2482.323722] ? mark_lock+0xf5/0x2df0 [ 2482.324696] ? ip_frag_init+0x350/0x350 [ 2482.325730] ? lock_chain_count+0x20/0x20 [ 2482.326866] ? udp_setsockopt+0xc0/0xc0 [ 2482.327835] ? mark_lock+0xf5/0x2df0 [ 2482.328741] ? lock_acquire+0x197/0x470 [ 2482.329715] ? lock_chain_count+0x20/0x20 [ 2482.330780] ? mark_lock+0xf5/0x2df0 [ 2482.331738] ? mark_lock+0xf5/0x2df0 [ 2482.332691] ? lock_chain_count+0x20/0x20 [ 2482.333697] ? __lock_acquire+0xbb1/0x5b00 [ 2482.334704] ? lock_chain_count+0x20/0x20 [ 2482.335225] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.335866] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.336393] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2482.336933] ? udp_v6_push_pending_frames+0x360/0x360 [ 2482.337590] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.338115] ? mark_lock+0xf5/0x2df0 [ 2482.338597] ? lock_acquire+0x197/0x470 [ 2482.339134] ? find_held_lock+0x2c/0x110 [ 2482.339659] ? __might_fault+0xd3/0x180 [ 2482.340151] ? lock_downgrade+0x6d0/0x6d0 [ 2482.340668] ? lock_downgrade+0x6d0/0x6d0 [ 2482.341181] ? sock_has_perm+0x1ea/0x280 [ 2482.341680] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2482.342316] ? _copy_from_user+0xfb/0x1b0 [ 2482.342874] ? __import_iovec+0x458/0x590 [ 2482.343406] ? udp_v6_push_pending_frames+0x360/0x360 [ 2482.344059] inet6_sendmsg+0x105/0x140 [ 2482.344541] ? inet6_compat_ioctl+0x320/0x320 [ 2482.345087] __sock_sendmsg+0xf2/0x190 [ 2482.345565] ____sys_sendmsg+0x70d/0x870 [ 2482.346063] ? sock_write_iter+0x3d0/0x3d0 [ 2482.346579] ? do_recvmmsg+0x6d0/0x6d0 [ 2482.347076] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.347573] ? lock_downgrade+0x6d0/0x6d0 [ 2482.348080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.348719] ? SOFTIRQ_verbose+0x10/0x10 [ 2482.349241] ___sys_sendmsg+0xf3/0x170 [ 2482.349749] ? sendmsg_copy_msghdr+0x160/0x160 [ 2482.350336] ? __fget_files+0x2cf/0x520 [ 2482.350866] ? lock_downgrade+0x6d0/0x6d0 [ 2482.351396] ? find_held_lock+0x2c/0x110 [ 2482.351928] ? __fget_files+0x2f8/0x520 [ 2482.352442] ? __fget_light+0xea/0x290 [ 2482.352933] __sys_sendmsg+0xe5/0x1b0 [ 2482.353400] ? __sys_sendmsg_sock+0x40/0x40 [ 2482.353927] ? rcu_read_lock_any_held+0x75/0xa0 [ 2482.354511] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.355174] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.355810] ? trace_hardirqs_on+0x5b/0x180 [ 2482.356338] do_syscall_64+0x33/0x40 [ 2482.356796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2482.357425] RIP: 0033:0x7f3f9ec55b19 [ 2482.357881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.360184] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2482.361127] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2482.362020] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2482.362940] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.363886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.364820] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:53:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:53:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:53:27 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:27 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 76) 09:53:27 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1f79}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x1000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 78) [ 2496.850614] FAULT_INJECTION: forcing a failure. [ 2496.850614] name failslab, interval 1, probability 0, space 0, times 0 [ 2496.852920] CPU: 1 PID: 11416 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2496.853772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2496.854787] Call Trace: [ 2496.855118] dump_stack+0x107/0x167 [ 2496.860193] should_fail.cold+0x5/0xa [ 2496.861321] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2496.862867] ? create_object.isra.0+0x3a/0xa20 [ 2496.864220] should_failslab+0x5/0x20 [ 2496.865324] kmem_cache_alloc+0x5b/0x310 [ 2496.866500] ? mark_held_locks+0x9e/0xe0 [ 2496.867693] create_object.isra.0+0x3a/0xa20 [ 2496.868965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2496.870441] kmem_cache_alloc_node+0x169/0x330 [ 2496.871791] FAULT_INJECTION: forcing a failure. [ 2496.871791] name failslab, interval 1, probability 0, space 0, times 0 [ 2496.875021] __alloc_skb+0x6d/0x5b0 [ 2496.876094] skb_segment+0x9d8/0x3aa0 [ 2496.877197] ? __lock_acquire+0xbb1/0x5b00 [ 2496.878452] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2496.879914] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2496.881434] ? SOFTIRQ_verbose+0x10/0x10 [ 2496.882617] __udp_gso_segment+0x11c6/0x1830 [ 2496.883910] ? __sk_receive_skb+0x830/0x830 [ 2496.885157] udp4_ufo_fragment+0x528/0x720 [ 2496.886379] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2496.887856] inet_gso_segment+0x4fb/0x11a0 [ 2496.889080] skb_mac_gso_segment+0x273/0x570 [ 2496.890341] ? inet_sock_destruct+0x840/0x840 [ 2496.891649] ? skb_network_protocol+0x650/0x650 [ 2496.892984] ? skb_crc32c_csum_help+0x80/0x80 [ 2496.894274] ? lock_acquire+0x197/0x470 [ 2496.895430] ? __dev_queue_xmit+0x1c6/0x2690 [ 2496.896701] __skb_gso_segment+0x32d/0x6d0 [ 2496.897915] ? mark_lock+0xf5/0x2df0 [ 2496.898989] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2496.900519] ? lock_chain_count+0x20/0x20 [ 2496.901713] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2496.903027] __dev_queue_xmit+0x825/0x2690 [ 2496.904269] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2496.905759] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2496.907079] ? mark_held_locks+0x9e/0xe0 [ 2496.908288] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2496.909807] neigh_connected_output+0x382/0x4d0 [ 2496.911153] ip_finish_output2+0x6f1/0x21f0 [ 2496.912488] ? nf_hook_slow+0xfc/0x1e0 [ 2496.913679] ? ip_frag_next+0x9e0/0x9e0 [ 2496.914885] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2496.916407] __ip_finish_output.part.0+0x5f3/0xb50 [ 2496.917891] ? ip_fragment.constprop.0+0x240/0x240 [ 2496.919376] ? netif_rx_ni+0xe7/0x300 [ 2496.920476] ip_mc_output+0x401/0xa30 [ 2496.921589] ip_send_skb+0xdd/0x260 [ 2496.922639] udp_send_skb+0x6da/0x11d0 [ 2496.923798] udp_sendmsg+0x139a/0x2160 [ 2496.924923] ? mark_lock+0xf5/0x2df0 [ 2496.925999] ? ip_frag_init+0x350/0x350 [ 2496.927147] ? lock_chain_count+0x20/0x20 [ 2496.928358] ? mark_lock+0xf5/0x2df0 [ 2496.929433] ? udp_setsockopt+0xc0/0xc0 [ 2496.930586] ? __bad_area_nosemaphore+0xa1/0x310 [ 2496.931966] ? mark_lock+0xf5/0x2df0 [ 2496.933065] ? mark_lock+0xf5/0x2df0 [ 2496.934138] ? lock_chain_count+0x20/0x20 [ 2496.935350] ? lock_chain_count+0x20/0x20 [ 2496.936566] ? mark_lock+0xf5/0x2df0 [ 2496.937649] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2496.938837] ? udp_v6_push_pending_frames+0x360/0x360 [ 2496.940337] ? SOFTIRQ_verbose+0x10/0x10 [ 2496.941518] ? lock_acquire+0x197/0x470 [ 2496.942663] ? find_held_lock+0x2c/0x110 [ 2496.943847] ? __might_fault+0xd3/0x180 [ 2496.944983] ? lock_downgrade+0x6d0/0x6d0 [ 2496.946176] ? sock_has_perm+0x1ea/0x280 [ 2496.947352] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2496.948845] ? _copy_from_user+0xfb/0x1b0 [ 2496.950041] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2496.951563] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2496.953114] ? trace_hardirqs_on+0x5b/0x180 [ 2496.954353] ? udp_v6_push_pending_frames+0x360/0x360 [ 2496.955859] inet6_sendmsg+0x105/0x140 [ 2496.956976] ? inet6_compat_ioctl+0x320/0x320 [ 2496.958263] __sock_sendmsg+0xf2/0x190 [ 2496.959398] ____sys_sendmsg+0x70d/0x870 [ 2496.960571] ? sock_write_iter+0x3d0/0x3d0 [ 2496.961784] ? do_recvmmsg+0x6d0/0x6d0 [ 2496.962903] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2496.964473] ? trace_hardirqs_on+0x5b/0x180 [ 2496.965713] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2496.967287] ___sys_sendmsg+0xf3/0x170 [ 2496.968408] ? sendmsg_copy_msghdr+0x160/0x160 [ 2496.969723] ? lock_release+0x3b4/0x680 [ 2496.970866] ? __fget_files+0x2cf/0x520 [ 2496.972029] ? lock_downgrade+0x6d0/0x6d0 [ 2496.973224] ? clockevents_program_event+0x14b/0x360 [ 2496.974691] ? __fget_files+0x2f8/0x520 [ 2496.975851] ? __fget_light+0xea/0x290 [ 2496.976974] __sys_sendmsg+0xe5/0x1b0 [ 2496.978066] ? __sys_sendmsg_sock+0x40/0x40 [ 2496.979331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2496.980841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2496.982320] ? trace_hardirqs_on+0x5b/0x180 [ 2496.983582] do_syscall_64+0x33/0x40 [ 2496.984650] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2496.986128] RIP: 0033:0x7f251a6f7b19 [ 2496.987228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2496.992892] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2496.995212] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2496.997377] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2496.999556] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.001721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.003909] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2497.006112] CPU: 0 PID: 11419 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2497.007199] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.008417] Call Trace: [ 2497.008809] dump_stack+0x107/0x167 [ 2497.009346] should_fail.cold+0x5/0xa [ 2497.009909] ? create_object.isra.0+0x3a/0xa20 [ 2497.010583] should_failslab+0x5/0x20 [ 2497.011145] kmem_cache_alloc+0x5b/0x310 [ 2497.011760] create_object.isra.0+0x3a/0xa20 [ 2497.012406] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.013160] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2497.013913] ? skb_segment+0x9d8/0x3aa0 [ 2497.014503] __alloc_skb+0xb1/0x5b0 [ 2497.015696] skb_segment+0x9d8/0x3aa0 [ 2497.016292] ? __lock_acquire+0xbb1/0x5b00 [ 2497.016967] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2497.017736] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.018531] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.019162] __udp_gso_segment+0x11c6/0x1830 [ 2497.019859] ? __sk_receive_skb+0x830/0x830 [ 2497.020527] udp4_ufo_fragment+0x528/0x720 [ 2497.021173] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2497.021931] inet_gso_segment+0x4fb/0x11a0 [ 2497.022595] skb_mac_gso_segment+0x273/0x570 [ 2497.023278] ? inet_sock_destruct+0x840/0x840 [ 2497.023961] ? skb_network_protocol+0x650/0x650 [ 2497.024671] ? skb_crc32c_csum_help+0x80/0x80 [ 2497.025355] ? lock_acquire+0x197/0x470 [ 2497.025968] ? __dev_queue_xmit+0x1c6/0x2690 [ 2497.026642] __skb_gso_segment+0x32d/0x6d0 [ 2497.027303] ? mark_lock+0xf5/0x2df0 [ 2497.027875] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2497.028674] ? lock_chain_count+0x20/0x20 [ 2497.029307] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2497.029924] __dev_queue_xmit+0x825/0x2690 [ 2497.030484] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2497.031158] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2497.031785] ? mark_held_locks+0x9e/0xe0 [ 2497.032320] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2497.033013] neigh_connected_output+0x382/0x4d0 [ 2497.033643] ip_finish_output2+0x6f1/0x21f0 [ 2497.034206] ? nf_hook_slow+0xfc/0x1e0 [ 2497.034726] ? ip_frag_next+0x9e0/0x9e0 [ 2497.035251] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2497.035920] __ip_finish_output.part.0+0x5f3/0xb50 [ 2497.036567] ? ip_fragment.constprop.0+0x240/0x240 [ 2497.037204] ? netif_rx_ni+0xe7/0x300 [ 2497.037714] ip_mc_output+0x401/0xa30 [ 2497.038217] ip_send_skb+0xdd/0x260 [ 2497.038703] udp_send_skb+0x6da/0x11d0 [ 2497.039233] udp_sendmsg+0x139a/0x2160 [ 2497.039740] ? mark_lock+0xf5/0x2df0 [ 2497.040226] ? ip_frag_init+0x350/0x350 [ 2497.040750] ? lock_chain_count+0x20/0x20 [ 2497.041301] ? udp_setsockopt+0xc0/0xc0 [ 2497.041839] ? mark_lock+0xf5/0x2df0 [ 2497.042335] ? lock_acquire+0x197/0x470 [ 2497.042866] ? lock_chain_count+0x20/0x20 [ 2497.043720] ? mark_lock+0xf5/0x2df0 [ 2497.044642] ? mark_lock+0xf5/0x2df0 [ 2497.045549] ? lock_chain_count+0x20/0x20 [ 2497.046571] ? __lock_acquire+0xbb1/0x5b00 [ 2497.047442] ? lock_chain_count+0x20/0x20 [ 2497.048003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.048701] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.049242] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2497.049784] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.050473] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.059498] ? mark_lock+0xf5/0x2df0 [ 2497.060080] ? lock_acquire+0x197/0x470 [ 2497.060694] ? find_held_lock+0x2c/0x110 [ 2497.061326] ? __might_fault+0xd3/0x180 [ 2497.061941] ? lock_downgrade+0x6d0/0x6d0 [ 2497.062589] ? lock_downgrade+0x6d0/0x6d0 [ 2497.063277] ? sock_has_perm+0x1ea/0x280 [ 2497.063918] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2497.064718] ? _copy_from_user+0xfb/0x1b0 [ 2497.065373] ? __import_iovec+0x458/0x590 [ 2497.066017] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.066812] inet6_sendmsg+0x105/0x140 [ 2497.067451] ? inet6_compat_ioctl+0x320/0x320 [ 2497.068141] __sock_sendmsg+0xf2/0x190 [ 2497.068746] ____sys_sendmsg+0x70d/0x870 [ 2497.069379] ? sock_write_iter+0x3d0/0x3d0 [ 2497.070026] ? do_recvmmsg+0x6d0/0x6d0 [ 2497.070624] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.071280] ? lock_downgrade+0x6d0/0x6d0 [ 2497.071929] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.072746] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.073378] ___sys_sendmsg+0xf3/0x170 [ 2497.073955] ? sendmsg_copy_msghdr+0x160/0x160 [ 2497.074588] ? __fget_files+0x2cf/0x520 [ 2497.075138] ? lock_downgrade+0x6d0/0x6d0 [ 2497.075731] ? find_held_lock+0x2c/0x110 [ 2497.076301] ? __fget_files+0x2f8/0x520 [ 2497.076860] ? __fget_light+0xea/0x290 [ 2497.077410] __sys_sendmsg+0xe5/0x1b0 [ 2497.077932] ? __sys_sendmsg_sock+0x40/0x40 [ 2497.078525] ? rcu_read_lock_any_held+0x75/0xa0 [ 2497.079195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2497.079940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.080645] ? trace_hardirqs_on+0x5b/0x180 [ 2497.081240] do_syscall_64+0x33/0x40 [ 2497.081755] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2497.082452] RIP: 0033:0x7f3f9ec55b19 [ 2497.082974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.085746] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2497.086923] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2497.088028] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2497.089130] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.090226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.091351] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2497.118865] blktrace: Concurrent blktraces are not allowed on loop14 09:53:28 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 77) 09:53:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x2000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 79) [ 2497.253757] FAULT_INJECTION: forcing a failure. [ 2497.253757] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.255176] CPU: 1 PID: 11433 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2497.256056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.257063] Call Trace: [ 2497.257392] dump_stack+0x107/0x167 [ 2497.257840] should_fail.cold+0x5/0xa [ 2497.258307] ? trace_hardirqs_on+0x5b/0x180 [ 2497.258837] ? __alloc_skb+0x6d/0x5b0 [ 2497.259355] should_failslab+0x5/0x20 [ 2497.259825] kmem_cache_alloc_node+0x55/0x330 [ 2497.260375] __alloc_skb+0x6d/0x5b0 [ 2497.260828] skb_segment+0x9d8/0x3aa0 09:53:28 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2497.261299] ? __lock_acquire+0xbb1/0x5b00 [ 2497.271955] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2497.272642] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.273355] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.273919] __udp_gso_segment+0x11c6/0x1830 [ 2497.274517] ? __sk_receive_skb+0x830/0x830 [ 2497.275115] udp4_ufo_fragment+0x528/0x720 [ 2497.275719] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2497.276404] inet_gso_segment+0x4fb/0x11a0 [ 2497.276994] skb_mac_gso_segment+0x273/0x570 [ 2497.277598] ? inet_sock_destruct+0x840/0x840 [ 2497.278215] ? skb_network_protocol+0x650/0x650 [ 2497.278782] ? skb_crc32c_csum_help+0x80/0x80 [ 2497.279341] ? lock_acquire+0x197/0x470 [ 2497.279827] ? __dev_queue_xmit+0x1c6/0x2690 [ 2497.280374] __skb_gso_segment+0x32d/0x6d0 [ 2497.280892] ? mark_lock+0xf5/0x2df0 [ 2497.281353] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2497.281995] ? lock_chain_count+0x20/0x20 [ 2497.282505] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2497.283071] __dev_queue_xmit+0x825/0x2690 [ 2497.283620] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2497.284252] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2497.284821] ? mark_held_locks+0x9e/0xe0 [ 2497.285333] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2497.285991] neigh_connected_output+0x382/0x4d0 [ 2497.286574] ip_finish_output2+0x6f1/0x21f0 09:53:28 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb91, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2497.287108] ? nf_hook_slow+0xfc/0x1e0 [ 2497.287613] ? ip_frag_next+0x9e0/0x9e0 [ 2497.288108] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2497.288740] __ip_finish_output.part.0+0x5f3/0xb50 [ 2497.289359] ? ip_fragment.constprop.0+0x240/0x240 [ 2497.289960] ? netif_rx_ni+0xe7/0x300 [ 2497.290436] ip_mc_output+0x401/0xa30 [ 2497.295585] ip_send_skb+0xdd/0x260 [ 2497.296042] udp_send_skb+0x6da/0x11d0 [ 2497.296536] udp_sendmsg+0x139a/0x2160 [ 2497.296642] FAULT_INJECTION: forcing a failure. [ 2497.296642] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.297018] ? mark_lock+0xf5/0x2df0 [ 2497.299029] ? ip_frag_init+0x350/0x350 [ 2497.299547] ? lock_chain_count+0x20/0x20 [ 2497.300060] ? udp_setsockopt+0xc0/0xc0 [ 2497.300550] ? mark_lock+0xf5/0x2df0 [ 2497.301008] ? lock_acquire+0x197/0x470 [ 2497.301504] ? lock_chain_count+0x20/0x20 [ 2497.302015] ? mark_lock+0xf5/0x2df0 [ 2497.302477] ? mark_lock+0xf5/0x2df0 [ 2497.302938] ? lock_chain_count+0x20/0x20 [ 2497.303466] ? __lock_acquire+0xbb1/0x5b00 [ 2497.303991] ? lock_chain_count+0x20/0x20 [ 2497.304513] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.305154] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.305667] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2497.306178] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.306815] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.307346] ? mark_lock+0xf5/0x2df0 [ 2497.307813] ? lock_acquire+0x197/0x470 [ 2497.308296] ? find_held_lock+0x2c/0x110 [ 2497.308805] ? __might_fault+0xd3/0x180 [ 2497.309289] ? lock_downgrade+0x6d0/0x6d0 [ 2497.309804] ? lock_downgrade+0x6d0/0x6d0 [ 2497.310366] ? sock_has_perm+0x1ea/0x280 [ 2497.310870] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2497.311530] ? _copy_from_user+0xfb/0x1b0 [ 2497.312049] ? __import_iovec+0x458/0x590 [ 2497.312560] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.313194] inet6_sendmsg+0x105/0x140 [ 2497.313677] ? inet6_compat_ioctl+0x320/0x320 [ 2497.314224] __sock_sendmsg+0xf2/0x190 [ 2497.314708] ____sys_sendmsg+0x70d/0x870 [ 2497.315220] ? sock_write_iter+0x3d0/0x3d0 [ 2497.315750] ? do_recvmmsg+0x6d0/0x6d0 [ 2497.316230] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.316733] ? lock_downgrade+0x6d0/0x6d0 [ 2497.317242] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.317888] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.318388] ___sys_sendmsg+0xf3/0x170 [ 2497.318875] ? sendmsg_copy_msghdr+0x160/0x160 [ 2497.319458] ? __fget_files+0x2cf/0x520 [ 2497.319947] ? lock_downgrade+0x6d0/0x6d0 [ 2497.320457] ? find_held_lock+0x2c/0x110 [ 2497.320967] ? __fget_files+0x2f8/0x520 [ 2497.321463] ? __fget_light+0xea/0x290 [ 2497.321950] __sys_sendmsg+0xe5/0x1b0 [ 2497.322418] ? __sys_sendmsg_sock+0x40/0x40 [ 2497.322949] ? rcu_read_lock_any_held+0x75/0xa0 [ 2497.323568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2497.324208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.324842] ? trace_hardirqs_on+0x5b/0x180 [ 2497.325369] do_syscall_64+0x33/0x40 [ 2497.325831] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2497.326457] RIP: 0033:0x7f3f9ec55b19 [ 2497.326918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.329182] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2497.330118] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2497.330992] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2497.331934] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.332811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.333688] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2497.334594] CPU: 0 PID: 11438 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2497.335628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.336821] Call Trace: [ 2497.337266] dump_stack+0x107/0x167 [ 2497.337781] should_fail.cold+0x5/0xa [ 2497.338378] should_failslab+0x5/0x20 [ 2497.338906] __kmalloc_node_track_caller+0x74/0x3b0 [ 2497.345131] ? skb_segment+0x9d8/0x3aa0 [ 2497.346352] __alloc_skb+0xb1/0x5b0 [ 2497.349450] skb_segment+0x9d8/0x3aa0 [ 2497.350550] ? __lock_acquire+0xbb1/0x5b00 [ 2497.351587] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2497.352340] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.353058] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.353682] __udp_gso_segment+0x11c6/0x1830 [ 2497.354341] ? __sk_receive_skb+0x830/0x830 [ 2497.354944] udp4_ufo_fragment+0x528/0x720 [ 2497.355611] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2497.356376] inet_gso_segment+0x4fb/0x11a0 [ 2497.356969] skb_mac_gso_segment+0x273/0x570 [ 2497.357629] ? inet_sock_destruct+0x840/0x840 [ 2497.358298] ? skb_network_protocol+0x650/0x650 [ 2497.358931] ? skb_crc32c_csum_help+0x80/0x80 [ 2497.359617] ? lock_acquire+0x197/0x470 [ 2497.360152] ? __dev_queue_xmit+0x1c6/0x2690 [ 2497.360826] __skb_gso_segment+0x32d/0x6d0 [ 2497.361461] ? mark_lock+0xf5/0x2df0 [ 2497.361981] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2497.362746] ? lock_chain_count+0x20/0x20 [ 2497.363386] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2497.364014] __dev_queue_xmit+0x825/0x2690 [ 2497.364686] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2497.365355] ? trace_hardirqs_on+0x5b/0x180 [ 2497.365948] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2497.366735] ? neigh_connected_output+0x354/0x4d0 [ 2497.367468] ? neigh_connected_output+0x362/0x4d0 [ 2497.368141] neigh_connected_output+0x382/0x4d0 [ 2497.368866] ip_finish_output2+0x6f1/0x21f0 [ 2497.369511] ? nf_hook_slow+0xfc/0x1e0 [ 2497.370044] ? ip_frag_next+0x9e0/0x9e0 [ 2497.370645] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2497.375431] __ip_finish_output.part.0+0x5f3/0xb50 [ 2497.376115] ? ip_fragment.constprop.0+0x240/0x240 [ 2497.376838] ? netif_rx_ni+0xe7/0x300 [ 2497.377424] ip_mc_output+0x401/0xa30 [ 2497.377955] ip_send_skb+0xdd/0x260 [ 2497.378514] udp_send_skb+0x6da/0x11d0 [ 2497.379068] udp_sendmsg+0x139a/0x2160 [ 2497.379707] ? mark_lock+0xf5/0x2df0 [ 2497.380282] ? ip_frag_init+0x350/0x350 [ 2497.383474] ? lock_chain_count+0x20/0x20 [ 2497.384052] ? udp_setsockopt+0xc0/0xc0 [ 2497.384681] ? mark_lock+0xf5/0x2df0 [ 2497.385273] ? lock_acquire+0x197/0x470 [ 2497.385841] ? lock_chain_count+0x20/0x20 [ 2497.386512] ? mark_lock+0xf5/0x2df0 [ 2497.387027] ? mark_lock+0xf5/0x2df0 [ 2497.387616] ? lock_chain_count+0x20/0x20 [ 2497.388187] ? __lock_acquire+0xbb1/0x5b00 [ 2497.388833] ? lock_chain_count+0x20/0x20 [ 2497.389469] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.390257] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.390844] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2497.391495] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.392261] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.392835] ? mark_lock+0xf5/0x2df0 [ 2497.393416] ? lock_acquire+0x197/0x470 [ 2497.393969] ? find_held_lock+0x2c/0x110 [ 2497.394618] ? __might_fault+0xd3/0x180 [ 2497.395173] ? lock_downgrade+0x6d0/0x6d0 [ 2497.395828] ? lock_downgrade+0x6d0/0x6d0 [ 2497.396460] ? sock_has_perm+0x1ea/0x280 [ 2497.397019] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2497.397778] ? _copy_from_user+0xfb/0x1b0 [ 2497.398433] ? __import_iovec+0x458/0x590 [ 2497.399002] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.399789] inet6_sendmsg+0x105/0x140 [ 2497.400376] ? inet6_compat_ioctl+0x320/0x320 [ 2497.400984] __sock_sendmsg+0xf2/0x190 [ 2497.401577] ____sys_sendmsg+0x70d/0x870 [ 2497.402139] ? sock_write_iter+0x3d0/0x3d0 [ 2497.402812] ? do_recvmmsg+0x6d0/0x6d0 [ 2497.403421] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.403977] ? lock_downgrade+0x6d0/0x6d0 [ 2497.404605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.405380] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.405947] ___sys_sendmsg+0xf3/0x170 [ 2497.406564] ? sendmsg_copy_msghdr+0x160/0x160 [ 2497.407253] ? __fget_files+0x2cf/0x520 [ 2497.407820] ? lock_downgrade+0x6d0/0x6d0 [ 2497.408453] ? find_held_lock+0x2c/0x110 [ 2497.409013] ? __fget_files+0x2f8/0x520 [ 2497.409612] ? __fget_light+0xea/0x290 [ 2497.410155] __sys_sendmsg+0xe5/0x1b0 [ 2497.410754] ? __sys_sendmsg_sock+0x40/0x40 [ 2497.411432] ? rcu_read_lock_any_held+0x75/0xa0 [ 2497.412090] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2497.412879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.413645] ? trace_hardirqs_on+0x5b/0x180 [ 2497.414327] do_syscall_64+0x33/0x40 [ 2497.414854] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2497.415638] RIP: 0033:0x7f251a6f7b19 [ 2497.416157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.418856] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2497.419976] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2497.421004] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2497.422036] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.423090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.424139] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:53:28 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x22f8}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2497.509637] blktrace: Concurrent blktraces are not allowed on loop14 09:53:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:28 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:53:28 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 78) 09:53:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x2677}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 80) 09:53:28 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:28 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:53:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:28 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) [ 2497.695857] FAULT_INJECTION: forcing a failure. [ 2497.695857] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.705308] CPU: 1 PID: 11466 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2497.707336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.709738] Call Trace: [ 2497.710492] dump_stack+0x107/0x167 [ 2497.711560] should_fail.cold+0x5/0xa [ 2497.712656] ? create_object.isra.0+0x3a/0xa20 [ 2497.713973] should_failslab+0x5/0x20 [ 2497.715064] kmem_cache_alloc+0x5b/0x310 [ 2497.716510] create_object.isra.0+0x3a/0xa20 [ 2497.717772] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.719247] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2497.720719] ? skb_segment+0x9d8/0x3aa0 [ 2497.721877] __alloc_skb+0xb1/0x5b0 [ 2497.722938] skb_segment+0x9d8/0x3aa0 [ 2497.724063] ? __lock_acquire+0xbb1/0x5b00 [ 2497.725322] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2497.726797] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.728346] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.729543] __udp_gso_segment+0x11c6/0x1830 [ 2497.730816] ? __sk_receive_skb+0x830/0x830 [ 2497.732097] FAULT_INJECTION: forcing a failure. [ 2497.732097] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.736084] udp4_ufo_fragment+0x528/0x720 [ 2497.736115] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2497.740266] inet_gso_segment+0x4fb/0x11a0 [ 2497.740888] skb_mac_gso_segment+0x273/0x570 [ 2497.741513] ? inet_sock_destruct+0x840/0x840 [ 2497.742158] ? skb_network_protocol+0x650/0x650 [ 2497.742798] ? skb_crc32c_csum_help+0x80/0x80 [ 2497.743417] ? lock_acquire+0x197/0x470 [ 2497.743909] ? __dev_queue_xmit+0x1c6/0x2690 [ 2497.744686] __skb_gso_segment+0x32d/0x6d0 [ 2497.745691] ? mark_lock+0xf5/0x2df0 [ 2497.746577] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2497.747995] ? lock_chain_count+0x20/0x20 [ 2497.749189] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2497.750511] __dev_queue_xmit+0x825/0x2690 [ 2497.751752] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2497.753241] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2497.754570] ? mark_held_locks+0x9e/0xe0 [ 2497.755753] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2497.757038] neigh_connected_output+0x382/0x4d0 [ 2497.758186] ip_finish_output2+0x6f1/0x21f0 [ 2497.763282] ? nf_hook_slow+0xfc/0x1e0 [ 2497.764212] ? ip_frag_next+0x9e0/0x9e0 [ 2497.765153] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2497.766347] __ip_finish_output.part.0+0x5f3/0xb50 [ 2497.767607] ? ip_fragment.constprop.0+0x240/0x240 [ 2497.768805] ? netif_rx_ni+0xe7/0x300 [ 2497.769737] ip_mc_output+0x401/0xa30 [ 2497.770674] ip_send_skb+0xdd/0x260 [ 2497.771407] udp_send_skb+0x6da/0x11d0 [ 2497.771903] udp_sendmsg+0x139a/0x2160 [ 2497.772386] ? ip_frag_init+0x350/0x350 [ 2497.772885] ? lock_chain_count+0x20/0x20 [ 2497.773396] ? udp_setsockopt+0xc0/0xc0 [ 2497.773899] ? __bad_area_nosemaphore+0xa1/0x310 [ 2497.774487] ? mark_lock+0xf5/0x2df0 [ 2497.774958] ? mark_lock+0xf5/0x2df0 [ 2497.775441] ? mark_lock+0xf5/0x2df0 [ 2497.775906] ? lock_chain_count+0x20/0x20 [ 2497.776419] ? lock_chain_count+0x20/0x20 [ 2497.776943] ? mark_lock+0xf5/0x2df0 [ 2497.777410] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2497.777919] ? mark_held_locks+0x9e/0xe0 [ 2497.778427] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.779072] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2497.779773] ? lock_acquire+0x1b9/0x470 [ 2497.780261] ? find_held_lock+0x2c/0x110 [ 2497.780771] ? __might_fault+0xd3/0x180 [ 2497.781261] ? lock_downgrade+0x6d0/0x6d0 [ 2497.781779] ? lock_downgrade+0x6d0/0x6d0 [ 2497.782297] ? sock_has_perm+0x1ea/0x280 [ 2497.782804] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2497.783470] ? _copy_from_user+0xfb/0x1b0 [ 2497.783994] ? __import_iovec+0x458/0x590 [ 2497.784509] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.785146] inet6_sendmsg+0x105/0x140 [ 2497.785635] ? inet6_compat_ioctl+0x320/0x320 [ 2497.786210] __sock_sendmsg+0xf2/0x190 [ 2497.786714] ____sys_sendmsg+0x70d/0x870 [ 2497.787223] ? sock_write_iter+0x3d0/0x3d0 [ 2497.787752] ? do_recvmmsg+0x6d0/0x6d0 [ 2497.788231] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.788737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2497.789382] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2497.790048] ? trace_hardirqs_on+0x5b/0x180 [ 2497.790590] ___sys_sendmsg+0xf3/0x170 [ 2497.791069] ? sendmsg_copy_msghdr+0x160/0x160 [ 2497.791654] ? __fget_files+0x2cf/0x520 [ 2497.792146] ? lock_downgrade+0x6d0/0x6d0 [ 2497.792662] ? find_held_lock+0x2c/0x110 [ 2497.793167] ? __fget_files+0x2f8/0x520 [ 2497.793669] ? __fget_light+0xea/0x290 [ 2497.794157] __sys_sendmsg+0xe5/0x1b0 [ 2497.794631] ? __sys_sendmsg_sock+0x40/0x40 [ 2497.795157] ? trace_hardirqs_on+0x5b/0x180 [ 2497.795724] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.796354] ? syscall_enter_from_user_mode+0x27/0x50 [ 2497.796995] do_syscall_64+0x33/0x40 [ 2497.797453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2497.798090] RIP: 0033:0x7f251a6f7b19 [ 2497.798556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.800825] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2497.801759] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2497.802631] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2497.803521] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.804387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.805263] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2497.806168] CPU: 0 PID: 11467 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2497.807139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.808258] Call Trace: [ 2497.808618] dump_stack+0x107/0x167 [ 2497.809092] should_fail.cold+0x5/0xa [ 2497.809597] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2497.810275] ? create_object.isra.0+0x3a/0xa20 [ 2497.810876] should_failslab+0x5/0x20 [ 2497.811412] kmem_cache_alloc+0x5b/0x310 [ 2497.811945] ? mark_held_locks+0x9e/0xe0 [ 2497.812479] create_object.isra.0+0x3a/0xa20 [ 2497.813049] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.813718] kmem_cache_alloc_node+0x169/0x330 [ 2497.814317] __alloc_skb+0x6d/0x5b0 [ 2497.814802] skb_segment+0x9d8/0x3aa0 [ 2497.815336] ? __lock_acquire+0xbb1/0x5b00 [ 2497.815915] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2497.816577] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.817268] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.817820] __udp_gso_segment+0x11c6/0x1830 [ 2497.818408] ? __sk_receive_skb+0x830/0x830 [ 2497.818976] udp4_ufo_fragment+0x528/0x720 [ 2497.819584] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2497.820262] inet_gso_segment+0x4fb/0x11a0 [ 2497.820828] skb_mac_gso_segment+0x273/0x570 [ 2497.821407] ? inet_sock_destruct+0x840/0x840 [ 2497.821990] ? skb_network_protocol+0x650/0x650 [ 2497.822597] ? skb_crc32c_csum_help+0x80/0x80 [ 2497.823175] ? lock_acquire+0x197/0x470 [ 2497.823732] ? __dev_queue_xmit+0x1c6/0x2690 [ 2497.824308] __skb_gso_segment+0x32d/0x6d0 [ 2497.824855] ? mark_lock+0xf5/0x2df0 [ 2497.825341] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2497.826019] ? lock_chain_count+0x20/0x20 [ 2497.826553] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2497.827144] __dev_queue_xmit+0x825/0x2690 [ 2497.827740] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2497.828414] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2497.829034] ? mark_held_locks+0x9e/0xe0 [ 2497.829567] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2497.830250] neigh_connected_output+0x382/0x4d0 [ 2497.830866] ip_finish_output2+0x6f1/0x21f0 [ 2497.831484] ? nf_hook_slow+0xfc/0x1e0 [ 2497.831992] ? ip_frag_next+0x9e0/0x9e0 [ 2497.832514] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2497.833170] __ip_finish_output.part.0+0x5f3/0xb50 [ 2497.833815] ? ip_fragment.constprop.0+0x240/0x240 [ 2497.834452] ? netif_rx_ni+0xe7/0x300 [ 2497.834951] ip_mc_output+0x401/0xa30 [ 2497.835488] ip_send_skb+0xdd/0x260 [ 2497.835967] udp_send_skb+0x6da/0x11d0 [ 2497.836484] udp_sendmsg+0x139a/0x2160 [ 2497.836986] ? mark_lock+0xf5/0x2df0 [ 2497.837474] ? ip_frag_init+0x350/0x350 [ 2497.837990] ? lock_chain_count+0x20/0x20 [ 2497.838533] ? udp_setsockopt+0xc0/0xc0 [ 2497.839046] ? mark_lock+0xf5/0x2df0 [ 2497.839574] ? lock_acquire+0x197/0x470 [ 2497.840095] ? lock_chain_count+0x20/0x20 [ 2497.840636] ? mark_lock+0xf5/0x2df0 [ 2497.841125] ? mark_lock+0xf5/0x2df0 [ 2497.841611] ? lock_chain_count+0x20/0x20 [ 2497.842149] ? __lock_acquire+0xbb1/0x5b00 [ 2497.842698] ? lock_chain_count+0x20/0x20 [ 2497.843274] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.843968] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.844506] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2497.845046] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.845715] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.846246] ? mark_lock+0xf5/0x2df0 [ 2497.846735] ? lock_acquire+0x197/0x470 [ 2497.847287] ? find_held_lock+0x2c/0x110 [ 2497.847823] ? __might_fault+0xd3/0x180 [ 2497.848339] ? lock_downgrade+0x6d0/0x6d0 [ 2497.848878] ? lock_downgrade+0x6d0/0x6d0 [ 2497.849418] ? sock_has_perm+0x1ea/0x280 [ 2497.849943] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2497.850613] ? _copy_from_user+0xfb/0x1b0 [ 2497.851159] ? __import_iovec+0x458/0x590 [ 2497.851740] ? udp_v6_push_pending_frames+0x360/0x360 [ 2497.852416] inet6_sendmsg+0x105/0x140 [ 2497.852922] ? inet6_compat_ioctl+0x320/0x320 [ 2497.853510] __sock_sendmsg+0xf2/0x190 [ 2497.854023] ____sys_sendmsg+0x70d/0x870 [ 2497.854554] ? sock_write_iter+0x3d0/0x3d0 [ 2497.855102] ? do_recvmmsg+0x6d0/0x6d0 [ 2497.855656] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.856190] ? lock_downgrade+0x6d0/0x6d0 [ 2497.856732] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2497.857410] ? SOFTIRQ_verbose+0x10/0x10 [ 2497.857940] ___sys_sendmsg+0xf3/0x170 [ 2497.858451] ? sendmsg_copy_msghdr+0x160/0x160 [ 2497.859046] ? __fget_files+0x2cf/0x520 [ 2497.859600] ? lock_downgrade+0x6d0/0x6d0 [ 2497.860141] ? find_held_lock+0x2c/0x110 [ 2497.860678] ? __fget_files+0x2f8/0x520 [ 2497.861200] ? __fget_light+0xea/0x290 [ 2497.861713] __sys_sendmsg+0xe5/0x1b0 [ 2497.862208] ? __sys_sendmsg_sock+0x40/0x40 [ 2497.862770] ? rcu_read_lock_any_held+0x75/0xa0 [ 2497.863431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2497.864114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.864785] ? trace_hardirqs_on+0x5b/0x180 [ 2497.865346] do_syscall_64+0x33/0x40 [ 2497.865835] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2497.866507] RIP: 0033:0x7f3f9ec55b19 [ 2497.866995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.869402] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2497.870389] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2497.871352] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2497.872279] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.873199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.874122] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:53:44 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x29f6}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:44 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:53:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 81) 09:53:44 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 79) 09:53:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x8000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:44 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:44 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2512.986806] FAULT_INJECTION: forcing a failure. [ 2512.986806] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.988466] CPU: 0 PID: 11500 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2512.989438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2512.990604] Call Trace: [ 2512.990988] dump_stack+0x107/0x167 [ 2512.991510] should_fail.cold+0x5/0xa [ 2512.992060] ? trace_hardirqs_on+0x5b/0x180 [ 2512.992072] FAULT_INJECTION: forcing a failure. [ 2512.992072] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.994214] ? __alloc_skb+0x6d/0x5b0 [ 2512.994762] should_failslab+0x5/0x20 [ 2512.995306] kmem_cache_alloc_node+0x55/0x330 [ 2512.995976] __alloc_skb+0x6d/0x5b0 [ 2512.996503] skb_segment+0x9d8/0x3aa0 [ 2512.997051] ? __lock_acquire+0xbb1/0x5b00 [ 2512.997691] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2512.998403] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2512.999146] ? SOFTIRQ_verbose+0x10/0x10 [ 2512.999733] __udp_gso_segment+0x11c6/0x1830 [ 2513.000395] ? __sk_receive_skb+0x830/0x830 [ 2513.001013] udp4_ufo_fragment+0x528/0x720 [ 2513.001616] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2513.002319] inet_gso_segment+0x4fb/0x11a0 [ 2513.002932] skb_mac_gso_segment+0x273/0x570 [ 2513.003553] ? inet_sock_destruct+0x840/0x840 [ 2513.004207] ? skb_network_protocol+0x650/0x650 [ 2513.004853] ? skb_crc32c_csum_help+0x80/0x80 [ 2513.005478] ? lock_acquire+0x197/0x470 [ 2513.006036] ? __dev_queue_xmit+0x1c6/0x2690 [ 2513.006661] __skb_gso_segment+0x32d/0x6d0 [ 2513.007259] ? mark_lock+0xf5/0x2df0 [ 2513.007806] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2513.008547] ? lock_chain_count+0x20/0x20 [ 2513.009133] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2513.009775] __dev_queue_xmit+0x825/0x2690 [ 2513.010373] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2513.011101] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2513.011764] ? mark_held_locks+0x9e/0xe0 [ 2513.012318] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2513.013009] neigh_connected_output+0x382/0x4d0 [ 2513.013631] ip_finish_output2+0x6f1/0x21f0 [ 2513.014197] ? nf_hook_slow+0xfc/0x1e0 [ 2513.014707] ? ip_frag_next+0x9e0/0x9e0 [ 2513.015227] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2513.015904] __ip_finish_output.part.0+0x5f3/0xb50 [ 2513.016551] ? ip_fragment.constprop.0+0x240/0x240 [ 2513.017192] ? netif_rx_ni+0xe7/0x300 [ 2513.017698] ip_mc_output+0x401/0xa30 [ 2513.018201] ip_send_skb+0xdd/0x260 [ 2513.018683] udp_send_skb+0x6da/0x11d0 [ 2513.019201] udp_sendmsg+0x139a/0x2160 [ 2513.019710] ? mark_lock+0xf5/0x2df0 [ 2513.020214] ? ip_frag_init+0x350/0x350 [ 2513.020736] ? lock_chain_count+0x20/0x20 [ 2513.021282] ? udp_setsockopt+0xc0/0xc0 [ 2513.021801] ? mark_lock+0xf5/0x2df0 [ 2513.022289] ? lock_acquire+0x197/0x470 [ 2513.022813] ? lock_chain_count+0x20/0x20 [ 2513.023357] ? mark_lock+0xf5/0x2df0 [ 2513.023888] ? mark_lock+0xf5/0x2df0 [ 2513.024376] ? lock_chain_count+0x20/0x20 [ 2513.024915] ? __lock_acquire+0xbb1/0x5b00 [ 2513.025467] ? lock_chain_count+0x20/0x20 [ 2513.026023] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2513.026705] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.027243] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2513.027810] ? udp_v6_push_pending_frames+0x360/0x360 [ 2513.028539] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.029116] ? mark_lock+0xf5/0x2df0 [ 2513.029649] ? lock_acquire+0x197/0x470 [ 2513.030207] ? find_held_lock+0x2c/0x110 [ 2513.030786] ? __might_fault+0xd3/0x180 [ 2513.031347] ? lock_downgrade+0x6d0/0x6d0 [ 2513.031951] ? lock_downgrade+0x6d0/0x6d0 [ 2513.032539] ? sock_has_perm+0x1ea/0x280 [ 2513.033113] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2513.033842] ? _copy_from_user+0xfb/0x1b0 [ 2513.034438] ? __import_iovec+0x458/0x590 [ 2513.035022] ? udp_v6_push_pending_frames+0x360/0x360 [ 2513.035760] inet6_sendmsg+0x105/0x140 [ 2513.036320] ? inet6_compat_ioctl+0x320/0x320 [ 2513.036950] __sock_sendmsg+0xf2/0x190 [ 2513.037491] ____sys_sendmsg+0x70d/0x870 [ 2513.038058] ? sock_write_iter+0x3d0/0x3d0 [ 2513.038634] ? do_recvmmsg+0x6d0/0x6d0 [ 2513.039169] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.039724] ? lock_downgrade+0x6d0/0x6d0 [ 2513.040316] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2513.041049] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.041626] ___sys_sendmsg+0xf3/0x170 [ 2513.042178] ? sendmsg_copy_msghdr+0x160/0x160 [ 2513.042829] ? __fget_files+0x2cf/0x520 [ 2513.043390] ? lock_downgrade+0x6d0/0x6d0 [ 2513.043995] ? find_held_lock+0x2c/0x110 [ 2513.044534] ? __fget_files+0x2f8/0x520 [ 2513.045059] ? __fget_light+0xea/0x290 [ 2513.045573] __sys_sendmsg+0xe5/0x1b0 [ 2513.046069] ? __sys_sendmsg_sock+0x40/0x40 [ 2513.046634] ? rcu_read_lock_any_held+0x75/0xa0 [ 2513.047254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2513.047952] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2513.048622] ? trace_hardirqs_on+0x5b/0x180 [ 2513.049184] do_syscall_64+0x33/0x40 [ 2513.049672] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2513.050340] RIP: 0033:0x7f3f9ec55b19 [ 2513.050826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2513.053234] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2513.054226] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2513.055154] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2513.056098] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2513.057028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2513.057959] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 [ 2513.058911] CPU: 1 PID: 11498 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2513.059771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2513.060782] Call Trace: [ 2513.061104] dump_stack+0x107/0x167 [ 2513.061548] should_fail.cold+0x5/0xa [ 2513.062015] should_failslab+0x5/0x20 [ 2513.062478] __kmalloc_node_track_caller+0x74/0x3b0 [ 2513.063081] ? skb_segment+0x9d8/0x3aa0 [ 2513.063568] __alloc_skb+0xb1/0x5b0 [ 2513.064034] skb_segment+0x9d8/0x3aa0 [ 2513.064501] ? __lock_acquire+0xbb1/0x5b00 [ 2513.065051] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2513.065658] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2513.066298] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2513.066949] ? trace_hardirqs_on+0x5b/0x180 [ 2513.067473] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2513.068148] __udp_gso_segment+0x11c6/0x1830 [ 2513.068682] ? __sk_receive_skb+0x830/0x830 [ 2513.069213] udp4_ufo_fragment+0x528/0x720 [ 2513.069731] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2513.070341] inet_gso_segment+0x4fb/0x11a0 [ 2513.070863] skb_mac_gso_segment+0x273/0x570 [ 2513.071397] ? inet_sock_destruct+0x840/0x840 [ 2513.071954] ? skb_network_protocol+0x650/0x650 [ 2513.072513] ? skb_crc32c_csum_help+0x80/0x80 [ 2513.073054] ? lock_acquire+0x197/0x470 [ 2513.073533] ? __dev_queue_xmit+0x1c6/0x2690 [ 2513.074069] __skb_gso_segment+0x32d/0x6d0 [ 2513.074580] ? mark_lock+0xf5/0x2df0 [ 2513.075038] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2513.075671] ? lock_chain_count+0x20/0x20 [ 2513.076182] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2513.076736] __dev_queue_xmit+0x825/0x2690 [ 2513.077253] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2513.077876] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2513.078435] ? mark_held_locks+0x9e/0xe0 [ 2513.078931] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2513.079568] neigh_connected_output+0x382/0x4d0 [ 2513.083996] ip_finish_output2+0x6f1/0x21f0 [ 2513.084521] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2513.085181] ? ip_frag_next+0x9e0/0x9e0 [ 2513.085664] ? __ip_finish_output.part.0+0x5d7/0xb50 [ 2513.086282] __ip_finish_output.part.0+0x5f3/0xb50 [ 2513.086876] ? ip_fragment.constprop.0+0x240/0x240 [ 2513.087468] ? netif_rx_ni+0xe7/0x300 [ 2513.087954] ip_mc_output+0x401/0xa30 [ 2513.088421] ip_send_skb+0xdd/0x260 [ 2513.088865] udp_send_skb+0x6da/0x11d0 [ 2513.089346] udp_sendmsg+0x139a/0x2160 [ 2513.089815] ? mark_lock+0xf5/0x2df0 [ 2513.090268] ? ip_frag_init+0x350/0x350 [ 2513.090750] ? lock_chain_count+0x20/0x20 [ 2513.091260] ? udp_setsockopt+0xc0/0xc0 [ 2513.091739] ? mark_lock+0xf5/0x2df0 [ 2513.092208] ? lock_acquire+0x197/0x470 [ 2513.092692] ? lock_chain_count+0x20/0x20 [ 2513.093195] ? mark_lock+0xf5/0x2df0 [ 2513.093649] ? mark_lock+0xf5/0x2df0 [ 2513.094100] ? lock_chain_count+0x20/0x20 [ 2513.094653] ? __lock_acquire+0xbb1/0x5b00 [ 2513.095168] ? lock_chain_count+0x20/0x20 [ 2513.095681] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2513.096324] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.096826] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2513.097331] ? udp_v6_push_pending_frames+0x360/0x360 [ 2513.097954] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.098450] ? mark_lock+0xf5/0x2df0 [ 2513.098907] ? lock_acquire+0x197/0x470 [ 2513.099388] ? find_held_lock+0x2c/0x110 [ 2513.099901] ? __might_fault+0xd3/0x180 [ 2513.100383] ? lock_downgrade+0x6d0/0x6d0 [ 2513.100889] ? lock_downgrade+0x6d0/0x6d0 [ 2513.101394] ? sock_has_perm+0x1ea/0x280 [ 2513.101886] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2513.102515] ? _copy_from_user+0xfb/0x1b0 [ 2513.103028] ? __import_iovec+0x458/0x590 [ 2513.103531] ? udp_v6_push_pending_frames+0x360/0x360 [ 2513.108197] inet6_sendmsg+0x105/0x140 [ 2513.108672] ? inet6_compat_ioctl+0x320/0x320 [ 2513.109213] __sock_sendmsg+0xf2/0x190 [ 2513.109686] ____sys_sendmsg+0x70d/0x870 [ 2513.110187] ? sock_write_iter+0x3d0/0x3d0 [ 2513.110698] ? do_recvmmsg+0x6d0/0x6d0 [ 2513.111172] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.111663] ? lock_downgrade+0x6d0/0x6d0 [ 2513.112190] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2513.112823] ? SOFTIRQ_verbose+0x10/0x10 [ 2513.113319] ___sys_sendmsg+0xf3/0x170 [ 2513.113793] ? sendmsg_copy_msghdr+0x160/0x160 [ 2513.114350] ? __fget_files+0x2cf/0x520 [ 2513.114833] ? lock_downgrade+0x6d0/0x6d0 [ 2513.115336] ? find_held_lock+0x2c/0x110 [ 2513.115850] ? __fget_files+0x2f8/0x520 [ 2513.116340] ? __fget_light+0xea/0x290 [ 2513.116820] __sys_sendmsg+0xe5/0x1b0 [ 2513.117282] ? __sys_sendmsg_sock+0x40/0x40 [ 2513.117813] ? rcu_read_lock_any_held+0x75/0xa0 [ 2513.118390] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2513.119024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2513.119645] ? trace_hardirqs_on+0x5b/0x180 [ 2513.120182] do_syscall_64+0x33/0x40 [ 2513.120634] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2513.121253] RIP: 0033:0x7f251a6f7b19 [ 2513.121706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2513.123941] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2513.124862] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2513.125724] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2513.126585] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2513.127452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2513.132394] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2528.803721] FAULT_INJECTION: forcing a failure. [ 2528.803721] name failslab, interval 1, probability 0, space 0, times 0 [ 2528.805384] CPU: 0 PID: 11528 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2528.806338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2528.807490] Call Trace: [ 2528.807870] dump_stack+0x107/0x167 [ 2528.808402] should_fail.cold+0x5/0xa [ 2528.808949] ? trace_hardirqs_on+0x5b/0x180 [ 2528.809561] ? __alloc_skb+0x6d/0x5b0 [ 2528.810101] should_failslab+0x5/0x20 [ 2528.810601] kmem_cache_alloc_node+0x55/0x330 [ 2528.811189] __alloc_skb+0x6d/0x5b0 [ 2528.811669] skb_segment+0x9d8/0x3aa0 [ 2528.812169] ? __lock_acquire+0xbb1/0x5b00 [ 2528.812789] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2528.813445] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2528.814127] ? SOFTIRQ_verbose+0x10/0x10 [ 2528.814665] __udp_gso_segment+0x11c6/0x1830 [ 2528.815239] ? __sk_receive_skb+0x830/0x830 [ 2528.815811] udp4_ufo_fragment+0x528/0x720 [ 2528.816494] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2528.818156] inet_gso_segment+0x4fb/0x11a0 [ 2528.819570] skb_mac_gso_segment+0x273/0x570 [ 2528.820873] ? inet_sock_destruct+0x840/0x840 [ 2528.822037] ? skb_network_protocol+0x650/0x650 [ 2528.823246] ? skb_crc32c_csum_help+0x80/0x80 [ 2528.824430] ? lock_acquire+0x197/0x470 [ 2528.825404] ? __dev_queue_xmit+0x1c6/0x2690 [ 2528.826486] __skb_gso_segment+0x32d/0x6d0 [ 2528.827519] ? mark_lock+0xf5/0x2df0 [ 2528.832442] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2528.833284] ? lock_chain_count+0x20/0x20 [ 2528.833939] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2528.834682] __dev_queue_xmit+0x825/0x2690 [ 2528.835369] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2528.836184] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2528.840708] ? mark_held_locks+0x9e/0xe0 [ 2528.843429] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 09:53:59 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 80) 09:53:59 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:53:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:53:59 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2528.844118] neigh_connected_output+0x382/0x4d0 [ 2528.844768] ip_finish_output2+0x6f1/0x21f0 [ 2528.845337] ? nf_hook_slow+0xfc/0x1e0 [ 2528.845846] ? ip_frag_next+0x9e0/0x9e0 [ 2528.846368] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2528.847026] __ip_finish_output.part.0+0x5f3/0xb50 [ 2528.847671] ? ip_fragment.constprop.0+0x240/0x240 [ 2528.848320] ? netif_rx_ni+0xe7/0x300 [ 2528.848828] ip_mc_output+0x401/0xa30 [ 2528.849336] ip_send_skb+0xdd/0x260 [ 2528.849817] udp_send_skb+0x6da/0x11d0 [ 2528.850337] udp_sendmsg+0x139a/0x2160 [ 2528.850846] ? mark_lock+0xf5/0x2df0 [ 2528.851335] ? ip_frag_init+0x350/0x350 [ 2528.851856] ? lock_chain_count+0x20/0x20 [ 2528.852419] ? udp_setsockopt+0xc0/0xc0 [ 2528.852941] ? mark_lock+0xf5/0x2df0 [ 2528.853429] ? lock_acquire+0x197/0x470 [ 2528.853953] ? lock_chain_count+0x20/0x20 [ 2528.854497] ? mark_lock+0xf5/0x2df0 [ 2528.854987] ? mark_lock+0xf5/0x2df0 [ 2528.855482] ? lock_chain_count+0x20/0x20 [ 2528.856024] ? __lock_acquire+0xbb1/0x5b00 [ 2528.856783] ? lock_chain_count+0x20/0x20 [ 2528.857335] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2528.858173] ? SOFTIRQ_verbose+0x10/0x10 [ 2528.858909] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2528.859567] ? udp_v6_push_pending_frames+0x360/0x360 [ 2528.860356] ? SOFTIRQ_verbose+0x10/0x10 [ 2528.861135] ? mark_lock+0xf5/0x2df0 [ 2528.861743] ? lock_acquire+0x197/0x470 [ 2528.862419] ? find_held_lock+0x2c/0x110 [ 2528.863127] ? __might_fault+0xd3/0x180 [ 2528.863698] ? lock_downgrade+0x6d0/0x6d0 [ 2528.864471] ? lock_downgrade+0x6d0/0x6d0 [ 2528.865089] ? sock_has_perm+0x1ea/0x280 [ 2528.865772] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2528.866730] ? _copy_from_user+0xfb/0x1b0 [ 2528.867468] ? __import_iovec+0x458/0x590 [ 2528.868014] ? udp_v6_push_pending_frames+0x360/0x360 [ 2528.874542] inet6_sendmsg+0x105/0x140 [ 2528.875127] ? inet6_compat_ioctl+0x320/0x320 [ 2528.875925] __sock_sendmsg+0xf2/0x190 [ 2528.876586] ____sys_sendmsg+0x70d/0x870 [ 2528.877301] ? sock_write_iter+0x3d0/0x3d0 [ 2528.878058] ? do_recvmmsg+0x6d0/0x6d0 [ 2528.878739] ? SOFTIRQ_verbose+0x10/0x10 [ 2528.879484] ? lock_downgrade+0x6d0/0x6d0 [ 2528.880188] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2528.881150] ? SOFTIRQ_verbose+0x10/0x10 [ 2528.881760] ___sys_sendmsg+0xf3/0x170 [ 2528.882537] ? sendmsg_copy_msghdr+0x160/0x160 [ 2528.883303] ? __fget_files+0x2cf/0x520 [ 2528.883942] ? lock_downgrade+0x6d0/0x6d0 [ 2528.884762] ? find_held_lock+0x2c/0x110 [ 2528.885470] ? __fget_files+0x2f8/0x520 [ 2528.886069] ? __fget_light+0xea/0x290 [ 2528.886912] __sys_sendmsg+0xe5/0x1b0 [ 2528.887530] ? __sys_sendmsg_sock+0x40/0x40 [ 2528.888256] ? rcu_read_lock_any_held+0x75/0xa0 [ 2528.889140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2528.889991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2528.890834] ? trace_hardirqs_on+0x5b/0x180 [ 2528.891677] do_syscall_64+0x33/0x40 [ 2528.892334] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2528.893216] RIP: 0033:0x7f3f9ec55b19 [ 2528.893849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2528.897082] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2528.898341] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2528.899587] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2528.900902] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2528.902154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2528.903313] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:53:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x2d75}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:53:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xa000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:53:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 82) 09:53:59 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2000, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:00 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:00 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 81) [ 2529.025764] FAULT_INJECTION: forcing a failure. [ 2529.025764] name failslab, interval 1, probability 0, space 0, times 0 [ 2529.027209] CPU: 1 PID: 11536 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2529.028057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2529.029088] Call Trace: [ 2529.029419] dump_stack+0x107/0x167 [ 2529.029868] should_fail.cold+0x5/0xa [ 2529.030339] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2529.030984] ? create_object.isra.0+0x3a/0xa20 [ 2529.031549] should_failslab+0x5/0x20 [ 2529.032024] kmem_cache_alloc+0x5b/0x310 [ 2529.032549] ? mark_held_locks+0x9e/0xe0 [ 2529.033051] create_object.isra.0+0x3a/0xa20 [ 2529.033586] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2529.034204] kmem_cache_alloc_node+0x169/0x330 [ 2529.034770] __alloc_skb+0x6d/0x5b0 [ 2529.035217] skb_segment+0x9d8/0x3aa0 [ 2529.035679] ? __lock_acquire+0xbb1/0x5b00 [ 2529.036214] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2529.036842] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.037470] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.037969] __udp_gso_segment+0x11c6/0x1830 [ 2529.038536] ? __sk_receive_skb+0x830/0x830 [ 2529.039095] udp4_ufo_fragment+0x528/0x720 [ 2529.039641] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2529.040278] inet_gso_segment+0x4fb/0x11a0 [ 2529.040858] skb_mac_gso_segment+0x273/0x570 [ 2529.041420] ? inet_sock_destruct+0x840/0x840 [ 2529.041994] ? skb_network_protocol+0x650/0x650 [ 2529.042577] ? skb_crc32c_csum_help+0x80/0x80 [ 2529.043134] ? lock_acquire+0x197/0x470 [ 2529.043626] ? __dev_queue_xmit+0x1c6/0x2690 [ 2529.044174] __skb_gso_segment+0x32d/0x6d0 [ 2529.044715] ? mark_lock+0xf5/0x2df0 [ 2529.045177] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2529.045806] ? lock_chain_count+0x20/0x20 [ 2529.046305] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2529.046857] __dev_queue_xmit+0x825/0x2690 [ 2529.047367] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2529.048028] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2529.048632] ? mark_held_locks+0x9e/0xe0 [ 2529.049161] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2529.049832] neigh_connected_output+0x382/0x4d0 [ 2529.050441] ip_finish_output2+0x6f1/0x21f0 [ 2529.050997] ? nf_hook_slow+0xfc/0x1e0 [ 2529.051497] ? ip_frag_next+0x9e0/0x9e0 [ 2529.052000] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2529.052655] __ip_finish_output.part.0+0x5f3/0xb50 [ 2529.053261] ? ip_fragment.constprop.0+0x240/0x240 [ 2529.053887] ? netif_rx_ni+0xe7/0x300 [ 2529.054390] ip_mc_output+0x401/0xa30 [ 2529.054897] ip_send_skb+0xdd/0x260 [ 2529.055380] udp_send_skb+0x6da/0x11d0 [ 2529.055903] udp_sendmsg+0x139a/0x2160 [ 2529.056439] ? mark_lock+0xf5/0x2df0 [ 2529.056935] ? ip_frag_init+0x350/0x350 [ 2529.057467] ? lock_chain_count+0x20/0x20 [ 2529.058028] ? udp_setsockopt+0xc0/0xc0 [ 2529.058551] ? mark_lock+0xf5/0x2df0 [ 2529.059029] ? lock_acquire+0x197/0x470 [ 2529.059540] ? lock_chain_count+0x20/0x20 [ 2529.060070] ? mark_lock+0xf5/0x2df0 [ 2529.060599] ? mark_lock+0xf5/0x2df0 [ 2529.061082] ? lock_chain_count+0x20/0x20 [ 2529.061588] ? __lock_acquire+0xbb1/0x5b00 [ 2529.062112] ? lock_chain_count+0x20/0x20 [ 2529.062622] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.063248] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.063742] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2529.064242] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.064896] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.065389] ? mark_lock+0xf5/0x2df0 [ 2529.065836] ? lock_acquire+0x197/0x470 [ 2529.066313] ? find_held_lock+0x2c/0x110 [ 2529.066802] ? __might_fault+0xd3/0x180 [ 2529.067277] ? lock_downgrade+0x6d0/0x6d0 [ 2529.067774] ? lock_downgrade+0x6d0/0x6d0 [ 2529.068268] ? sock_has_perm+0x1ea/0x280 [ 2529.068784] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2529.069402] ? _copy_from_user+0xfb/0x1b0 [ 2529.069915] ? __import_iovec+0x458/0x590 [ 2529.070413] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.071036] inet6_sendmsg+0x105/0x140 [ 2529.071504] ? inet6_compat_ioctl+0x320/0x320 [ 2529.072045] __sock_sendmsg+0xf2/0x190 [ 2529.072532] ____sys_sendmsg+0x70d/0x870 [ 2529.073025] ? sock_write_iter+0x3d0/0x3d0 [ 2529.073536] ? do_recvmmsg+0x6d0/0x6d0 [ 2529.074004] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.074486] ? lock_downgrade+0x6d0/0x6d0 [ 2529.074982] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.075605] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.076090] ___sys_sendmsg+0xf3/0x170 [ 2529.076580] ? sendmsg_copy_msghdr+0x160/0x160 [ 2529.077134] ? __fget_files+0x2cf/0x520 [ 2529.077610] ? lock_downgrade+0x6d0/0x6d0 [ 2529.078102] ? find_held_lock+0x2c/0x110 [ 2529.078597] ? __fget_files+0x2f8/0x520 [ 2529.079075] ? __fget_light+0xea/0x290 [ 2529.079546] __sys_sendmsg+0xe5/0x1b0 [ 2529.079999] ? __sys_sendmsg_sock+0x40/0x40 [ 2529.080533] ? rcu_read_lock_any_held+0x75/0xa0 [ 2529.081108] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.081733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2529.082340] ? trace_hardirqs_on+0x5b/0x180 [ 2529.082855] do_syscall_64+0x33/0x40 [ 2529.083300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2529.083910] RIP: 0033:0x7f251a6f7b19 [ 2529.084363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2529.086559] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2529.087463] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2529.088307] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2529.089171] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2529.090029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2529.090881] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x30f4}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:00 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:00 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2529.326012] FAULT_INJECTION: forcing a failure. [ 2529.326012] name failslab, interval 1, probability 0, space 0, times 0 [ 2529.328362] CPU: 1 PID: 11558 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2529.329443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2529.330563] Call Trace: [ 2529.330929] dump_stack+0x107/0x167 [ 2529.331422] should_fail.cold+0x5/0xa [ 2529.331956] ? trace_hardirqs_on+0x5b/0x180 [ 2529.332538] ? __alloc_skb+0x6d/0x5b0 [ 2529.333011] should_failslab+0x5/0x20 [ 2529.333513] kmem_cache_alloc_node+0x55/0x330 [ 2529.334118] __alloc_skb+0x6d/0x5b0 [ 2529.334640] skb_segment+0x9d8/0x3aa0 [ 2529.335311] ? __lock_acquire+0xbb1/0x5b00 [ 2529.335916] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2529.336576] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.337212] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.337735] __udp_gso_segment+0x11c6/0x1830 [ 2529.338321] ? __sk_receive_skb+0x830/0x830 [ 2529.338854] udp4_ufo_fragment+0x528/0x720 [ 2529.339389] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2529.340002] inet_gso_segment+0x4fb/0x11a0 [ 2529.340565] skb_mac_gso_segment+0x273/0x570 [ 2529.341169] ? inet_sock_destruct+0x840/0x840 [ 2529.341715] ? skb_network_protocol+0x650/0x650 [ 2529.342276] ? skb_crc32c_csum_help+0x80/0x80 [ 2529.342849] ? lock_acquire+0x197/0x470 [ 2529.343381] ? __dev_queue_xmit+0x1c6/0x2690 [ 2529.343918] __skb_gso_segment+0x32d/0x6d0 [ 2529.344445] ? mark_lock+0xf5/0x2df0 [ 2529.344904] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2529.345553] ? lock_chain_count+0x20/0x20 [ 2529.346052] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2529.346602] __dev_queue_xmit+0x825/0x2690 [ 2529.347118] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2529.347737] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2529.348294] ? mark_held_locks+0x9e/0xe0 [ 2529.348803] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2529.349463] neigh_connected_output+0x382/0x4d0 [ 2529.350037] ip_finish_output2+0x6f1/0x21f0 [ 2529.350569] ? nf_hook_slow+0xfc/0x1e0 [ 2529.351047] ? ip_frag_next+0x9e0/0x9e0 [ 2529.351528] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2529.352177] __ip_finish_output.part.0+0x5f3/0xb50 [ 2529.352807] ? ip_fragment.constprop.0+0x240/0x240 [ 2529.353567] ? netif_rx_ni+0xe7/0x300 [ 2529.354247] ip_mc_output+0x401/0xa30 [ 2529.354794] ip_send_skb+0xdd/0x260 [ 2529.355242] udp_send_skb+0x6da/0x11d0 [ 2529.355906] udp_sendmsg+0x139a/0x2160 [ 2529.356387] ? mark_lock+0xf5/0x2df0 [ 2529.356858] ? ip_frag_init+0x350/0x350 [ 2529.357356] ? lock_chain_count+0x20/0x20 [ 2529.357905] ? udp_setsockopt+0xc0/0xc0 [ 2529.358432] ? mark_lock+0xf5/0x2df0 [ 2529.358895] ? __lock_acquire+0x1657/0x5b00 [ 2529.359434] ? lock_chain_count+0x20/0x20 [ 2529.359972] ? mark_lock+0xf5/0x2df0 [ 2529.360458] ? mark_lock+0xf5/0x2df0 [ 2529.360918] ? lock_chain_count+0x20/0x20 [ 2529.361425] ? __lock_acquire+0xbb1/0x5b00 [ 2529.361937] ? lock_chain_count+0x20/0x20 [ 2529.362464] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.363119] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.363618] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2529.364346] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.365051] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.365770] ? mark_lock+0xf5/0x2df0 [ 2529.366257] ? lock_acquire+0x197/0x470 [ 2529.366766] ? find_held_lock+0x2c/0x110 [ 2529.367307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.367990] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2529.368722] ? trace_hardirqs_on+0x5b/0x180 [ 2529.369290] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2529.370128] ? sock_has_perm+0x1ea/0x280 [ 2529.370761] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2529.371817] ? copy_user_generic_string+0x2c/0x40 [ 2529.372606] ? _copy_from_user+0xfb/0x1b0 [ 2529.373290] ? __import_iovec+0x458/0x590 [ 2529.374068] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.375069] inet6_sendmsg+0x105/0x140 [ 2529.375728] ? inet6_compat_ioctl+0x320/0x320 [ 2529.376437] __sock_sendmsg+0xf2/0x190 [ 2529.376994] ____sys_sendmsg+0x70d/0x870 [ 2529.377559] ? sock_write_iter+0x3d0/0x3d0 [ 2529.378143] ? do_recvmmsg+0x6d0/0x6d0 [ 2529.378847] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.379371] ? lock_downgrade+0x6d0/0x6d0 [ 2529.379949] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.380659] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.381162] ___sys_sendmsg+0xf3/0x170 [ 2529.381645] ? sendmsg_copy_msghdr+0x160/0x160 [ 2529.382260] ? __fget_files+0x2cf/0x520 [ 2529.382860] ? lock_downgrade+0x6d0/0x6d0 [ 2529.383585] ? find_held_lock+0x2c/0x110 [ 2529.384206] ? __fget_files+0x2f8/0x520 [ 2529.385137] ? __fget_light+0xea/0x290 [ 2529.385709] __sys_sendmsg+0xe5/0x1b0 [ 2529.386275] ? __sys_sendmsg_sock+0x40/0x40 [ 2529.386834] ? rcu_read_lock_any_held+0x75/0xa0 [ 2529.387579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.388231] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2529.388886] ? trace_hardirqs_on+0x5b/0x180 [ 2529.389426] do_syscall_64+0x33/0x40 [ 2529.389879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2529.390497] RIP: 0033:0x7f3f9ec55b19 [ 2529.390952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2529.393439] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2529.394655] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2529.395511] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2529.396388] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2529.397435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2529.398304] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:54:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 83) 09:54:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x3473}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:00 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3a01, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xe000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:00 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 82) [ 2529.541127] FAULT_INJECTION: forcing a failure. [ 2529.541127] name failslab, interval 1, probability 0, space 0, times 0 [ 2529.544669] CPU: 1 PID: 11569 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2529.545573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2529.546608] Call Trace: [ 2529.546929] dump_stack+0x107/0x167 [ 2529.547365] should_fail.cold+0x5/0xa [ 2529.547834] should_failslab+0x5/0x20 [ 2529.548327] __kmalloc_node_track_caller+0x74/0x3b0 [ 2529.548946] ? skb_segment+0x9d8/0x3aa0 [ 2529.549423] __alloc_skb+0xb1/0x5b0 [ 2529.549856] skb_segment+0x9d8/0x3aa0 [ 2529.550314] ? __lock_acquire+0xbb1/0x5b00 [ 2529.550880] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2529.551491] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.552119] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.552651] __udp_gso_segment+0x11c6/0x1830 [ 2529.553185] ? __sk_receive_skb+0x830/0x830 [ 2529.553704] udp4_ufo_fragment+0x528/0x720 [ 2529.554207] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2529.554797] inet_gso_segment+0x4fb/0x11a0 [ 2529.555308] skb_mac_gso_segment+0x273/0x570 [ 2529.555850] ? inet_sock_destruct+0x840/0x840 [ 2529.556398] ? skb_network_protocol+0x650/0x650 [ 2529.556977] ? skb_crc32c_csum_help+0x80/0x80 [ 2529.557507] ? lock_acquire+0x197/0x470 [ 2529.557973] ? __dev_queue_xmit+0x1c6/0x2690 [ 2529.558498] __skb_gso_segment+0x32d/0x6d0 [ 2529.558993] ? mark_lock+0xf5/0x2df0 [ 2529.559437] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2529.560053] ? lock_chain_count+0x20/0x20 [ 2529.560582] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2529.561122] __dev_queue_xmit+0x825/0x2690 [ 2529.561624] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2529.562234] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2529.562784] ? mark_held_locks+0x9e/0xe0 [ 2529.563266] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2529.563887] neigh_connected_output+0x382/0x4d0 [ 2529.564484] ip_finish_output2+0x6f1/0x21f0 [ 2529.565004] ? nf_hook_slow+0xfc/0x1e0 [ 2529.565468] ? ip_frag_next+0x9e0/0x9e0 [ 2529.565963] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2529.566574] __ip_finish_output.part.0+0x5f3/0xb50 [ 2529.567156] ? ip_fragment.constprop.0+0x240/0x240 [ 2529.567739] ? netif_rx_ni+0xe7/0x300 [ 2529.568197] ip_mc_output+0x401/0xa30 [ 2529.568711] ip_send_skb+0xdd/0x260 [ 2529.569151] udp_send_skb+0x6da/0x11d0 [ 2529.569629] udp_sendmsg+0x139a/0x2160 [ 2529.570094] ? clockevents_program_event+0x14b/0x360 [ 2529.570698] ? ip_frag_init+0x350/0x350 [ 2529.571168] ? lock_acquire+0x197/0x470 [ 2529.571642] ? find_held_lock+0x2c/0x110 [ 2529.572130] ? udp_setsockopt+0xc0/0xc0 [ 2529.572650] ? perf_event_update_userpage+0x4aa/0x7f0 [ 2529.573261] ? lock_downgrade+0x6d0/0x6d0 [ 2529.573761] ? mark_lock+0xf5/0x2df0 [ 2529.574209] ? mark_lock+0xf5/0x2df0 [ 2529.574654] ? lock_chain_count+0x20/0x20 [ 2529.575148] ? perf_event_task_disable+0x390/0x390 [ 2529.575737] ? lock_chain_count+0x20/0x20 [ 2529.576259] ? lock_chain_count+0x20/0x20 [ 2529.576811] ? mark_lock+0xf5/0x2df0 [ 2529.577278] ? lock_chain_count+0x20/0x20 [ 2529.577793] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2529.578296] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.578923] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.579431] ? mark_lock+0xf5/0x2df0 [ 2529.579900] ? lock_acquire+0x197/0x470 [ 2529.580419] ? find_held_lock+0x2c/0x110 [ 2529.580937] ? __might_fault+0xd3/0x180 [ 2529.581424] ? lock_downgrade+0x6d0/0x6d0 [ 2529.581935] ? lock_downgrade+0x6d0/0x6d0 [ 2529.582443] ? sock_has_perm+0x1ea/0x280 [ 2529.582932] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2529.583560] ? _copy_from_user+0xfb/0x1b0 [ 2529.584070] ? __import_iovec+0x458/0x590 [ 2529.584607] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.585229] inet6_sendmsg+0x105/0x140 [ 2529.585697] ? inet6_compat_ioctl+0x320/0x320 [ 2529.586357] __sock_sendmsg+0xf2/0x190 [ 2529.586925] ____sys_sendmsg+0x70d/0x870 [ 2529.587537] ? sock_write_iter+0x3d0/0x3d0 [ 2529.588165] ? do_recvmmsg+0x6d0/0x6d0 [ 2529.588789] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.589350] ? lock_downgrade+0x6d0/0x6d0 [ 2529.589929] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.590623] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.591120] ___sys_sendmsg+0xf3/0x170 [ 2529.591629] ? sendmsg_copy_msghdr+0x160/0x160 [ 2529.592178] ? __fget_files+0x2cf/0x520 [ 2529.592704] ? lock_downgrade+0x6d0/0x6d0 [ 2529.593205] ? find_held_lock+0x2c/0x110 [ 2529.593708] ? __fget_files+0x2f8/0x520 [ 2529.594193] ? __fget_light+0xea/0x290 [ 2529.594678] __sys_sendmsg+0xe5/0x1b0 [ 2529.595145] ? __sys_sendmsg_sock+0x40/0x40 [ 2529.595693] ? rcu_read_lock_any_held+0x75/0xa0 [ 2529.596280] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.596956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2529.597567] ? trace_hardirqs_on+0x5b/0x180 [ 2529.598081] do_syscall_64+0x33/0x40 [ 2529.598541] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2529.599199] RIP: 0033:0x7f251a6f7b19 [ 2529.599917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2529.602353] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2529.603336] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2529.604204] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2529.605098] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2529.605947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2529.606799] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2529.613665] FAULT_INJECTION: forcing a failure. [ 2529.613665] name failslab, interval 1, probability 0, space 0, times 0 [ 2529.614998] CPU: 1 PID: 11573 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2529.615812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2529.616831] Call Trace: [ 2529.617149] dump_stack+0x107/0x167 [ 2529.617588] should_fail.cold+0x5/0xa [ 2529.618043] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2529.618665] ? create_object.isra.0+0x3a/0xa20 [ 2529.619208] should_failslab+0x5/0x20 [ 2529.619667] kmem_cache_alloc+0x5b/0x310 [ 2529.620146] ? mark_held_locks+0x9e/0xe0 [ 2529.620686] create_object.isra.0+0x3a/0xa20 [ 2529.621337] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2529.622076] kmem_cache_alloc_node+0x169/0x330 [ 2529.622714] __alloc_skb+0x6d/0x5b0 [ 2529.623235] skb_segment+0x9d8/0x3aa0 [ 2529.623770] ? __lock_acquire+0xbb1/0x5b00 [ 2529.624412] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2529.625113] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.625834] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.626402] __udp_gso_segment+0x11c6/0x1830 [ 2529.627014] ? __sk_receive_skb+0x830/0x830 [ 2529.627631] udp4_ufo_fragment+0x528/0x720 [ 2529.628212] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2529.628918] inet_gso_segment+0x4fb/0x11a0 [ 2529.629452] skb_mac_gso_segment+0x273/0x570 [ 2529.629973] ? inet_sock_destruct+0x840/0x840 [ 2529.630522] ? skb_network_protocol+0x650/0x650 [ 2529.631069] ? skb_crc32c_csum_help+0x80/0x80 [ 2529.631621] ? lock_acquire+0x197/0x470 [ 2529.632089] ? __dev_queue_xmit+0x1c6/0x2690 [ 2529.632644] __skb_gso_segment+0x32d/0x6d0 [ 2529.633146] ? mark_lock+0xf5/0x2df0 [ 2529.633601] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2529.634274] ? lock_chain_count+0x20/0x20 [ 2529.634851] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2529.635510] __dev_queue_xmit+0x825/0x2690 [ 2529.636099] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2529.636872] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2529.637532] ? mark_held_locks+0x9e/0xe0 [ 2529.638097] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2529.638764] neigh_connected_output+0x382/0x4d0 [ 2529.639341] ip_finish_output2+0x6f1/0x21f0 [ 2529.639887] ? nf_hook_slow+0xfc/0x1e0 [ 2529.640369] ? ip_frag_next+0x9e0/0x9e0 [ 2529.640879] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2529.641517] __ip_finish_output.part.0+0x5f3/0xb50 [ 2529.642118] ? ip_fragment.constprop.0+0x240/0x240 [ 2529.642790] ? netif_rx_ni+0xe7/0x300 [ 2529.643351] ip_mc_output+0x401/0xa30 [ 2529.643916] ip_send_skb+0xdd/0x260 [ 2529.644466] udp_send_skb+0x6da/0x11d0 [ 2529.645059] udp_sendmsg+0x139a/0x2160 [ 2529.645625] ? mark_lock+0xf5/0x2df0 [ 2529.646165] ? ip_frag_init+0x350/0x350 [ 2529.646698] ? lock_chain_count+0x20/0x20 [ 2529.647227] ? udp_setsockopt+0xc0/0xc0 [ 2529.647711] ? mark_lock+0xf5/0x2df0 [ 2529.648176] ? lock_acquire+0x197/0x470 [ 2529.648700] ? lock_chain_count+0x20/0x20 [ 2529.649212] ? mark_lock+0xf5/0x2df0 [ 2529.649669] ? mark_lock+0xf5/0x2df0 [ 2529.650113] ? lock_chain_count+0x20/0x20 [ 2529.650614] ? __lock_acquire+0xbb1/0x5b00 [ 2529.651121] ? lock_chain_count+0x20/0x20 [ 2529.651634] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.652279] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.652817] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2529.653315] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.653941] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.654440] ? mark_lock+0xf5/0x2df0 [ 2529.654913] ? lock_acquire+0x197/0x470 [ 2529.655399] ? find_held_lock+0x2c/0x110 [ 2529.655910] ? __might_fault+0xd3/0x180 [ 2529.656419] ? lock_downgrade+0x6d0/0x6d0 [ 2529.656941] ? lock_downgrade+0x6d0/0x6d0 [ 2529.657467] ? sock_has_perm+0x1ea/0x280 [ 2529.657972] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2529.658599] ? _copy_from_user+0xfb/0x1b0 [ 2529.659107] ? __import_iovec+0x458/0x590 [ 2529.659615] ? udp_v6_push_pending_frames+0x360/0x360 [ 2529.660232] inet6_sendmsg+0x105/0x140 [ 2529.660754] ? inet6_compat_ioctl+0x320/0x320 [ 2529.661295] __sock_sendmsg+0xf2/0x190 [ 2529.661771] ____sys_sendmsg+0x70d/0x870 [ 2529.662262] ? sock_write_iter+0x3d0/0x3d0 [ 2529.662773] ? do_recvmmsg+0x6d0/0x6d0 [ 2529.663237] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.663731] ? lock_downgrade+0x6d0/0x6d0 [ 2529.664231] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2529.664899] ? SOFTIRQ_verbose+0x10/0x10 [ 2529.665396] ___sys_sendmsg+0xf3/0x170 [ 2529.665877] ? sendmsg_copy_msghdr+0x160/0x160 [ 2529.666432] ? __fget_files+0x2cf/0x520 [ 2529.666914] ? lock_downgrade+0x6d0/0x6d0 [ 2529.667428] ? find_held_lock+0x2c/0x110 [ 2529.667926] ? __fget_files+0x2f8/0x520 [ 2529.668440] ? __fget_light+0xea/0x290 [ 2529.668916] __sys_sendmsg+0xe5/0x1b0 [ 2529.669369] ? __sys_sendmsg_sock+0x40/0x40 [ 2529.669887] ? rcu_read_lock_any_held+0x75/0xa0 [ 2529.670458] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2529.671086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2529.671699] ? trace_hardirqs_on+0x5b/0x180 [ 2529.672209] do_syscall_64+0x33/0x40 [ 2529.672684] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2529.673289] RIP: 0033:0x7f3f9ec55b19 [ 2529.673738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2529.675890] RSP: 002b:00007f3f9c1cb188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2529.676816] RAX: ffffffffffffffda RBX: 00007f3f9ed68f60 RCX: 00007f3f9ec55b19 [ 2529.677793] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2529.678786] RBP: 00007f3f9c1cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2529.679786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2529.680758] R13: 00007ffc3dc4976f R14: 00007f3f9c1cb300 R15: 0000000000022000 09:54:17 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x13a, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4000, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 83) 09:54:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 84) 09:54:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x37f2}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:17 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:54:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x1c000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2546.226985] FAULT_INJECTION: forcing a failure. [ 2546.226985] name failslab, interval 1, probability 0, space 0, times 0 [ 2546.228617] CPU: 0 PID: 11596 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2546.229572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2546.230736] Call Trace: [ 2546.231123] dump_stack+0x107/0x167 [ 2546.231643] should_fail.cold+0x5/0xa [ 2546.232186] ? create_object.isra.0+0x3a/0xa20 [ 2546.232826] should_failslab+0x5/0x20 [ 2546.233379] kmem_cache_alloc+0x5b/0x310 [ 2546.233927] create_object.isra.0+0x3a/0xa20 [ 2546.241473] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2546.242142] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2546.242811] ? skb_segment+0x9d8/0x3aa0 [ 2546.243337] __alloc_skb+0xb1/0x5b0 [ 2546.243822] skb_segment+0x9d8/0x3aa0 [ 2546.244324] ? __lock_acquire+0xbb1/0x5b00 [ 2546.244907] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2546.245583] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.246268] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.246810] __udp_gso_segment+0x11c6/0x1830 [ 2546.247386] ? __sk_receive_skb+0x830/0x830 [ 2546.247958] udp4_ufo_fragment+0x528/0x720 [ 2546.248517] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2546.249190] inet_gso_segment+0x4fb/0x11a0 [ 2546.249758] skb_mac_gso_segment+0x273/0x570 [ 2546.250334] ? inet_sock_destruct+0x840/0x840 [ 2546.250921] ? skb_network_protocol+0x650/0x650 [ 2546.251529] ? skb_crc32c_csum_help+0x80/0x80 [ 2546.252115] ? lock_acquire+0x197/0x470 [ 2546.252634] ? __dev_queue_xmit+0x1c6/0x2690 [ 2546.253227] __skb_gso_segment+0x32d/0x6d0 [ 2546.253785] ? mark_lock+0xf5/0x2df0 [ 2546.254277] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2546.254966] ? lock_chain_count+0x20/0x20 [ 2546.255509] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2546.256110] __dev_queue_xmit+0x825/0x2690 [ 2546.256671] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2546.257363] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2546.257970] ? mark_held_locks+0x9e/0xe0 [ 2546.258508] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2546.259199] neigh_connected_output+0x382/0x4d0 [ 2546.259824] ip_finish_output2+0x6f1/0x21f0 [ 2546.260393] ? nf_hook_slow+0xfc/0x1e0 [ 2546.260905] ? ip_frag_next+0x9e0/0x9e0 [ 2546.261443] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2546.262104] __ip_finish_output.part.0+0x5f3/0xb50 [ 2546.262756] ? ip_fragment.constprop.0+0x240/0x240 [ 2546.263402] ? netif_rx_ni+0xe7/0x300 [ 2546.263906] ip_mc_output+0x401/0xa30 [ 2546.264412] ip_send_skb+0xdd/0x260 [ 2546.264894] udp_send_skb+0x6da/0x11d0 [ 2546.265429] udp_sendmsg+0x139a/0x2160 [ 2546.265938] ? mark_lock+0xf5/0x2df0 [ 2546.266430] ? ip_frag_init+0x350/0x350 [ 2546.266954] ? lock_chain_count+0x20/0x20 [ 2546.267509] ? udp_setsockopt+0xc0/0xc0 [ 2546.268027] ? mark_lock+0xf5/0x2df0 [ 2546.268520] ? lock_acquire+0x197/0x470 [ 2546.269053] ? lock_chain_count+0x20/0x20 [ 2546.269599] ? mark_lock+0xf5/0x2df0 [ 2546.270090] ? mark_lock+0xf5/0x2df0 [ 2546.270580] ? lock_chain_count+0x20/0x20 [ 2546.271121] ? __lock_acquire+0xbb1/0x5b00 [ 2546.271678] ? lock_chain_count+0x20/0x20 [ 2546.272232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.272918] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.273476] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2546.274021] ? udp_v6_push_pending_frames+0x360/0x360 [ 2546.274695] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.275231] ? mark_lock+0xf5/0x2df0 [ 2546.275724] ? lock_acquire+0x197/0x470 [ 2546.276247] ? find_held_lock+0x2c/0x110 [ 2546.276786] ? __might_fault+0xd3/0x180 [ 2546.281345] ? lock_downgrade+0x6d0/0x6d0 [ 2546.281892] ? lock_downgrade+0x6d0/0x6d0 [ 2546.282438] ? sock_has_perm+0x1ea/0x280 [ 2546.282969] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2546.283650] ? _copy_from_user+0xfb/0x1b0 [ 2546.284202] ? __import_iovec+0x458/0x590 [ 2546.284746] ? udp_v6_push_pending_frames+0x360/0x360 [ 2546.285449] inet6_sendmsg+0x105/0x140 [ 2546.285960] ? inet6_compat_ioctl+0x320/0x320 [ 2546.286548] __sock_sendmsg+0xf2/0x190 [ 2546.287059] ____sys_sendmsg+0x70d/0x870 [ 2546.287594] ? sock_write_iter+0x3d0/0x3d0 [ 2546.288145] ? do_recvmmsg+0x6d0/0x6d0 [ 2546.288659] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.289208] ? lock_downgrade+0x6d0/0x6d0 [ 2546.289755] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.290442] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.290978] ___sys_sendmsg+0xf3/0x170 [ 2546.291492] ? sendmsg_copy_msghdr+0x160/0x160 [ 2546.292097] ? __fget_files+0x2cf/0x520 [ 2546.292620] ? lock_downgrade+0x6d0/0x6d0 [ 2546.293180] ? find_held_lock+0x2c/0x110 [ 2546.293723] ? __fget_files+0x2f8/0x520 [ 2546.294252] ? __fget_light+0xea/0x290 [ 2546.294772] __sys_sendmsg+0xe5/0x1b0 [ 2546.295271] ? __sys_sendmsg_sock+0x40/0x40 [ 2546.295838] ? rcu_read_lock_any_held+0x75/0xa0 [ 2546.296462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2546.297202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2546.297877] ? trace_hardirqs_on+0x5b/0x180 [ 2546.298446] do_syscall_64+0x33/0x40 [ 2546.298937] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2546.299611] RIP: 0033:0x7f251a6f7b19 [ 2546.300103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2546.306529] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2546.307533] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2546.308466] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2546.309419] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2546.310351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2546.311285] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x3b71}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:17 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1e5, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x28000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 85) 09:54:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x3ef0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2546.633557] FAULT_INJECTION: forcing a failure. [ 2546.633557] name failslab, interval 1, probability 0, space 0, times 0 [ 2546.634972] CPU: 1 PID: 11631 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2546.635815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2546.636827] Call Trace: [ 2546.637189] dump_stack+0x107/0x167 [ 2546.637639] should_fail.cold+0x5/0xa [ 2546.638107] ? trace_hardirqs_on+0x5b/0x180 [ 2546.638639] ? __alloc_skb+0x6d/0x5b0 [ 2546.639111] should_failslab+0x5/0x20 [ 2546.639580] kmem_cache_alloc_node+0x55/0x330 [ 2546.640136] __alloc_skb+0x6d/0x5b0 [ 2546.640588] skb_segment+0x9d8/0x3aa0 [ 2546.641102] ? __lock_acquire+0xbb1/0x5b00 [ 2546.641653] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2546.642268] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.642909] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.643414] __udp_gso_segment+0x11c6/0x1830 [ 2546.643953] ? __sk_receive_skb+0x830/0x830 [ 2546.644496] udp4_ufo_fragment+0x528/0x720 [ 2546.645041] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2546.645660] inet_gso_segment+0x4fb/0x11a0 [ 2546.646193] skb_mac_gso_segment+0x273/0x570 [ 2546.646735] ? inet_sock_destruct+0x840/0x840 [ 2546.647292] ? skb_network_protocol+0x650/0x650 [ 2546.647861] ? skb_crc32c_csum_help+0x80/0x80 [ 2546.648412] ? lock_acquire+0x197/0x470 [ 2546.648898] ? __dev_queue_xmit+0x1c6/0x2690 [ 2546.649478] __skb_gso_segment+0x32d/0x6d0 [ 2546.649999] ? mark_lock+0xf5/0x2df0 [ 2546.650465] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2546.651109] ? lock_chain_count+0x20/0x20 [ 2546.651618] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2546.652182] __dev_queue_xmit+0x825/0x2690 [ 2546.652707] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2546.653371] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2546.653939] ? mark_held_locks+0x9e/0xe0 [ 2546.654442] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2546.655090] neigh_connected_output+0x382/0x4d0 [ 2546.655674] ip_finish_output2+0x6f1/0x21f0 [ 2546.656213] ? nf_hook_slow+0xfc/0x1e0 [ 2546.656693] ? ip_frag_next+0x9e0/0x9e0 [ 2546.657242] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2546.657864] __ip_finish_output.part.0+0x5f3/0xb50 [ 2546.658468] ? ip_fragment.constprop.0+0x240/0x240 [ 2546.659071] ? netif_rx_ni+0xe7/0x300 [ 2546.659545] ip_mc_output+0x401/0xa30 [ 2546.660018] ip_send_skb+0xdd/0x260 [ 2546.660470] udp_send_skb+0x6da/0x11d0 [ 2546.660973] udp_sendmsg+0x139a/0x2160 [ 2546.661473] ? mark_lock+0xf5/0x2df0 [ 2546.661944] ? ip_frag_init+0x350/0x350 [ 2546.662446] ? lock_chain_count+0x20/0x20 [ 2546.662972] ? udp_setsockopt+0xc0/0xc0 [ 2546.663469] ? mark_lock+0xf5/0x2df0 [ 2546.663937] ? lock_acquire+0x197/0x470 [ 2546.664430] ? lock_chain_count+0x20/0x20 [ 2546.664941] ? mark_lock+0xf5/0x2df0 [ 2546.665431] ? mark_lock+0xf5/0x2df0 [ 2546.665890] ? lock_chain_count+0x20/0x20 [ 2546.666399] ? __lock_acquire+0xbb1/0x5b00 [ 2546.666922] ? lock_chain_count+0x20/0x20 [ 2546.667443] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.668084] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.668593] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2546.669142] ? udp_v6_push_pending_frames+0x360/0x360 [ 2546.669769] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.670294] ? mark_lock+0xf5/0x2df0 [ 2546.670774] ? lock_acquire+0x197/0x470 [ 2546.671277] ? find_held_lock+0x2c/0x110 [ 2546.671798] ? __might_fault+0xd3/0x180 [ 2546.672310] ? lock_downgrade+0x6d0/0x6d0 [ 2546.672840] ? lock_downgrade+0x6d0/0x6d0 [ 2546.673435] ? sock_has_perm+0x1ea/0x280 [ 2546.673954] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2546.674612] ? _copy_from_user+0xfb/0x1b0 [ 2546.675152] ? __import_iovec+0x458/0x590 [ 2546.675679] ? udp_v6_push_pending_frames+0x360/0x360 [ 2546.676335] inet6_sendmsg+0x105/0x140 [ 2546.676832] ? inet6_compat_ioctl+0x320/0x320 [ 2546.677435] __sock_sendmsg+0xf2/0x190 [ 2546.677932] ____sys_sendmsg+0x70d/0x870 [ 2546.678451] ? sock_write_iter+0x3d0/0x3d0 [ 2546.678986] ? do_recvmmsg+0x6d0/0x6d0 [ 2546.679484] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.679994] ? lock_downgrade+0x6d0/0x6d0 [ 2546.680524] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2546.681231] ? SOFTIRQ_verbose+0x10/0x10 [ 2546.681759] ___sys_sendmsg+0xf3/0x170 [ 2546.682261] ? sendmsg_copy_msghdr+0x160/0x160 [ 2546.682847] ? __fget_files+0x2cf/0x520 [ 2546.683352] ? lock_downgrade+0x6d0/0x6d0 [ 2546.683878] ? find_held_lock+0x2c/0x110 [ 2546.684405] ? __fget_files+0x2f8/0x520 [ 2546.684922] ? __fget_light+0xea/0x290 [ 2546.685481] __sys_sendmsg+0xe5/0x1b0 [ 2546.685966] ? __sys_sendmsg_sock+0x40/0x40 [ 2546.686513] ? rcu_read_lock_any_held+0x75/0xa0 [ 2546.687120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2546.687784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2546.688434] ? trace_hardirqs_on+0x5b/0x180 [ 2546.693031] do_syscall_64+0x33/0x40 [ 2546.693516] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2546.694187] RIP: 0033:0x7f251a6f7b19 [ 2546.694677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2546.697079] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2546.698087] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2546.698988] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2546.699887] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2546.700786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2546.709735] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x426f}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x36000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:18 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:18 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:54:40 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:54:40 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2b6, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:40 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:40 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 86) 09:54:40 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x45ee}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x3f000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2569.826222] FAULT_INJECTION: forcing a failure. [ 2569.826222] name failslab, interval 1, probability 0, space 0, times 0 [ 2569.827736] CPU: 0 PID: 11688 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2569.828629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2569.829699] Call Trace: [ 2569.833996] dump_stack+0x107/0x167 [ 2569.834470] should_fail.cold+0x5/0xa [ 2569.834969] ? create_object.isra.0+0x3a/0xa20 [ 2569.835575] should_failslab+0x5/0x20 [ 2569.836077] kmem_cache_alloc+0x5b/0x310 [ 2569.836615] create_object.isra.0+0x3a/0xa20 [ 2569.837185] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2569.837867] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2569.838532] ? skb_segment+0x9d8/0x3aa0 [ 2569.839047] __alloc_skb+0xb1/0x5b0 [ 2569.839526] skb_segment+0x9d8/0x3aa0 [ 2569.840027] ? __lock_acquire+0xbb1/0x5b00 [ 2569.840638] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2569.841332] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2569.842041] ? SOFTIRQ_verbose+0x10/0x10 [ 2569.842575] __udp_gso_segment+0x11c6/0x1830 [ 2569.843149] ? __sk_receive_skb+0x830/0x830 [ 2569.843739] udp4_ufo_fragment+0x528/0x720 [ 2569.844322] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2569.844980] inet_gso_segment+0x4fb/0x11a0 [ 2569.845554] skb_mac_gso_segment+0x273/0x570 [ 2569.846153] ? inet_sock_destruct+0x840/0x840 [ 2569.846758] ? skb_network_protocol+0x650/0x650 [ 2569.847361] ? skb_crc32c_csum_help+0x80/0x80 [ 2569.847954] ? lock_acquire+0x197/0x470 [ 2569.848479] ? __dev_queue_xmit+0x1c6/0x2690 [ 2569.849054] __skb_gso_segment+0x32d/0x6d0 [ 2569.849614] ? mark_lock+0xf5/0x2df0 [ 2569.850120] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2569.850828] ? lock_chain_count+0x20/0x20 [ 2569.851370] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2569.851974] __dev_queue_xmit+0x825/0x2690 [ 2569.852541] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2569.853209] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2569.853833] ? mark_held_locks+0x9e/0xe0 [ 2569.854377] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2569.855063] neigh_connected_output+0x382/0x4d0 [ 2569.855681] ip_finish_output2+0x6f1/0x21f0 [ 2569.856247] ? nf_hook_slow+0xfc/0x1e0 [ 2569.856762] ? ip_frag_next+0x9e0/0x9e0 [ 2569.857278] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2569.857964] __ip_finish_output.part.0+0x5f3/0xb50 [ 2569.858604] ? ip_fragment.constprop.0+0x240/0x240 [ 2569.859231] ? netif_rx_ni+0xe7/0x300 [ 2569.859754] ip_mc_output+0x401/0xa30 [ 2569.860291] ip_send_skb+0xdd/0x260 [ 2569.860807] udp_send_skb+0x6da/0x11d0 [ 2569.861327] udp_sendmsg+0x139a/0x2160 [ 2569.861842] ? mark_lock+0xf5/0x2df0 [ 2569.862334] ? ip_frag_init+0x350/0x350 [ 2569.862855] ? lock_chain_count+0x20/0x20 [ 2569.863404] ? udp_setsockopt+0xc0/0xc0 [ 2569.863941] ? mark_lock+0xf5/0x2df0 [ 2569.864440] ? lock_acquire+0x197/0x470 [ 2569.864964] ? lock_chain_count+0x20/0x20 [ 2569.865506] ? mark_lock+0xf5/0x2df0 [ 2569.866021] ? mark_lock+0xf5/0x2df0 [ 2569.866521] ? lock_chain_count+0x20/0x20 [ 2569.867061] ? __lock_acquire+0xbb1/0x5b00 [ 2569.867605] ? lock_chain_count+0x20/0x20 [ 2569.868155] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2569.868825] ? SOFTIRQ_verbose+0x10/0x10 [ 2569.869363] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2569.869925] ? udp_v6_push_pending_frames+0x360/0x360 [ 2569.870582] ? SOFTIRQ_verbose+0x10/0x10 [ 2569.871104] ? mark_lock+0xf5/0x2df0 [ 2569.871590] ? lock_acquire+0x197/0x470 [ 2569.872136] ? find_held_lock+0x2c/0x110 [ 2569.872717] ? __might_fault+0xd3/0x180 [ 2569.873268] ? lock_downgrade+0x6d0/0x6d0 [ 2569.873881] ? lock_downgrade+0x6d0/0x6d0 [ 2569.874451] ? sock_has_perm+0x1ea/0x280 [ 2569.874980] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2569.875649] ? _copy_from_user+0xfb/0x1b0 [ 2569.876192] ? __import_iovec+0x458/0x590 [ 2569.876722] ? udp_v6_push_pending_frames+0x360/0x360 [ 2569.877390] inet6_sendmsg+0x105/0x140 [ 2569.877926] ? inet6_compat_ioctl+0x320/0x320 [ 2569.878519] __sock_sendmsg+0xf2/0x190 [ 2569.879037] ____sys_sendmsg+0x70d/0x870 [ 2569.879580] ? sock_write_iter+0x3d0/0x3d0 [ 2569.880125] ? do_recvmmsg+0x6d0/0x6d0 [ 2569.880638] ? SOFTIRQ_verbose+0x10/0x10 [ 2569.881169] ? lock_downgrade+0x6d0/0x6d0 [ 2569.881728] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2569.882463] ? SOFTIRQ_verbose+0x10/0x10 [ 2569.883031] ___sys_sendmsg+0xf3/0x170 [ 2569.883570] ? sendmsg_copy_msghdr+0x160/0x160 [ 2569.884208] ? __fget_files+0x2cf/0x520 [ 2569.884745] ? lock_downgrade+0x6d0/0x6d0 [ 2569.885279] ? find_held_lock+0x2c/0x110 [ 2569.885853] ? __fget_files+0x2f8/0x520 [ 2569.886418] ? __fget_light+0xea/0x290 [ 2569.886970] __sys_sendmsg+0xe5/0x1b0 [ 2569.887497] ? __sys_sendmsg_sock+0x40/0x40 [ 2569.888098] ? rcu_read_lock_any_held+0x75/0xa0 [ 2569.888758] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2569.889478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2569.890216] ? trace_hardirqs_on+0x5b/0x180 [ 2569.890815] do_syscall_64+0x33/0x40 [ 2569.891298] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2569.891956] RIP: 0033:0x7f251a6f7b19 [ 2569.892439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2569.894782] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2569.895742] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2569.896641] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2569.897547] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2569.898490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2569.899402] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:56 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:56 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:56 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) [ 2584.992315] blktrace: Concurrent blktraces are not allowed on loop14 09:54:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 87) 09:54:56 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:54:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x58030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:56 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2c5, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x496d}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x4cec}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2585.151818] FAULT_INJECTION: forcing a failure. [ 2585.151818] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.155230] CPU: 1 PID: 11721 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2585.157235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2585.159661] Call Trace: [ 2585.160420] dump_stack+0x107/0x167 [ 2585.161473] should_fail.cold+0x5/0xa [ 2585.162597] should_failslab+0x5/0x20 [ 2585.163703] __kmalloc_node_track_caller+0x74/0x3b0 [ 2585.165155] ? skb_segment+0x9d8/0x3aa0 [ 2585.166351] __alloc_skb+0xb1/0x5b0 [ 2585.167416] skb_segment+0x9d8/0x3aa0 [ 2585.168521] ? __lock_acquire+0xbb1/0x5b00 [ 2585.169780] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2585.171252] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.172772] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.173949] __udp_gso_segment+0x11c6/0x1830 [ 2585.175251] ? __sk_receive_skb+0x830/0x830 [ 2585.176501] udp4_ufo_fragment+0x528/0x720 [ 2585.177727] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2585.179196] inet_gso_segment+0x4fb/0x11a0 [ 2585.180432] skb_mac_gso_segment+0x273/0x570 [ 2585.181698] ? inet_sock_destruct+0x840/0x840 [ 2585.183006] ? skb_network_protocol+0x650/0x650 [ 2585.184345] ? skb_crc32c_csum_help+0x80/0x80 [ 2585.185643] ? lock_acquire+0x197/0x470 [ 2585.186807] ? __dev_queue_xmit+0x1c6/0x2690 [ 2585.188183] __skb_gso_segment+0x32d/0x6d0 [ 2585.189404] ? mark_lock+0xf5/0x2df0 [ 2585.190497] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2585.192014] ? lock_chain_count+0x20/0x20 [ 2585.193211] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2585.194544] __dev_queue_xmit+0x825/0x2690 [ 2585.195776] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2585.197264] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2585.198915] ? mark_held_locks+0x9e/0xe0 [ 2585.200098] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2585.201626] neigh_connected_output+0x382/0x4d0 [ 2585.203001] ip_finish_output2+0x6f1/0x21f0 [ 2585.204254] ? nf_hook_slow+0xfc/0x1e0 [ 2585.205387] ? ip_frag_next+0x9e0/0x9e0 [ 2585.206552] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2585.208052] __ip_finish_output.part.0+0x5f3/0xb50 [ 2585.209475] ? ip_fragment.constprop.0+0x240/0x240 [ 2585.210909] ? netif_rx_ni+0xe7/0x300 [ 2585.212022] ip_mc_output+0x401/0xa30 [ 2585.212579] ip_send_skb+0xdd/0x260 [ 2585.213435] udp_send_skb+0x6da/0x11d0 [ 2585.214315] udp_sendmsg+0x139a/0x2160 [ 2585.215006] ? mark_lock+0xf5/0x2df0 [ 2585.215586] ? ip_frag_init+0x350/0x350 [ 2585.216159] ? lock_chain_count+0x20/0x20 [ 2585.217307] ? udp_setsockopt+0xc0/0xc0 [ 2585.218470] ? mark_lock+0xf5/0x2df0 [ 2585.219541] ? lock_acquire+0x197/0x470 [ 2585.220687] ? lock_chain_count+0x20/0x20 [ 2585.221926] ? mark_lock+0xf5/0x2df0 [ 2585.223018] ? mark_lock+0xf5/0x2df0 [ 2585.224091] ? lock_chain_count+0x20/0x20 [ 2585.225330] ? __lock_acquire+0xbb1/0x5b00 [ 2585.230491] ? lock_chain_count+0x20/0x20 [ 2585.231058] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.231716] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.232238] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2585.232754] ? udp_v6_push_pending_frames+0x360/0x360 [ 2585.233424] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.233933] ? mark_lock+0xf5/0x2df0 [ 2585.234437] ? lock_acquire+0x197/0x470 [ 2585.234931] ? find_held_lock+0x2c/0x110 [ 2585.235463] ? __might_fault+0xd3/0x180 [ 2585.235951] ? lock_downgrade+0x6d0/0x6d0 [ 2585.236461] ? lock_downgrade+0x6d0/0x6d0 [ 2585.236972] ? sock_has_perm+0x1ea/0x280 [ 2585.237469] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2585.238105] ? _copy_from_user+0xfb/0x1b0 [ 2585.238647] ? __import_iovec+0x458/0x590 [ 2585.239158] ? udp_v6_push_pending_frames+0x360/0x360 [ 2585.239795] inet6_sendmsg+0x105/0x140 [ 2585.240285] ? inet6_compat_ioctl+0x320/0x320 [ 2585.240866] __sock_sendmsg+0xf2/0x190 [ 2585.241344] ____sys_sendmsg+0x70d/0x870 [ 2585.241847] ? sock_write_iter+0x3d0/0x3d0 [ 2585.242373] ? do_recvmmsg+0x6d0/0x6d0 [ 2585.242886] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.243405] ? lock_downgrade+0x6d0/0x6d0 [ 2585.243920] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.244560] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.245061] ___sys_sendmsg+0xf3/0x170 [ 2585.245542] ? sendmsg_copy_msghdr+0x160/0x160 [ 2585.246110] ? __fget_files+0x2cf/0x520 [ 2585.246616] ? lock_downgrade+0x6d0/0x6d0 [ 2585.247169] ? find_held_lock+0x2c/0x110 [ 2585.247682] ? __fget_files+0x2f8/0x520 [ 2585.248206] ? __fget_light+0xea/0x290 [ 2585.248692] __sys_sendmsg+0xe5/0x1b0 [ 2585.249161] ? __sys_sendmsg_sock+0x40/0x40 [ 2585.249691] ? rcu_read_lock_any_held+0x75/0xa0 [ 2585.250279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2585.250988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2585.251660] ? trace_hardirqs_on+0x5b/0x180 [ 2585.252234] do_syscall_64+0x33/0x40 [ 2585.252723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2585.253437] RIP: 0033:0x7f251a6f7b19 [ 2585.253951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2585.256262] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2585.257225] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2585.258095] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2585.259029] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.259929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2585.260804] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x60000000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 88) 09:54:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x506b}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:54:56 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:56 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:54:56 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2585.445771] FAULT_INJECTION: forcing a failure. [ 2585.445771] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.447231] CPU: 1 PID: 11739 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2585.448388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2585.449425] Call Trace: [ 2585.449810] dump_stack+0x107/0x167 [ 2585.450491] should_fail.cold+0x5/0xa [ 2585.451220] ? create_object.isra.0+0x3a/0xa20 [ 2585.451890] should_failslab+0x5/0x20 [ 2585.452548] kmem_cache_alloc+0x5b/0x310 [ 2585.453108] create_object.isra.0+0x3a/0xa20 [ 2585.453831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2585.454804] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2585.455525] ? skb_segment+0x9d8/0x3aa0 [ 2585.456233] __alloc_skb+0xb1/0x5b0 [ 2585.456697] skb_segment+0x9d8/0x3aa0 [ 2585.457189] ? __lock_acquire+0xbb1/0x5b00 [ 2585.457771] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2585.458445] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.459168] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.459843] __udp_gso_segment+0x11c6/0x1830 [ 2585.460659] ? __sk_receive_skb+0x830/0x830 [ 2585.461245] udp4_ufo_fragment+0x528/0x720 [ 2585.462033] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2585.462873] inet_gso_segment+0x4fb/0x11a0 [ 2585.463583] skb_mac_gso_segment+0x273/0x570 [ 2585.464349] ? inet_sock_destruct+0x840/0x840 [ 2585.464974] ? skb_network_protocol+0x650/0x650 [ 2585.465725] ? skb_crc32c_csum_help+0x80/0x80 [ 2585.466675] ? lock_acquire+0x197/0x470 [ 2585.468071] ? __dev_queue_xmit+0x1c6/0x2690 [ 2585.469557] __skb_gso_segment+0x32d/0x6d0 [ 2585.470864] ? mark_lock+0xf5/0x2df0 [ 2585.472078] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2585.473745] ? lock_chain_count+0x20/0x20 [ 2585.474771] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2585.475368] __dev_queue_xmit+0x825/0x2690 [ 2585.476021] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2585.476943] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2585.477535] ? mark_held_locks+0x9e/0xe0 [ 2585.478039] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2585.479244] neigh_connected_output+0x382/0x4d0 [ 2585.479836] ip_finish_output2+0x6f1/0x21f0 [ 2585.480385] ? nf_hook_slow+0xfc/0x1e0 [ 2585.480868] ? ip_frag_next+0x9e0/0x9e0 [ 2585.481360] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2585.481986] __ip_finish_output.part.0+0x5f3/0xb50 [ 2585.482994] ? ip_fragment.constprop.0+0x240/0x240 [ 2585.484274] ? netif_rx_ni+0xe7/0x300 [ 2585.485264] ip_mc_output+0x401/0xa30 [ 2585.486259] ip_send_skb+0xdd/0x260 [ 2585.487405] udp_send_skb+0x6da/0x11d0 [ 2585.488624] udp_sendmsg+0x139a/0x2160 [ 2585.489846] ? mark_lock+0xf5/0x2df0 [ 2585.490985] ? ip_frag_init+0x350/0x350 [ 2585.492202] ? lock_chain_count+0x20/0x20 [ 2585.493472] ? udp_setsockopt+0xc0/0xc0 [ 2585.494710] ? mark_lock+0xf5/0x2df0 [ 2585.495850] ? lock_acquire+0x197/0x470 [ 2585.497080] ? lock_chain_count+0x20/0x20 [ 2585.498357] ? mark_lock+0xf5/0x2df0 [ 2585.499505] ? mark_lock+0xf5/0x2df0 [ 2585.500644] ? lock_chain_count+0x20/0x20 [ 2585.501922] ? __lock_acquire+0xbb1/0x5b00 [ 2585.503247] ? lock_chain_count+0x20/0x20 [ 2585.504545] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.506140] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.507367] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2585.508554] ? udp_v6_push_pending_frames+0x360/0x360 [ 2585.510045] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.511234] ? mark_lock+0xf5/0x2df0 [ 2585.512313] ? lock_acquire+0x197/0x470 [ 2585.513459] ? find_held_lock+0x2c/0x110 [ 2585.514653] ? __might_fault+0xd3/0x180 [ 2585.515781] ? lock_downgrade+0x6d0/0x6d0 [ 2585.516764] ? lock_downgrade+0x6d0/0x6d0 [ 2585.517746] ? sock_has_perm+0x1ea/0x280 [ 2585.518826] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2585.520171] ? _copy_from_user+0xfb/0x1b0 [ 2585.521254] ? __import_iovec+0x458/0x590 [ 2585.522333] ? udp_v6_push_pending_frames+0x360/0x360 [ 2585.523946] inet6_sendmsg+0x105/0x140 [ 2585.525117] ? inet6_compat_ioctl+0x320/0x320 [ 2585.526494] __sock_sendmsg+0xf2/0x190 [ 2585.527693] ____sys_sendmsg+0x70d/0x870 [ 2585.528953] ? sock_write_iter+0x3d0/0x3d0 [ 2585.530256] ? do_recvmmsg+0x6d0/0x6d0 [ 2585.531439] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.532461] ? lock_downgrade+0x6d0/0x6d0 [ 2585.533506] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2585.534930] ? SOFTIRQ_verbose+0x10/0x10 [ 2585.535920] ___sys_sendmsg+0xf3/0x170 [ 2585.536864] ? sendmsg_copy_msghdr+0x160/0x160 [ 2585.537975] ? __fget_files+0x2cf/0x520 [ 2585.538965] ? lock_downgrade+0x6d0/0x6d0 [ 2585.539950] ? find_held_lock+0x2c/0x110 [ 2585.540923] ? __fget_files+0x2f8/0x520 [ 2585.541872] ? __fget_light+0xea/0x290 [ 2585.542614] __sys_sendmsg+0xe5/0x1b0 [ 2585.543086] ? __sys_sendmsg_sock+0x40/0x40 [ 2585.543619] ? rcu_read_lock_any_held+0x75/0xa0 [ 2585.544205] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2585.544854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2585.545489] ? trace_hardirqs_on+0x5b/0x180 [ 2585.546021] do_syscall_64+0x33/0x40 [ 2585.546690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2585.547943] RIP: 0033:0x7f251a6f7b19 [ 2585.548847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2585.553926] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2585.556121] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2585.557951] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2585.560054] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.561871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2585.563973] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:54:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x6c030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:54:56 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x600, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x53ea}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 89) 09:55:11 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:11 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:11 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:11 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:55:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x80030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:11 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2600.702689] FAULT_INJECTION: forcing a failure. [ 2600.702689] name failslab, interval 1, probability 0, space 0, times 0 [ 2600.704280] CPU: 0 PID: 11769 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2600.705248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2600.706394] Call Trace: [ 2600.706779] dump_stack+0x107/0x167 [ 2600.707287] should_fail.cold+0x5/0xa [ 2600.707802] ? trace_hardirqs_on+0x5b/0x180 [ 2600.708404] ? __alloc_skb+0x6d/0x5b0 [ 2600.708939] should_failslab+0x5/0x20 [ 2600.709474] kmem_cache_alloc_node+0x55/0x330 [ 2600.710081] __alloc_skb+0x6d/0x5b0 [ 2600.710574] skb_segment+0x9d8/0x3aa0 [ 2600.711099] ? __lock_acquire+0xbb1/0x5b00 [ 2600.711733] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2600.712431] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2600.713136] ? SOFTIRQ_verbose+0x10/0x10 [ 2600.713704] __udp_gso_segment+0x11c6/0x1830 [ 2600.714308] ? __sk_receive_skb+0x830/0x830 [ 2600.714980] udp4_ufo_fragment+0x528/0x720 [ 2600.715577] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2600.716255] inet_gso_segment+0x4fb/0x11a0 [ 2600.716882] skb_mac_gso_segment+0x273/0x570 [ 2600.717514] ? inet_sock_destruct+0x840/0x840 [ 2600.723177] ? skb_network_protocol+0x650/0x650 [ 2600.723789] ? skb_crc32c_csum_help+0x80/0x80 [ 2600.724398] ? lock_acquire+0x197/0x470 [ 2600.724947] ? __dev_queue_xmit+0x1c6/0x2690 [ 2600.725562] __skb_gso_segment+0x32d/0x6d0 [ 2600.726117] ? mark_lock+0xf5/0x2df0 [ 2600.726609] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2600.727316] ? lock_chain_count+0x20/0x20 [ 2600.727906] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2600.728542] __dev_queue_xmit+0x825/0x2690 [ 2600.729101] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2600.729781] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2600.730413] ? mark_held_locks+0x9e/0xe0 [ 2600.730999] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2600.731725] neigh_connected_output+0x382/0x4d0 [ 2600.732348] ip_finish_output2+0x6f1/0x21f0 [ 2600.732959] ? nf_hook_slow+0xfc/0x1e0 [ 2600.733507] ? ip_frag_next+0x9e0/0x9e0 [ 2600.734032] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2600.734695] __ip_finish_output.part.0+0x5f3/0xb50 [ 2600.735366] ? ip_fragment.constprop.0+0x240/0x240 [ 2600.736051] ? netif_rx_ni+0xe7/0x300 [ 2600.736590] ip_mc_output+0x401/0xa30 [ 2600.737097] ip_send_skb+0xdd/0x260 [ 2600.737624] udp_send_skb+0x6da/0x11d0 [ 2600.738151] udp_sendmsg+0x139a/0x2160 [ 2600.738694] ? mark_lock+0xf5/0x2df0 [ 2600.739198] ? ip_frag_init+0x350/0x350 [ 2600.739732] ? lock_chain_count+0x20/0x20 [ 2600.740280] ? udp_setsockopt+0xc0/0xc0 [ 2600.740859] ? mark_lock+0xf5/0x2df0 [ 2600.741354] ? lock_acquire+0x197/0x470 [ 2600.741885] ? lock_chain_count+0x20/0x20 [ 2600.742459] ? mark_lock+0xf5/0x2df0 [ 2600.742989] ? mark_lock+0xf5/0x2df0 [ 2600.743512] ? lock_chain_count+0x20/0x20 [ 2600.744059] ? __lock_acquire+0xbb1/0x5b00 [ 2600.744666] ? lock_chain_count+0x20/0x20 [ 2600.745231] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2600.745926] ? SOFTIRQ_verbose+0x10/0x10 [ 2600.746478] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2600.747059] ? udp_v6_push_pending_frames+0x360/0x360 [ 2600.747869] ? SOFTIRQ_verbose+0x10/0x10 [ 2600.748518] ? mark_lock+0xf5/0x2df0 [ 2600.749104] ? lock_acquire+0x197/0x470 [ 2600.749735] ? find_held_lock+0x2c/0x110 [ 2600.750378] ? __might_fault+0xd3/0x180 [ 2600.755049] ? lock_downgrade+0x6d0/0x6d0 [ 2600.755622] ? lock_downgrade+0x6d0/0x6d0 [ 2600.756166] ? sock_has_perm+0x1ea/0x280 [ 2600.756707] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2600.757386] ? _copy_from_user+0xfb/0x1b0 [ 2600.757983] ? __import_iovec+0x458/0x590 [ 2600.758560] ? udp_v6_push_pending_frames+0x360/0x360 [ 2600.759260] inet6_sendmsg+0x105/0x140 [ 2600.759776] ? inet6_compat_ioctl+0x320/0x320 [ 2600.760368] __sock_sendmsg+0xf2/0x190 [ 2600.760889] ____sys_sendmsg+0x70d/0x870 [ 2600.761425] ? sock_write_iter+0x3d0/0x3d0 [ 2600.761987] ? do_recvmmsg+0x6d0/0x6d0 [ 2600.762526] ? SOFTIRQ_verbose+0x10/0x10 [ 2600.763068] ? lock_downgrade+0x6d0/0x6d0 [ 2600.763654] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2600.764351] ? SOFTIRQ_verbose+0x10/0x10 [ 2600.764904] ___sys_sendmsg+0xf3/0x170 [ 2600.765429] ? sendmsg_copy_msghdr+0x160/0x160 [ 2600.766067] ? __fget_files+0x2cf/0x520 [ 2600.766615] ? lock_downgrade+0x6d0/0x6d0 [ 2600.767176] ? find_held_lock+0x2c/0x110 [ 2600.767717] ? __fget_files+0x2f8/0x520 [ 2600.768245] ? __fget_light+0xea/0x290 [ 2600.768807] __sys_sendmsg+0xe5/0x1b0 [ 2600.769313] ? __sys_sendmsg_sock+0x40/0x40 [ 2600.769904] ? rcu_read_lock_any_held+0x75/0xa0 [ 2600.770565] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2600.771281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2600.771979] ? trace_hardirqs_on+0x5b/0x180 [ 2600.772550] do_syscall_64+0x33/0x40 [ 2600.773038] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2600.773750] RIP: 0033:0x7f251a6f7b19 [ 2600.774245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2600.776763] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2600.777807] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2600.778769] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2600.783733] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2600.784708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2600.785673] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:12 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xa, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x8e030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x5769}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xb0050000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 90) 09:55:12 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x910b, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2601.138606] FAULT_INJECTION: forcing a failure. [ 2601.138606] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.140165] CPU: 1 PID: 11813 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2601.141075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2601.142162] Call Trace: [ 2601.142523] dump_stack+0x107/0x167 [ 2601.143032] should_fail.cold+0x5/0xa [ 2601.143543] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2601.144238] ? create_object.isra.0+0x3a/0xa20 [ 2601.144845] should_failslab+0x5/0x20 [ 2601.145350] kmem_cache_alloc+0x5b/0x310 [ 2601.145897] create_object.isra.0+0x3a/0xa20 [ 2601.146481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2601.147672] kmem_cache_alloc_node+0x169/0x330 [ 2601.148505] __alloc_skb+0x6d/0x5b0 [ 2601.149002] skb_segment+0x9d8/0x3aa0 [ 2601.149511] ? __lock_acquire+0xbb1/0x5b00 [ 2601.150105] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2601.150769] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2601.152323] ? SOFTIRQ_verbose+0x10/0x10 [ 2601.153658] __udp_gso_segment+0x11c6/0x1830 [ 2601.155116] ? __sk_receive_skb+0x830/0x830 [ 2601.156527] udp4_ufo_fragment+0x528/0x720 [ 2601.157914] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2601.159617] inet_gso_segment+0x4fb/0x11a0 [ 2601.161005] skb_mac_gso_segment+0x273/0x570 [ 2601.162436] ? inet_sock_destruct+0x840/0x840 [ 2601.163845] ? skb_network_protocol+0x650/0x650 [ 2601.165093] ? skb_crc32c_csum_help+0x80/0x80 [ 2601.166294] ? lock_acquire+0x197/0x470 [ 2601.167472] ? __dev_queue_xmit+0x1c6/0x2690 [ 2601.168656] __skb_gso_segment+0x32d/0x6d0 [ 2601.169783] ? mark_lock+0xf5/0x2df0 [ 2601.170774] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2601.172469] ? lock_chain_count+0x20/0x20 [ 2601.173568] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2601.174777] __dev_queue_xmit+0x825/0x2690 [ 2601.175424] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2601.176102] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2601.176715] ? mark_held_locks+0x9e/0xe0 [ 2601.177256] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2601.177951] neigh_connected_output+0x382/0x4d0 [ 2601.178576] ip_finish_output2+0x6f1/0x21f0 [ 2601.179505] ? nf_hook_slow+0xfc/0x1e0 [ 2601.180545] ? ip_frag_next+0x9e0/0x9e0 [ 2601.181608] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2601.182981] __ip_finish_output.part.0+0x5f3/0xb50 [ 2601.184534] ? ip_fragment.constprop.0+0x240/0x240 [ 2601.185826] ? netif_rx_ni+0xe7/0x300 [ 2601.186836] ip_mc_output+0x401/0xa30 [ 2601.188015] ip_send_skb+0xdd/0x260 [ 2601.188977] udp_send_skb+0x6da/0x11d0 [ 2601.190002] udp_sendmsg+0x139a/0x2160 [ 2601.191053] ? mark_lock+0xf5/0x2df0 [ 2601.192022] ? ip_frag_init+0x350/0x350 [ 2601.193040] ? lock_chain_count+0x20/0x20 [ 2601.194115] ? udp_setsockopt+0xc0/0xc0 [ 2601.195191] ? mark_lock+0xf5/0x2df0 [ 2601.196132] ? lock_acquire+0x197/0x470 [ 2601.197158] ? lock_chain_count+0x20/0x20 [ 2601.198237] ? mark_lock+0xf5/0x2df0 [ 2601.199319] ? mark_lock+0xf5/0x2df0 [ 2601.200305] ? lock_chain_count+0x20/0x20 [ 2601.201407] ? __lock_acquire+0xbb1/0x5b00 [ 2601.202536] ? lock_chain_count+0x20/0x20 [ 2601.203307] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2601.203993] ? SOFTIRQ_verbose+0x10/0x10 [ 2601.204543] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2601.205094] ? udp_v6_push_pending_frames+0x360/0x360 [ 2601.205776] ? SOFTIRQ_verbose+0x10/0x10 [ 2601.206316] ? mark_lock+0xf5/0x2df0 [ 2601.206814] ? lock_acquire+0x197/0x470 [ 2601.207997] ? find_held_lock+0x2c/0x110 [ 2601.209082] ? __might_fault+0xd3/0x180 [ 2601.210137] ? lock_downgrade+0x6d0/0x6d0 [ 2601.211344] ? lock_downgrade+0x6d0/0x6d0 [ 2601.212459] ? sock_has_perm+0x1ea/0x280 [ 2601.213521] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2601.214894] ? _copy_from_user+0xfb/0x1b0 [ 2601.216249] ? __import_iovec+0x458/0x590 [ 2601.217308] ? udp_v6_push_pending_frames+0x360/0x360 [ 2601.218604] inet6_sendmsg+0x105/0x140 [ 2601.219272] ? inet6_compat_ioctl+0x320/0x320 [ 2601.219820] __sock_sendmsg+0xf2/0x190 [ 2601.220318] ____sys_sendmsg+0x70d/0x870 [ 2601.220856] ? sock_write_iter+0x3d0/0x3d0 [ 2601.221417] ? do_recvmmsg+0x6d0/0x6d0 [ 2601.221936] ? SOFTIRQ_verbose+0x10/0x10 [ 2601.222471] ? lock_downgrade+0x6d0/0x6d0 [ 2601.223167] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2601.224583] ? SOFTIRQ_verbose+0x10/0x10 [ 2601.225674] ___sys_sendmsg+0xf3/0x170 [ 2601.226715] ? sendmsg_copy_msghdr+0x160/0x160 [ 2601.228182] ? __fget_files+0x2cf/0x520 [ 2601.229249] ? lock_downgrade+0x6d0/0x6d0 [ 2601.230377] ? find_held_lock+0x2c/0x110 [ 2601.231589] ? __fget_files+0x2f8/0x520 [ 2601.232633] ? __fget_light+0xea/0x290 [ 2601.233665] __sys_sendmsg+0xe5/0x1b0 [ 2601.234652] ? __sys_sendmsg_sock+0x40/0x40 [ 2601.235336] ? rcu_read_lock_any_held+0x75/0xa0 [ 2601.235923] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2601.236569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2601.237222] ? trace_hardirqs_on+0x5b/0x180 [ 2601.237789] do_syscall_64+0x33/0x40 [ 2601.238277] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2601.238959] RIP: 0033:0x7f251a6f7b19 [ 2601.239454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2601.241726] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2601.242654] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2601.243562] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2601.244465] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2601.245399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2601.246323] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x5ae8}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:55:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xc4050000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 2616.267712] FAULT_INJECTION: forcing a failure. [ 2616.267712] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.269252] CPU: 0 PID: 11840 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2616.270167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2616.271264] Call Trace: [ 2616.271646] dump_stack+0x107/0x167 [ 2616.272140] should_fail.cold+0x5/0xa [ 2616.272657] should_failslab+0x5/0x20 [ 2616.273162] __kmalloc_node_track_caller+0x74/0x3b0 [ 2616.273828] ? skb_segment+0x9d8/0x3aa0 [ 2616.274362] __alloc_skb+0xb1/0x5b0 [ 2616.274852] skb_segment+0x9d8/0x3aa0 [ 2616.275365] ? __lock_acquire+0xbb1/0x5b00 [ 2616.275983] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2616.276683] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.277413] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.278000] __udp_gso_segment+0x11c6/0x1830 [ 2616.278617] ? __sk_receive_skb+0x830/0x830 [ 2616.279234] udp4_ufo_fragment+0x528/0x720 [ 2616.279860] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2616.280565] inet_gso_segment+0x4fb/0x11a0 [ 2616.281175] skb_mac_gso_segment+0x273/0x570 [ 2616.281801] ? inet_sock_destruct+0x840/0x840 [ 2616.282442] ? skb_network_protocol+0x650/0x650 [ 2616.283090] ? skb_crc32c_csum_help+0x80/0x80 [ 2616.283750] ? lock_acquire+0x197/0x470 [ 2616.284315] ? __dev_queue_xmit+0x1c6/0x2690 [ 2616.284938] __skb_gso_segment+0x32d/0x6d0 [ 2616.285538] ? mark_lock+0xf5/0x2df0 [ 2616.286070] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2616.286807] ? lock_chain_count+0x20/0x20 [ 2616.287387] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2616.288068] __dev_queue_xmit+0x825/0x2690 [ 2616.288662] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2616.289386] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2616.290031] ? mark_held_locks+0x9e/0xe0 [ 2616.290609] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2616.291344] neigh_connected_output+0x382/0x4d0 [ 2616.292001] ip_finish_output2+0x6f1/0x21f0 [ 2616.292576] ? nf_hook_slow+0xfc/0x1e0 [ 2616.293085] ? ip_frag_next+0x9e0/0x9e0 [ 2616.293610] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2616.294287] __ip_finish_output.part.0+0x5f3/0xb50 09:55:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 91) 09:55:27 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb91, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:27 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xe, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:27 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb602, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2616.294933] ? ip_fragment.constprop.0+0x240/0x240 [ 2616.295614] ? netif_rx_ni+0xe7/0x300 [ 2616.296124] ip_mc_output+0x401/0xa30 [ 2616.296628] ip_send_skb+0xdd/0x260 [ 2616.303599] udp_send_skb+0x6da/0x11d0 [ 2616.304130] udp_sendmsg+0x139a/0x2160 [ 2616.304642] ? mark_lock+0xf5/0x2df0 [ 2616.305135] ? ip_frag_init+0x350/0x350 [ 2616.305657] ? lock_chain_count+0x20/0x20 [ 2616.306207] ? udp_setsockopt+0xc0/0xc0 [ 2616.306725] ? mark_lock+0xf5/0x2df0 [ 2616.307215] ? lock_acquire+0x197/0x470 [ 2616.307760] ? lock_chain_count+0x20/0x20 [ 2616.308303] ? mark_lock+0xf5/0x2df0 [ 2616.308793] ? mark_lock+0xf5/0x2df0 [ 2616.309280] ? lock_chain_count+0x20/0x20 [ 2616.309822] ? __lock_acquire+0xbb1/0x5b00 [ 2616.310383] ? lock_chain_count+0x20/0x20 [ 2616.310938] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.311634] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.312175] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2616.312721] ? udp_v6_push_pending_frames+0x360/0x360 [ 2616.313393] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.313930] ? mark_lock+0xf5/0x2df0 [ 2616.314422] ? lock_acquire+0x197/0x470 [ 2616.314942] ? find_held_lock+0x2c/0x110 [ 2616.315494] ? __might_fault+0xd3/0x180 [ 2616.316029] ? lock_downgrade+0x6d0/0x6d0 [ 2616.316592] ? lock_downgrade+0x6d0/0x6d0 [ 2616.317144] ? sock_has_perm+0x1ea/0x280 [ 2616.317679] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2616.318368] ? _copy_from_user+0xfb/0x1b0 09:55:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x5e67}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2616.318921] ? __import_iovec+0x458/0x590 [ 2616.327629] ? udp_v6_push_pending_frames+0x360/0x360 [ 2616.328315] inet6_sendmsg+0x105/0x140 [ 2616.328831] ? inet6_compat_ioctl+0x320/0x320 [ 2616.329426] __sock_sendmsg+0xf2/0x190 [ 2616.329940] ____sys_sendmsg+0x70d/0x870 [ 2616.330479] ? sock_write_iter+0x3d0/0x3d0 [ 2616.331044] ? do_recvmmsg+0x6d0/0x6d0 [ 2616.331590] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.332126] ? lock_downgrade+0x6d0/0x6d0 [ 2616.332672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.333358] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.333895] ___sys_sendmsg+0xf3/0x170 [ 2616.334446] ? sendmsg_copy_msghdr+0x160/0x160 [ 2616.335063] ? __fget_files+0x2cf/0x520 [ 2616.335630] ? lock_downgrade+0x6d0/0x6d0 [ 2616.336197] ? find_held_lock+0x2c/0x110 [ 2616.336768] ? __fget_files+0x2f8/0x520 [ 2616.337329] ? __fget_light+0xea/0x290 [ 2616.337851] __sys_sendmsg+0xe5/0x1b0 [ 2616.338357] ? __sys_sendmsg_sock+0x40/0x40 [ 2616.338926] ? rcu_read_lock_any_held+0x75/0xa0 [ 2616.339574] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2616.340264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2616.340940] ? trace_hardirqs_on+0x5b/0x180 [ 2616.341516] do_syscall_64+0x33/0x40 [ 2616.342009] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2616.342693] RIP: 0033:0x7f251a6f7b19 [ 2616.343187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2616.345625] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2616.346626] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2616.347586] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2616.348556] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2616.349500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2616.350440] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xc8050000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:27 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 92) 09:55:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x61e6}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:27 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc00, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2616.630060] FAULT_INJECTION: forcing a failure. [ 2616.630060] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.631654] CPU: 0 PID: 11871 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2616.632571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2616.633678] Call Trace: [ 2616.634032] dump_stack+0x107/0x167 [ 2616.634526] should_fail.cold+0x5/0xa [ 2616.635051] ? ___slab_alloc+0x360/0x700 [ 2616.635619] ? create_object.isra.0+0x3a/0xa20 [ 2616.636231] should_failslab+0x5/0x20 [ 2616.636758] kmem_cache_alloc+0x5b/0x310 [ 2616.637329] create_object.isra.0+0x3a/0xa20 [ 2616.637939] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2616.638613] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2616.639296] ? skb_segment+0x9d8/0x3aa0 [ 2616.639856] __alloc_skb+0xb1/0x5b0 [ 2616.640341] skb_segment+0x9d8/0x3aa0 [ 2616.640848] ? __lock_acquire+0xbb1/0x5b00 [ 2616.641456] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2616.642124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.642823] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.643367] __udp_gso_segment+0x11c6/0x1830 [ 2616.643968] ? __sk_receive_skb+0x830/0x830 [ 2616.644547] udp4_ufo_fragment+0x528/0x720 [ 2616.645118] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2616.645816] inet_gso_segment+0x4fb/0x11a0 [ 2616.646385] skb_mac_gso_segment+0x273/0x570 [ 2616.647014] ? inet_sock_destruct+0x840/0x840 [ 2616.647633] ? skb_network_protocol+0x650/0x650 [ 2616.648271] ? skb_crc32c_csum_help+0x80/0x80 [ 2616.648875] ? lock_acquire+0x197/0x470 [ 2616.649419] ? __dev_queue_xmit+0x1c6/0x2690 [ 2616.650020] __skb_gso_segment+0x32d/0x6d0 [ 2616.650581] ? mark_lock+0xf5/0x2df0 [ 2616.651082] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2616.651791] ? lock_chain_count+0x20/0x20 [ 2616.652337] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2616.652940] __dev_queue_xmit+0x825/0x2690 [ 2616.653506] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2616.654183] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2616.654800] ? mark_held_locks+0x9e/0xe0 [ 2616.655338] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2616.656051] neigh_connected_output+0x382/0x4d0 [ 2616.656677] ip_finish_output2+0x6f1/0x21f0 [ 2616.657249] ? nf_hook_slow+0xfc/0x1e0 [ 2616.657771] ? ip_frag_next+0x9e0/0x9e0 [ 2616.658294] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2616.658961] __ip_finish_output.part.0+0x5f3/0xb50 [ 2616.659625] ? ip_fragment.constprop.0+0x240/0x240 [ 2616.660276] ? netif_rx_ni+0xe7/0x300 [ 2616.660785] ip_mc_output+0x401/0xa30 [ 2616.661292] ip_send_skb+0xdd/0x260 [ 2616.661783] udp_send_skb+0x6da/0x11d0 [ 2616.662308] udp_sendmsg+0x139a/0x2160 [ 2616.662821] ? mark_lock+0xf5/0x2df0 [ 2616.663315] ? ip_frag_init+0x350/0x350 [ 2616.663859] ? lock_chain_count+0x20/0x20 [ 2616.664413] ? udp_setsockopt+0xc0/0xc0 [ 2616.664934] ? mark_lock+0xf5/0x2df0 [ 2616.665430] ? lock_acquire+0x197/0x470 [ 2616.665957] ? lock_chain_count+0x20/0x20 [ 2616.666508] ? mark_lock+0xf5/0x2df0 [ 2616.667000] ? mark_lock+0xf5/0x2df0 [ 2616.667503] ? lock_chain_count+0x20/0x20 [ 2616.668058] ? __lock_acquire+0xbb1/0x5b00 [ 2616.668621] ? lock_chain_count+0x20/0x20 [ 2616.669179] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.669870] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.670418] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2616.670974] ? udp_v6_push_pending_frames+0x360/0x360 [ 2616.671660] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.672207] ? mark_lock+0xf5/0x2df0 [ 2616.672706] ? lock_acquire+0x197/0x470 [ 2616.673229] ? find_held_lock+0x2c/0x110 [ 2616.673769] ? __might_fault+0xd3/0x180 [ 2616.674295] ? lock_downgrade+0x6d0/0x6d0 [ 2616.674844] ? lock_downgrade+0x6d0/0x6d0 [ 2616.675396] ? sock_has_perm+0x1ea/0x280 [ 2616.675950] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2616.676636] ? _copy_from_user+0xfb/0x1b0 [ 2616.677201] ? __import_iovec+0x458/0x590 [ 2616.677777] ? udp_v6_push_pending_frames+0x360/0x360 [ 2616.678467] inet6_sendmsg+0x105/0x140 [ 2616.679026] ? inet6_compat_ioctl+0x320/0x320 [ 2616.679641] __sock_sendmsg+0xf2/0x190 [ 2616.680163] ____sys_sendmsg+0x70d/0x870 [ 2616.680703] ? sock_write_iter+0x3d0/0x3d0 [ 2616.681265] ? do_recvmmsg+0x6d0/0x6d0 [ 2616.681787] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.682323] ? lock_downgrade+0x6d0/0x6d0 [ 2616.682872] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2616.683578] ? SOFTIRQ_verbose+0x10/0x10 [ 2616.684167] ___sys_sendmsg+0xf3/0x170 [ 2616.684700] ? sendmsg_copy_msghdr+0x160/0x160 [ 2616.685333] ? __fget_files+0x2cf/0x520 [ 2616.685887] ? lock_downgrade+0x6d0/0x6d0 [ 2616.686461] ? find_held_lock+0x2c/0x110 [ 2616.687037] ? __fget_files+0x2f8/0x520 [ 2616.687586] ? __fget_light+0xea/0x290 [ 2616.688115] __sys_sendmsg+0xe5/0x1b0 [ 2616.688624] ? __sys_sendmsg_sock+0x40/0x40 [ 2616.689202] ? rcu_read_lock_any_held+0x75/0xa0 [ 2616.689841] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2616.690538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2616.691221] ? trace_hardirqs_on+0x5b/0x180 [ 2616.691813] do_syscall_64+0x33/0x40 [ 2616.692309] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2616.692988] RIP: 0033:0x7f251a6f7b19 [ 2616.693484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2616.695926] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2616.696929] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2616.697871] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2616.698810] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2616.699771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2616.700721] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:42 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:42 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2000, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:42 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xd2050000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x6565}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:42 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc502, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 93) 09:55:42 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:55:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x68e4}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2631.795711] FAULT_INJECTION: forcing a failure. [ 2631.795711] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.801498] CPU: 0 PID: 11907 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2631.802476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2631.803627] Call Trace: [ 2631.804033] dump_stack+0x107/0x167 [ 2631.804573] should_fail.cold+0x5/0xa [ 2631.805132] ? trace_hardirqs_on+0x5b/0x180 [ 2631.805775] ? __alloc_skb+0x6d/0x5b0 [ 2631.806328] should_failslab+0x5/0x20 [ 2631.806864] kmem_cache_alloc_node+0x55/0x330 [ 2631.807501] __alloc_skb+0x6d/0x5b0 [ 2631.808040] skb_segment+0x9d8/0x3aa0 [ 2631.808593] ? __lock_acquire+0xbb1/0x5b00 [ 2631.809316] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2631.810055] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2631.810826] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.811420] __udp_gso_segment+0x11c6/0x1830 [ 2631.812139] ? __sk_receive_skb+0x830/0x830 [ 2631.812747] udp4_ufo_fragment+0x528/0x720 [ 2631.813336] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2631.814075] inet_gso_segment+0x4fb/0x11a0 [ 2631.814703] skb_mac_gso_segment+0x273/0x570 [ 2631.815306] ? inet_sock_destruct+0x840/0x840 [ 2631.815989] ? skb_network_protocol+0x650/0x650 [ 2631.824425] ? skb_crc32c_csum_help+0x80/0x80 [ 2631.825097] ? lock_acquire+0x197/0x470 [ 2631.825689] ? __dev_queue_xmit+0x1c6/0x2690 [ 2631.826314] __skb_gso_segment+0x32d/0x6d0 [ 2631.826966] ? mark_lock+0xf5/0x2df0 [ 2631.827497] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2631.828296] ? lock_chain_count+0x20/0x20 [ 2631.828937] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2631.829588] __dev_queue_xmit+0x825/0x2690 [ 2631.830227] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2631.831015] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2631.831687] ? mark_held_locks+0x9e/0xe0 [ 2631.832307] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2631.833052] neigh_connected_output+0x382/0x4d0 [ 2631.833764] ip_finish_output2+0x6f1/0x21f0 [ 2631.834390] ? nf_hook_slow+0xfc/0x1e0 [ 2631.834981] ? ip_frag_next+0x9e0/0x9e0 [ 2631.835556] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2631.836322] __ip_finish_output.part.0+0x5f3/0xb50 [ 2631.837056] ? ip_fragment.constprop.0+0x240/0x240 [ 2631.837776] ? netif_rx_ni+0xe7/0x300 [ 2631.838316] ip_mc_output+0x401/0xa30 [ 2631.838895] ip_send_skb+0xdd/0x260 [ 2631.839415] udp_send_skb+0x6da/0x11d0 [ 2631.840152] udp_sendmsg+0x139a/0x2160 [ 2631.840723] ? mark_lock+0xf5/0x2df0 [ 2631.841280] ? ip_frag_init+0x350/0x350 [ 2631.841893] ? lock_chain_count+0x20/0x20 [ 2631.842506] ? udp_setsockopt+0xc0/0xc0 [ 2631.843113] ? mark_lock+0xf5/0x2df0 [ 2631.843646] ? lock_acquire+0x197/0x470 [ 2631.844311] ? lock_chain_count+0x20/0x20 [ 2631.844901] ? mark_lock+0xf5/0x2df0 [ 2631.845470] ? mark_lock+0xf5/0x2df0 [ 2631.846000] ? lock_chain_count+0x20/0x20 [ 2631.846610] ? __lock_acquire+0xbb1/0x5b00 [ 2631.847258] ? lock_chain_count+0x20/0x20 [ 2631.847886] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2631.848661] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.849251] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2631.849867] ? udp_v6_push_pending_frames+0x360/0x360 [ 2631.850592] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.851192] ? mark_lock+0xf5/0x2df0 [ 2631.851738] ? lock_acquire+0x197/0x470 [ 2631.852339] ? find_held_lock+0x2c/0x110 [ 2631.852979] ? __might_fault+0xd3/0x180 [ 2631.853537] ? lock_downgrade+0x6d0/0x6d0 [ 2631.854144] ? lock_downgrade+0x6d0/0x6d0 [ 2631.854746] ? sock_has_perm+0x1ea/0x280 [ 2631.855329] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2631.856168] ? _copy_from_user+0xfb/0x1b0 [ 2631.856789] ? __import_iovec+0x458/0x590 [ 2631.857381] ? udp_v6_push_pending_frames+0x360/0x360 [ 2631.858126] inet6_sendmsg+0x105/0x140 [ 2631.858680] ? inet6_compat_ioctl+0x320/0x320 [ 2631.859368] __sock_sendmsg+0xf2/0x190 [ 2631.859965] ____sys_sendmsg+0x70d/0x870 [ 2631.860565] ? sock_write_iter+0x3d0/0x3d0 [ 2631.861205] ? do_recvmmsg+0x6d0/0x6d0 [ 2631.861796] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.862372] ? lock_downgrade+0x6d0/0x6d0 [ 2631.863016] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2631.863813] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.864415] ___sys_sendmsg+0xf3/0x170 [ 2631.865053] ? sendmsg_copy_msghdr+0x160/0x160 [ 2631.865723] ? __fget_files+0x2cf/0x520 [ 2631.866322] ? lock_downgrade+0x6d0/0x6d0 [ 2631.866914] ? find_held_lock+0x2c/0x110 [ 2631.867522] ? __fget_files+0x2f8/0x520 [ 2631.868182] ? __fget_light+0xea/0x290 [ 2631.868769] __sys_sendmsg+0xe5/0x1b0 [ 2631.869338] ? __sys_sendmsg_sock+0x40/0x40 [ 2631.869988] ? rcu_read_lock_any_held+0x75/0xa0 [ 2631.870698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2631.871464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2631.872218] ? trace_hardirqs_on+0x5b/0x180 [ 2631.872849] do_syscall_64+0x33/0x40 [ 2631.873375] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2631.874127] RIP: 0033:0x7f251a6f7b19 [ 2631.874655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2631.877372] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2631.878509] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2631.879553] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2631.880641] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2631.881656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2631.882709] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x6c63}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:43 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3e, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xe8030000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:43 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xe501, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 94) 09:55:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x6fe2}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:43 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3a01, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2632.276106] FAULT_INJECTION: forcing a failure. [ 2632.276106] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.280101] CPU: 0 PID: 11940 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2632.282291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2632.284925] Call Trace: [ 2632.285771] dump_stack+0x107/0x167 [ 2632.286912] should_fail.cold+0x5/0xa [ 2632.288095] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2632.289482] ? create_object.isra.0+0x3a/0xa20 [ 2632.290642] should_failslab+0x5/0x20 [ 2632.291604] kmem_cache_alloc+0x5b/0x310 [ 2632.292800] ? mark_held_locks+0x9e/0xe0 [ 2632.294019] create_object.isra.0+0x3a/0xa20 [ 2632.295347] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2632.296778] kmem_cache_alloc_node+0x169/0x330 [ 2632.297993] __alloc_skb+0x6d/0x5b0 [ 2632.298950] skb_segment+0x9d8/0x3aa0 [ 2632.299935] ? __lock_acquire+0xbb1/0x5b00 [ 2632.301276] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2632.302784] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2632.304133] ? SOFTIRQ_verbose+0x10/0x10 [ 2632.305361] __udp_gso_segment+0x11c6/0x1830 [ 2632.306726] ? __sk_receive_skb+0x830/0x830 [ 2632.308014] udp4_ufo_fragment+0x528/0x720 [ 2632.309094] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2632.310379] inet_gso_segment+0x4fb/0x11a0 [ 2632.311491] skb_mac_gso_segment+0x273/0x570 [ 2632.312824] ? inet_sock_destruct+0x840/0x840 [ 2632.313962] ? skb_network_protocol+0x650/0x650 [ 2632.315132] ? skb_crc32c_csum_help+0x80/0x80 [ 2632.316360] ? lock_acquire+0x197/0x470 [ 2632.317387] ? __dev_queue_xmit+0x1c6/0x2690 [ 2632.318541] __skb_gso_segment+0x32d/0x6d0 [ 2632.319694] ? mark_lock+0xf5/0x2df0 [ 2632.320347] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2632.321087] ? lock_chain_count+0x20/0x20 [ 2632.321679] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2632.322292] __dev_queue_xmit+0x825/0x2690 [ 2632.322864] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2632.323560] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2632.324192] ? mark_held_locks+0x9e/0xe0 [ 2632.324751] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2632.325458] neigh_connected_output+0x382/0x4d0 [ 2632.326094] ip_finish_output2+0x6f1/0x21f0 [ 2632.326757] ? nf_hook_slow+0xfc/0x1e0 [ 2632.327282] ? ip_frag_next+0x9e0/0x9e0 [ 2632.327853] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2632.328574] __ip_finish_output.part.0+0x5f3/0xb50 [ 2632.329251] ? ip_fragment.constprop.0+0x240/0x240 [ 2632.329902] ? netif_rx_ni+0xe7/0x300 [ 2632.330427] ip_mc_output+0x401/0xa30 [ 2632.330936] ip_send_skb+0xdd/0x260 [ 2632.331437] udp_send_skb+0x6da/0x11d0 [ 2632.331970] udp_sendmsg+0x139a/0x2160 [ 2632.332513] ? mark_lock+0xf5/0x2df0 [ 2632.333046] ? ip_frag_init+0x350/0x350 [ 2632.333614] ? mark_lock+0xf5/0x2df0 [ 2632.334110] ? udp_setsockopt+0xc0/0xc0 [ 2632.334659] ? mark_lock+0xf5/0x2df0 [ 2632.335191] ? lock_chain_count+0x20/0x20 [ 2632.335780] ? lock_chain_count+0x20/0x20 [ 2632.336369] ? perf_output_begin+0x589/0xc60 [ 2632.336965] ? mark_lock+0xf5/0x2df0 [ 2632.337481] ? mark_lock+0xf5/0x2df0 [ 2632.338000] ? lock_chain_count+0x20/0x20 [ 2632.338567] ? lock_chain_count+0x20/0x20 [ 2632.339158] ? __lock_acquire+0xbb1/0x5b00 [ 2632.339763] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2632.340346] ? udp_v6_push_pending_frames+0x360/0x360 [ 2632.341024] ? SOFTIRQ_verbose+0x10/0x10 [ 2632.341585] ? mark_lock+0xf5/0x2df0 [ 2632.342078] ? lock_acquire+0x197/0x470 [ 2632.342618] ? find_held_lock+0x2c/0x110 [ 2632.343209] ? __might_fault+0xd3/0x180 [ 2632.343773] ? lock_downgrade+0x6d0/0x6d0 [ 2632.344373] ? lock_downgrade+0x6d0/0x6d0 [ 2632.344947] ? sock_has_perm+0x1ea/0x280 [ 2632.345511] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2632.346270] ? _copy_from_user+0xfb/0x1b0 [ 2632.346857] ? __import_iovec+0x458/0x590 [ 2632.347425] ? udp_v6_push_pending_frames+0x360/0x360 [ 2632.348170] inet6_sendmsg+0x105/0x140 [ 2632.348749] ? inet6_compat_ioctl+0x320/0x320 [ 2632.349355] __sock_sendmsg+0xf2/0x190 [ 2632.349895] ____sys_sendmsg+0x70d/0x870 [ 2632.350454] ? sock_write_iter+0x3d0/0x3d0 [ 2632.351039] ? do_recvmmsg+0x6d0/0x6d0 [ 2632.351576] ? SOFTIRQ_verbose+0x10/0x10 [ 2632.352179] ? lock_downgrade+0x6d0/0x6d0 [ 2632.352782] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2632.353483] ? SOFTIRQ_verbose+0x10/0x10 [ 2632.354068] ___sys_sendmsg+0xf3/0x170 [ 2632.354618] ? sendmsg_copy_msghdr+0x160/0x160 [ 2632.355253] ? __fget_files+0x2cf/0x520 [ 2632.355786] ? lock_downgrade+0x6d0/0x6d0 [ 2632.356367] ? find_held_lock+0x2c/0x110 [ 2632.356916] ? __fget_files+0x2f8/0x520 [ 2632.357464] ? __fget_light+0xea/0x290 [ 2632.357990] __sys_sendmsg+0xe5/0x1b0 [ 2632.358516] ? __sys_sendmsg_sock+0x40/0x40 [ 2632.359106] ? rcu_read_lock_any_held+0x75/0xa0 [ 2632.359777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2632.360541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2632.361257] ? trace_hardirqs_on+0x5b/0x180 [ 2632.361869] do_syscall_64+0x33/0x40 [ 2632.362380] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2632.363082] RIP: 0033:0x7f251a6f7b19 [ 2632.363593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2632.366101] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2632.367158] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2632.368134] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2632.369130] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2632.370108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2632.371101] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:59 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',nodevmap,afid=0x0000000000000007,smackfsdef=+$-[!,appraise', @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:55:59 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xb91, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:55:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x7361}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:55:59 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x1f4, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xf4010000, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 95) 09:55:59 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4000, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2647.931753] FAULT_INJECTION: forcing a failure. [ 2647.931753] name failslab, interval 1, probability 0, space 0, times 0 [ 2647.933195] CPU: 1 PID: 11962 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2647.934041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2647.935054] Call Trace: [ 2647.935390] dump_stack+0x107/0x167 [ 2647.935842] should_fail.cold+0x5/0xa [ 2647.936319] should_failslab+0x5/0x20 [ 2647.936825] __kmalloc_node_track_caller+0x74/0x3b0 [ 2647.937462] ? skb_segment+0x9d8/0x3aa0 [ 2647.937958] __alloc_skb+0xb1/0x5b0 [ 2647.938418] skb_segment+0x9d8/0x3aa0 [ 2647.938933] ? __lock_acquire+0xbb1/0x5b00 [ 2647.939514] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2647.940130] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2647.944859] ? SOFTIRQ_verbose+0x10/0x10 [ 2647.945417] __udp_gso_segment+0x11c6/0x1830 [ 2647.945994] ? __sk_receive_skb+0x830/0x830 [ 2647.946590] udp4_ufo_fragment+0x528/0x720 [ 2647.947154] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2647.947819] inet_gso_segment+0x4fb/0x11a0 [ 2647.948382] skb_mac_gso_segment+0x273/0x570 [ 2647.948994] ? inet_sock_destruct+0x840/0x840 [ 2647.949610] ? skb_network_protocol+0x650/0x650 [ 2647.950212] ? skb_crc32c_csum_help+0x80/0x80 [ 2647.950814] ? lock_acquire+0x197/0x470 [ 2647.951326] ? __dev_queue_xmit+0x1c6/0x2690 [ 2647.951944] __skb_gso_segment+0x32d/0x6d0 [ 2647.952534] ? mark_lock+0xf5/0x2df0 [ 2647.953039] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2647.953773] ? lock_chain_count+0x20/0x20 [ 2647.954311] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2647.954926] __dev_queue_xmit+0x825/0x2690 [ 2647.955485] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2647.956183] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2647.957412] ? mark_held_locks+0x9e/0xe0 [ 2647.957936] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2647.958619] neigh_connected_output+0x382/0x4d0 [ 2647.959232] ip_finish_output2+0x6f1/0x21f0 [ 2647.959821] ? nf_hook_slow+0xfc/0x1e0 [ 2647.960327] ? ip_frag_next+0x9e0/0x9e0 [ 2647.960863] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2647.961532] __ip_finish_output.part.0+0x5f3/0xb50 [ 2647.962197] ? ip_fragment.constprop.0+0x240/0x240 [ 2647.962857] ? netif_rx_ni+0xe7/0x300 [ 2647.963349] ip_mc_output+0x401/0xa30 [ 2647.963897] ip_send_skb+0xdd/0x260 [ 2647.964385] udp_send_skb+0x6da/0x11d0 [ 2647.968964] udp_sendmsg+0x139a/0x2160 [ 2647.969466] ? mark_lock+0xf5/0x2df0 [ 2647.969957] ? ip_frag_init+0x350/0x350 [ 2647.970508] ? lock_chain_count+0x20/0x20 [ 2647.971057] ? udp_setsockopt+0xc0/0xc0 [ 2647.971589] ? mark_lock+0xf5/0x2df0 [ 2647.972065] ? lock_acquire+0x197/0x470 [ 2647.972627] ? lock_chain_count+0x20/0x20 [ 2647.973156] ? mark_lock+0xf5/0x2df0 [ 2647.973667] ? mark_lock+0xf5/0x2df0 [ 2647.974138] ? lock_chain_count+0x20/0x20 [ 2647.974684] ? __lock_acquire+0xbb1/0x5b00 [ 2647.975212] ? lock_chain_count+0x20/0x20 [ 2647.975780] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2647.976461] ? SOFTIRQ_verbose+0x10/0x10 [ 2647.977010] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2647.977552] ? udp_v6_push_pending_frames+0x360/0x360 [ 2647.978237] ? SOFTIRQ_verbose+0x10/0x10 [ 2647.978786] ? mark_lock+0xf5/0x2df0 [ 2647.979255] ? lock_acquire+0x197/0x470 [ 2647.979753] ? find_held_lock+0x2c/0x110 [ 2647.980271] ? __might_fault+0xd3/0x180 [ 2647.980800] ? lock_downgrade+0x6d0/0x6d0 [ 2647.981315] ? lock_downgrade+0x6d0/0x6d0 [ 2647.981840] ? sock_has_perm+0x1ea/0x280 [ 2647.982344] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2647.982986] ? _copy_from_user+0xfb/0x1b0 [ 2647.983505] ? __import_iovec+0x458/0x590 [ 2647.984030] ? udp_v6_push_pending_frames+0x360/0x360 [ 2647.984805] inet6_sendmsg+0x105/0x140 [ 2647.985282] ? inet6_compat_ioctl+0x320/0x320 [ 2647.985880] __sock_sendmsg+0xf2/0x190 [ 2647.986366] ____sys_sendmsg+0x70d/0x870 [ 2647.986902] ? sock_write_iter+0x3d0/0x3d0 [ 2647.987425] ? do_recvmmsg+0x6d0/0x6d0 [ 2647.987957] ? SOFTIRQ_verbose+0x10/0x10 [ 2647.992490] ? lock_downgrade+0x6d0/0x6d0 [ 2647.993057] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2647.993735] ? SOFTIRQ_verbose+0x10/0x10 [ 2647.994240] ___sys_sendmsg+0xf3/0x170 [ 2647.994774] ? sendmsg_copy_msghdr+0x160/0x160 [ 2647.995348] ? __fget_files+0x2cf/0x520 [ 2647.995873] ? lock_downgrade+0x6d0/0x6d0 [ 2647.996393] ? find_held_lock+0x2c/0x110 [ 2647.996986] ? __fget_files+0x2f8/0x520 [ 2647.997502] ? __fget_light+0xea/0x290 [ 2647.997996] __sys_sendmsg+0xe5/0x1b0 [ 2647.998475] ? __sys_sendmsg_sock+0x40/0x40 [ 2647.999016] ? rcu_read_lock_any_held+0x75/0xa0 [ 2647.999613] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2648.000270] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2648.000981] ? trace_hardirqs_on+0x5b/0x180 [ 2648.001528] do_syscall_64+0x33/0x40 [ 2648.001995] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2648.002639] RIP: 0033:0x7f251a6f7b19 [ 2648.003108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.005397] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2648.006378] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2648.007274] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2648.008189] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.009087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2648.010001] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:55:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 96) 09:55:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xfeffffff, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:59 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x300, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:55:59 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:55:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x76e0}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2648.916927] FAULT_INJECTION: forcing a failure. [ 2648.916927] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.918525] CPU: 0 PID: 11989 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2648.919486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2648.920629] Call Trace: [ 2648.920983] dump_stack+0x107/0x167 [ 2648.921469] should_fail.cold+0x5/0xa [ 2648.921969] ? ___slab_alloc+0x360/0x700 [ 2648.922520] ? create_object.isra.0+0x3a/0xa20 [ 2648.923122] should_failslab+0x5/0x20 [ 2648.923633] kmem_cache_alloc+0x5b/0x310 [ 2648.924175] create_object.isra.0+0x3a/0xa20 [ 2648.924782] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2648.925464] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2648.926133] ? skb_segment+0x9d8/0x3aa0 [ 2648.926671] __alloc_skb+0xb1/0x5b0 [ 2648.927151] skb_segment+0x9d8/0x3aa0 [ 2648.927663] ? __lock_acquire+0xbb1/0x5b00 [ 2648.928243] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2648.928922] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2648.929618] ? SOFTIRQ_verbose+0x10/0x10 [ 2648.930160] __udp_gso_segment+0x11c6/0x1830 [ 2648.930742] ? __sk_receive_skb+0x830/0x830 [ 2648.931341] udp4_ufo_fragment+0x528/0x720 [ 2648.931902] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2648.932651] inet_gso_segment+0x4fb/0x11a0 [ 2648.933241] skb_mac_gso_segment+0x273/0x570 [ 2648.933836] ? inet_sock_destruct+0x840/0x840 [ 2648.934441] ? skb_network_protocol+0x650/0x650 [ 2648.935055] ? skb_crc32c_csum_help+0x80/0x80 [ 2648.935648] ? lock_acquire+0x197/0x470 [ 2648.936164] ? __dev_queue_xmit+0x1c6/0x2690 [ 2648.936760] __skb_gso_segment+0x32d/0x6d0 [ 2648.937312] ? mark_lock+0xf5/0x2df0 [ 2648.937801] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2648.938485] ? lock_chain_count+0x20/0x20 [ 2648.939024] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2648.939665] __dev_queue_xmit+0x825/0x2690 [ 2648.940227] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2648.940943] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2648.941548] ? mark_held_locks+0x9e/0xe0 [ 2648.942085] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2648.942775] neigh_connected_output+0x382/0x4d0 [ 2648.943397] ip_finish_output2+0x6f1/0x21f0 [ 2648.943963] ? nf_hook_slow+0xfc/0x1e0 [ 2648.944492] ? ip_frag_next+0x9e0/0x9e0 [ 2648.945036] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2648.945704] __ip_finish_output.part.0+0x5f3/0xb50 [ 2648.946349] ? ip_fragment.constprop.0+0x240/0x240 [ 2648.946994] ? netif_rx_ni+0xe7/0x300 [ 2648.947500] ip_mc_output+0x401/0xa30 [ 2648.948005] ip_send_skb+0xdd/0x260 [ 2648.948509] udp_send_skb+0x6da/0x11d0 [ 2648.949037] udp_sendmsg+0x139a/0x2160 [ 2648.949579] ? mark_lock+0xf5/0x2df0 [ 2648.950068] ? ip_frag_init+0x350/0x350 [ 2648.950592] ? lock_chain_count+0x20/0x20 [ 2648.951140] ? udp_setsockopt+0xc0/0xc0 [ 2648.951708] ? mark_lock+0xf5/0x2df0 [ 2648.952198] ? lock_acquire+0x197/0x470 [ 2648.952769] ? lock_chain_count+0x20/0x20 [ 2648.953312] ? mark_lock+0xf5/0x2df0 [ 2648.953811] ? mark_lock+0xf5/0x2df0 [ 2648.954314] ? lock_chain_count+0x20/0x20 [ 2648.954882] ? __lock_acquire+0xbb1/0x5b00 [ 2648.955439] ? lock_chain_count+0x20/0x20 [ 2648.956003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2648.956717] ? SOFTIRQ_verbose+0x10/0x10 [ 2648.957259] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2648.957850] ? udp_v6_push_pending_frames+0x360/0x360 [ 2648.958528] ? SOFTIRQ_verbose+0x10/0x10 [ 2648.959061] ? mark_lock+0xf5/0x2df0 [ 2648.959553] ? lock_acquire+0x197/0x470 [ 2648.960071] ? find_held_lock+0x2c/0x110 [ 2648.960634] ? __might_fault+0xd3/0x180 [ 2648.961151] ? lock_downgrade+0x6d0/0x6d0 [ 2648.961739] ? lock_downgrade+0x6d0/0x6d0 [ 2648.962289] ? sock_has_perm+0x1ea/0x280 [ 2648.962845] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2648.963566] ? _copy_from_user+0xfb/0x1b0 [ 2648.964123] ? __import_iovec+0x458/0x590 [ 2648.964828] ? udp_v6_push_pending_frames+0x360/0x360 [ 2648.965553] inet6_sendmsg+0x105/0x140 [ 2648.966073] ? inet6_compat_ioctl+0x320/0x320 [ 2648.966693] __sock_sendmsg+0xf2/0x190 [ 2648.967203] ____sys_sendmsg+0x70d/0x870 [ 2648.967738] ? sock_write_iter+0x3d0/0x3d0 [ 2648.968292] ? do_recvmmsg+0x6d0/0x6d0 [ 2648.968850] ? SOFTIRQ_verbose+0x10/0x10 [ 2648.969403] ? lock_downgrade+0x6d0/0x6d0 [ 2648.969952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2648.970637] ? SOFTIRQ_verbose+0x10/0x10 [ 2648.971172] ___sys_sendmsg+0xf3/0x170 [ 2648.971693] ? sendmsg_copy_msghdr+0x160/0x160 [ 2648.972299] ? __fget_files+0x2cf/0x520 [ 2648.972844] ? lock_downgrade+0x6d0/0x6d0 [ 2648.973393] ? find_held_lock+0x2c/0x110 [ 2648.973975] ? __fget_files+0x2f8/0x520 [ 2648.974536] ? __fget_light+0xea/0x290 [ 2648.975052] __sys_sendmsg+0xe5/0x1b0 [ 2648.975596] ? __sys_sendmsg_sock+0x40/0x40 [ 2648.976164] ? rcu_read_lock_any_held+0x75/0xa0 [ 2648.976875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2648.977610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2648.978285] ? trace_hardirqs_on+0x5b/0x180 [ 2648.978882] do_syscall_64+0x33/0x40 [ 2648.979372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2648.980041] RIP: 0033:0x7f251a6f7b19 [ 2648.980602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.983085] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2648.984107] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2648.985102] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2648.986059] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.986992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2648.987924] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:56:00 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',nodevmap,afid=0x0000000000000007,smackfsdef=+$-[!,appraise', @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:56:00 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x3e8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:56:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x7a5f}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:56:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xffffff7f, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:56:17 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',nodevmap,afid=0x0000000000000007,smackfsdef=+$-[!,appraise', @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) sendfile(r3, r4, 0x0, 0x100000001) 09:56:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x5c8, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:56:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 97) 09:56:17 executing program 7: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x162210, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:56:17 executing program 2: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/153, 0x99}], 0x2, &(0x7f0000000140)=""/22, 0x16}, 0x142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x80020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}, 0xa31a, 0x0, 0x16c, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x9}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x40002018}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 09:56:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2e571401fdba967959616d18340c6e4fdea96b9adb461e1abcfba79a7393e08a734c42083156dd20f328af1988f8d52070df73fe5c6dd9600b5e8c9f194f8fd1e226d10b07a26e10742656f09c99634cc2c316e78de55e6212b395751a2388103d8853f07c62391ee7b9757841e2f0325edbc0ed3d16d3118e02e062a95dee751a8e0065d987ff3c4d7c2c1781defa92a7d447486981c2a68184aa4f19b1469be78444371883f68eac8ba30d3dea5cae8d87e9f85fc94c4259b2ea1875b96eb49bc5caafab49f56cf630b976f8a287690736ea671ff07e80f41da05d33ba8ce77be1343b193dfb13c43a36c8fa5887a8a0da3fe836575092dd3e6c7da8341434d02cb7441b14daf5facc7c92944fd37a1897b3b5d78027", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2666.424633] FAULT_INJECTION: forcing a failure. [ 2666.424633] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.426195] CPU: 1 PID: 12028 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2666.427105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.428191] Call Trace: [ 2666.428550] dump_stack+0x107/0x167 [ 2666.429061] should_fail.cold+0x5/0xa [ 2666.429598] ? trace_hardirqs_on+0x5b/0x180 [ 2666.430192] ? __alloc_skb+0x6d/0x5b0 [ 2666.430712] should_failslab+0x5/0x20 [ 2666.431235] kmem_cache_alloc_node+0x55/0x330 [ 2666.431841] __alloc_skb+0x6d/0x5b0 [ 2666.432348] skb_segment+0x9d8/0x3aa0 [ 2666.432898] ? __lock_acquire+0xbb1/0x5b00 [ 2666.433519] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2666.434192] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2666.434894] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.435454] __udp_gso_segment+0x11c6/0x1830 [ 2666.436033] ? __sk_receive_skb+0x830/0x830 [ 2666.436613] udp4_ufo_fragment+0x528/0x720 [ 2666.437180] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2666.437835] inet_gso_segment+0x4fb/0x11a0 [ 2666.438408] skb_mac_gso_segment+0x273/0x570 [ 2666.438989] ? inet_sock_destruct+0x840/0x840 [ 2666.439580] ? skb_network_protocol+0x650/0x650 [ 2666.440189] ? skb_crc32c_csum_help+0x80/0x80 [ 2666.440778] ? lock_acquire+0x197/0x470 [ 2666.441326] ? __dev_queue_xmit+0x1c6/0x2690 [ 2666.441911] __skb_gso_segment+0x32d/0x6d0 [ 2666.442466] ? mark_lock+0xf5/0x2df0 [ 2666.442967] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2666.443657] ? lock_chain_count+0x20/0x20 [ 2666.444212] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2666.444818] __dev_queue_xmit+0x825/0x2690 [ 2666.445410] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2666.446092] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2666.446713] ? mark_held_locks+0x9e/0xe0 [ 2666.447257] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2666.447953] neigh_connected_output+0x382/0x4d0 [ 2666.448585] ip_finish_output2+0x6f1/0x21f0 [ 2666.449184] ? nf_hook_slow+0xfc/0x1e0 [ 2666.449701] ? ip_frag_next+0x9e0/0x9e0 [ 2666.450209] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2666.450867] __ip_finish_output.part.0+0x5f3/0xb50 [ 2666.451505] ? ip_fragment.constprop.0+0x240/0x240 [ 2666.452137] ? netif_rx_ni+0xe7/0x300 [ 2666.452643] ip_mc_output+0x401/0xa30 [ 2666.453172] ip_send_skb+0xdd/0x260 [ 2666.453656] udp_send_skb+0x6da/0x11d0 [ 2666.454185] udp_sendmsg+0x139a/0x2160 [ 2666.454705] ? mark_lock+0xf5/0x2df0 [ 2666.455220] ? ip_frag_init+0x350/0x350 [ 2666.455742] ? lock_chain_count+0x20/0x20 [ 2666.456287] ? udp_setsockopt+0xc0/0xc0 [ 2666.456806] ? mark_lock+0xf5/0x2df0 [ 2666.457314] ? lock_acquire+0x197/0x470 [ 2666.457840] ? lock_chain_count+0x20/0x20 [ 2666.458388] ? mark_lock+0xf5/0x2df0 09:56:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) [ 2666.458874] ? mark_lock+0xf5/0x2df0 [ 2666.459379] ? lock_chain_count+0x20/0x20 [ 2666.459923] ? __lock_acquire+0xbb1/0x5b00 [ 2666.460480] ? lock_chain_count+0x20/0x20 [ 2666.461044] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2666.461728] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.462288] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2666.462849] ? udp_v6_push_pending_frames+0x360/0x360 [ 2666.463510] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.464058] ? mark_lock+0xf5/0x2df0 [ 2666.473120] ? lock_acquire+0x197/0x470 [ 2666.473647] ? find_held_lock+0x2c/0x110 [ 2666.474189] ? __might_fault+0xd3/0x180 [ 2666.474713] ? lock_downgrade+0x6d0/0x6d0 [ 2666.475283] ? lock_downgrade+0x6d0/0x6d0 [ 2666.475869] ? sock_has_perm+0x1ea/0x280 [ 2666.476405] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2666.477118] ? _copy_from_user+0xfb/0x1b0 [ 2666.477684] ? __import_iovec+0x458/0x590 [ 2666.478232] ? udp_v6_push_pending_frames+0x360/0x360 [ 2666.478916] inet6_sendmsg+0x105/0x140 [ 2666.479441] ? inet6_compat_ioctl+0x320/0x320 [ 2666.480033] __sock_sendmsg+0xf2/0x190 [ 2666.480546] ____sys_sendmsg+0x70d/0x870 [ 2666.481110] ? sock_write_iter+0x3d0/0x3d0 [ 2666.481679] ? do_recvmmsg+0x6d0/0x6d0 [ 2666.482203] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.482743] ? lock_downgrade+0x6d0/0x6d0 [ 2666.483336] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2666.484049] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.484589] ___sys_sendmsg+0xf3/0x170 [ 2666.485137] ? sendmsg_copy_msghdr+0x160/0x160 [ 2666.485754] ? __fget_files+0x2cf/0x520 [ 2666.486272] ? lock_downgrade+0x6d0/0x6d0 [ 2666.486833] ? find_held_lock+0x2c/0x110 [ 2666.487385] ? __fget_files+0x2f8/0x520 [ 2666.487952] ? __fget_light+0xea/0x290 [ 2666.488469] __sys_sendmsg+0xe5/0x1b0 [ 2666.493044] ? __sys_sendmsg_sock+0x40/0x40 [ 2666.493604] ? rcu_read_lock_any_held+0x75/0xa0 [ 2666.494234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2666.494954] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2666.495628] ? trace_hardirqs_on+0x5b/0x180 [ 2666.496245] do_syscall_64+0x33/0x40 [ 2666.496748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2666.497465] RIP: 0033:0x7f251a6f7b19 [ 2666.498001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:56:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x7dde}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) [ 2666.500430] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2666.505513] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2666.506436] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2666.507373] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.508303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2666.509950] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 09:56:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x44000, 0x0) stat(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c6e6f6465766d61702c616669643d3078303030303030303030303030303030372c736d61636b66736465663d2b242d5b212c61707072616973652c7375626a5f757365723d002c7063723d30303030303030303030303030303030303031312c7375626a5f747970653db523275d2c657569643c", @ANYRESDEC=0xee01, @ANYBLOB="ce762cd81e2661b2316bc887de84bfac20b7de7b7dc92fbaf60c7707c89f445d9d1d8f02c48bfcc71af1985423274ed813c34709f738bffe0a54166cb4b9ed9e239c665bb11acf12d39641c215ff943eb940ca", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x509441, 0x18e) chmod(&(0x7f0000000280)='./file3\x00', 0x21) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x4, 0x0, &(0x7f0000000340)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) 09:56:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x815d}, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 09:56:17 executing program 4: open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x0, 0x44) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pipe(&(0x7f0000000100)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0xa00, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:56:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0xfffffffe, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 09:56:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x20240, 0x0) r2 = openat(r1, &(0x7f00000001c0)='\x00', 0x0, 0x44) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000500)) mmap(&(0x7f000015d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xe164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xa) pipe(&(0x7f0000000100)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x9a, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) (fail_nth: 98) [ 2666.873306] FAULT_INJECTION: forcing a failure. [ 2666.873306] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.874874] CPU: 0 PID: 12061 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2666.875785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.876875] Call Trace: [ 2666.877261] dump_stack+0x107/0x167 [ 2666.877769] should_fail.cold+0x5/0xa [ 2666.878293] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2666.879015] ? create_object.isra.0+0x3a/0xa20 [ 2666.879658] should_failslab+0x5/0x20 [ 2666.880184] kmem_cache_alloc+0x5b/0x310 [ 2666.880759] create_object.isra.0+0x3a/0xa20 [ 2666.897478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2666.898181] kmem_cache_alloc_node+0x169/0x330 [ 2666.898800] __alloc_skb+0x6d/0x5b0 [ 2666.899307] skb_segment+0x9d8/0x3aa0 [ 2666.899854] ? __lock_acquire+0xbb1/0x5b00 [ 2666.900460] ? skb_zerocopy_iter_stream+0x800/0x800 [ 2666.901153] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2666.901895] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.902473] __udp_gso_segment+0x11c6/0x1830 [ 2666.903089] ? __sk_receive_skb+0x830/0x830 [ 2666.903701] udp4_ufo_fragment+0x528/0x720 [ 2666.904303] ? skb_udp_tunnel_segment+0x1db0/0x1db0 [ 2666.905014] inet_gso_segment+0x4fb/0x11a0 [ 2666.905639] skb_mac_gso_segment+0x273/0x570 [ 2666.906262] ? inet_sock_destruct+0x840/0x840 [ 2666.906894] ? skb_network_protocol+0x650/0x650 [ 2666.907547] ? skb_crc32c_csum_help+0x80/0x80 [ 2666.908168] ? lock_acquire+0x197/0x470 [ 2666.908735] ? __dev_queue_xmit+0x1c6/0x2690 [ 2666.925425] __skb_gso_segment+0x32d/0x6d0 [ 2666.926016] ? mark_lock+0xf5/0x2df0 [ 2666.926529] validate_xmit_skb.constprop.0+0x4f6/0xcd0 [ 2666.927253] ? lock_chain_count+0x20/0x20 [ 2666.927839] ? netdev_core_pick_tx+0x1d1/0x2f0 [ 2666.928473] __dev_queue_xmit+0x825/0x2690 [ 2666.929082] ? percpu_rwsem_wake_function+0x3d0/0x3f0 [ 2666.929792] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2666.930428] ? mark_held_locks+0x9e/0xe0 [ 2666.930997] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2666.931724] neigh_connected_output+0x382/0x4d0 [ 2666.932371] ip_finish_output2+0x6f1/0x21f0 [ 2666.932963] ? nf_hook_slow+0xfc/0x1e0 [ 2666.933531] ? ip_frag_next+0x9e0/0x9e0 [ 2666.934081] ? skb_gso_transport_seglen+0x1ca/0x360 [ 2666.934776] __ip_finish_output.part.0+0x5f3/0xb50 [ 2666.935467] ? ip_fragment.constprop.0+0x240/0x240 [ 2666.936151] ? netif_rx_ni+0xe7/0x300 [ 2666.936694] ip_mc_output+0x401/0xa30 [ 2666.937241] ip_send_skb+0xdd/0x260 [ 2666.937754] udp_send_skb+0x6da/0x11d0 [ 2666.938306] udp_sendmsg+0x139a/0x2160 [ 2666.938828] ? mark_lock+0xf5/0x2df0 [ 2666.939350] ? ip_frag_init+0x350/0x350 [ 2666.939880] ? lock_chain_count+0x20/0x20 [ 2666.940456] ? udp_setsockopt+0xc0/0xc0 [ 2666.957043] ? mark_lock+0xf5/0x2df0 [ 2666.957582] ? lock_acquire+0x197/0x470 [ 2666.958118] ? lock_chain_count+0x20/0x20 [ 2666.958687] ? mark_lock+0xf5/0x2df0 [ 2666.959202] ? mark_lock+0xf5/0x2df0 [ 2666.959710] ? lock_chain_count+0x20/0x20 [ 2666.960289] ? __lock_acquire+0xbb1/0x5b00 [ 2666.960884] ? lock_chain_count+0x20/0x20 [ 2666.961503] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2666.962235] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.962828] udpv6_sendmsg+0x1bcf/0x2ad0 [ 2666.963384] ? udp_v6_push_pending_frames+0x360/0x360 [ 2666.964059] ? SOFTIRQ_verbose+0x10/0x10 [ 2666.964619] ? mark_lock+0xf5/0x2df0 [ 2666.965133] ? lock_acquire+0x197/0x470 [ 2666.965655] ? find_held_lock+0x2c/0x110 [ 2666.966205] ? __might_fault+0xd3/0x180 [ 2666.966728] ? lock_downgrade+0x6d0/0x6d0 [ 2666.967310] ? lock_downgrade+0x6d0/0x6d0 [ 2666.967892] ? sock_has_perm+0x1ea/0x280 [ 2666.968434] ? selinux_socket_post_create+0x7f0/0x7f0 [ 2666.969155] ? _copy_from_user+0xfb/0x1b0 [ 2666.969715] ? __import_iovec+0x458/0x590 [ 2666.970284] ? udp_v6_push_pending_frames+0x360/0x360 [ 2666.970972] inet6_sendmsg+0x105/0x140 [ 2666.971516] ? inet6_compat_ioctl+0x320/0x320 [ 2666.972147] __sock_sendmsg+0xf2/0x190 [ 2666.972675] ____sys_sendmsg+0x70d/0x870 [ 2666.989289] ? sock_write_iter+0x3d0/0x3d0 [ 2666.989885] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2666.990605] ___sys_sendmsg+0xf3/0x170 [ 2666.991114] ? sendmsg_copy_msghdr+0x160/0x160 [ 2666.991718] ? __fget_files+0x2cf/0x520 [ 2666.992251] ? lock_downgrade+0x6d0/0x6d0 [ 2666.992794] ? find_held_lock+0x2c/0x110 [ 2666.993389] ? __fget_files+0x2f8/0x520 [ 2666.993948] ? __fget_light+0xea/0x290 [ 2666.994474] __sys_sendmsg+0xe5/0x1b0 [ 2666.994982] ? __sys_sendmsg_sock+0x40/0x40 [ 2666.995605] ? rcu_read_lock_any_held+0x75/0xa0 [ 2666.996250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2666.996946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2666.997665] ? trace_hardirqs_on+0x5b/0x180 [ 2666.998257] do_syscall_64+0x33/0x40 [ 2666.998762] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2666.999435] RIP: 0033:0x7f251a6f7b19 [ 2666.999954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2667.002422] RSP: 002b:00007f2517c6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2667.003434] RAX: ffffffffffffffda RBX: 00007f251a80af60 RCX: 00007f251a6f7b19 [ 2667.004392] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 2667.021413] RBP: 00007f2517c6d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.022347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2667.023280] R13: 00007ffd117a841f R14: 00007f2517c6d300 R15: 0000000000022000 [ 2669.556806] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2669.558328] CPU: 1 PID: 288 Comm: syz-executor.2 Not tainted 5.10.232 #1 [ 2669.559146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.560147] Call Trace: [ 2669.560476] dump_stack+0x107/0x167 [ 2669.560925] dump_header+0x106/0x655 [ 2669.561418] oom_kill_process.cold+0x10/0x15 [ 2669.561968] out_of_memory+0x1149/0x1440 [ 2669.562478] ? oom_killer_disable+0x280/0x280 [ 2669.563039] ? mutex_trylock+0x237/0x2b0 [ 2669.563540] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2669.564261] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2669.564994] ? lock_acquire+0x167/0x470 [ 2669.565510] ? warn_alloc+0x190/0x190 [ 2669.566003] __alloc_pages_nodemask+0x51d/0x600 [ 2669.566580] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2669.567313] ? find_get_entry+0x2c8/0x740 [ 2669.567837] alloc_pages_current+0x187/0x280 [ 2669.568383] __page_cache_alloc+0x2d2/0x360 [ 2669.568920] pagecache_get_page+0x2c7/0xc80 [ 2669.569482] filemap_fault+0x177d/0x2210 [ 2669.569994] ? read_cache_page_gfp+0x30/0x30 [ 2669.570540] ? replace_page_cache_page+0x1200/0x1200 [ 2669.571166] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2669.571822] ext4_filemap_fault+0x87/0xc0 [ 2669.572334] __do_fault+0x113/0x410 [ 2669.572798] handle_mm_fault+0x1e53/0x3500 [ 2669.573360] ? __pmd_alloc+0x5e0/0x5e0 [ 2669.573845] ? vmacache_find+0x55/0x2a0 [ 2669.574343] do_user_addr_fault+0x56e/0xc60 [ 2669.574878] exc_page_fault+0xa2/0x1a0 [ 2669.575357] ? asm_exc_page_fault+0x8/0x30 [ 2669.575871] asm_exc_page_fault+0x1e/0x30 [ 2669.576370] RIP: 0033:0x7fb9d7af0688 [ 2669.576825] Code: Unable to access opcode bytes at RIP 0x7fb9d7af065e. [ 2669.577636] RSP: 002b:00007ffc83066650 EFLAGS: 00010202 [ 2669.578286] RAX: 0000001b2d420000 RBX: 00000000000003b0 RCX: 000000000028b9c8 [ 2669.579149] RDX: 000000000028ba49 RSI: 00007ffc83066710 RDI: 0000000000000001 [ 2669.580005] RBP: 00007ffc830666ac R08: 0000000000000a6d R09: 00007ffc830c6080 [ 2669.580863] R10: 00007ffc830c6090 R11: 00000000004766c4 R12: 0000000000000032 [ 2669.581767] R13: 000000000028b25b R14: 000000000000000f R15: 00007ffc83066710 [ 2669.583890] Mem-Info: [ 2669.584222] active_anon:620 inactive_anon:62472 isolated_anon:0 [ 2669.584222] active_file:7 inactive_file:8 isolated_file:0 [ 2669.584222] unevictable:0 dirty:0 writeback:0 [ 2669.584222] slab_reclaimable:9315 slab_unreclaimable:61445 [ 2669.584222] mapped:69639 shmem:211 pagetables:1240 bounce:0 [ 2669.584222] free:2869 free_pcp:0 free_cma:0 [ 2669.588115] Node 0 active_anon:2480kB inactive_anon:249888kB active_file:28kB inactive_file:32kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:844kB writeback_tmp:0kB kernel_stack:4256kB all_unreclaimable? yes [ 2669.590904] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2669.594094] lowmem_reserve[]: 0 1616 1616 1616 [ 2669.594711] Node 0 DMA32 free:4964kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:2480kB inactive_anon:249888kB active_file:88kB inactive_file:32kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:4960kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2669.598150] lowmem_reserve[]: 0 0 0 0 [ 2669.598681] Node 0 DMA: 2*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 2669.600466] Node 0 DMA32: 491*4kB (UME) 181*8kB (UM) 67*16kB (UM) 11*32kB (ME) 7*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5284kB [ 2669.602238] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2669.603280] 254 total pagecache pages [ 2669.603763] 0 pages in swap cache [ 2669.604178] Swap cache stats: add 0, delete 0, find 0/0 [ 2669.604838] Free swap = 0kB [ 2669.605224] Total swap = 0kB [ 2669.605611] 524158 pages RAM [ 2669.605978] 0 pages HighMem/MovableOnly [ 2669.606476] 105067 pages reserved [ 2669.606893] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=288,uid=0 [ 2669.608987] Out of memory (oom_kill_allocating_task): Killed process 288 (syz-executor.2) total-vm:93280kB, anon-rss:388kB, file-rss:34576kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 2669.747765] syz-executor.7 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2669.749168] CPU: 0 PID: 290 Comm: syz-executor.7 Not tainted 5.10.232 #1 [ 2669.750053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.751127] Call Trace: [ 2669.751472] dump_stack+0x107/0x167 [ 2669.751947] dump_header+0x106/0x655 [ 2669.752434] oom_kill_process.cold+0x10/0x15 [ 2669.753007] out_of_memory+0x1149/0x1440 [ 2669.753561] ? oom_killer_disable+0x280/0x280 [ 2669.754145] ? mutex_trylock+0x237/0x2b0 [ 2669.754673] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2669.755443] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2669.756210] ? lock_acquire+0x167/0x470 [ 2669.756729] ? warn_alloc+0x190/0x190 [ 2669.757249] __alloc_pages_nodemask+0x51d/0x600 [ 2669.757855] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2669.758636] ? find_get_entry+0x2c8/0x740 [ 2669.759182] alloc_pages_current+0x187/0x280 [ 2669.759755] __page_cache_alloc+0x2d2/0x360 [ 2669.760320] pagecache_get_page+0x2c7/0xc80 [ 2669.760887] filemap_fault+0x177d/0x2210 [ 2669.761844] ? read_cache_page_gfp+0x30/0x30 [ 2669.762961] ? replace_page_cache_page+0x1200/0x1200 [ 2669.764245] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2669.765415] ext4_filemap_fault+0x87/0xc0 [ 2669.765958] __do_fault+0x113/0x410 [ 2669.766464] handle_mm_fault+0x1e53/0x3500 [ 2669.767022] ? __pmd_alloc+0x5e0/0x5e0 [ 2669.767585] ? vmacache_find+0x55/0x2a0 [ 2669.768138] do_user_addr_fault+0x56e/0xc60 [ 2669.768708] exc_page_fault+0xa2/0x1a0 [ 2669.769448] ? asm_exc_page_fault+0x8/0x30 [ 2669.770494] asm_exc_page_fault+0x1e/0x30 [ 2669.771507] RIP: 0033:0x7f5e329b8688 [ 2669.772419] Code: Unable to access opcode bytes at RIP 0x7f5e329b865e. [ 2669.773626] RSP: 002b:00007fff7c736ad0 EFLAGS: 00010212 [ 2669.774320] RAX: 0000001b2d520000 RBX: 0000000000000377 RCX: 000000000028b9c8 [ 2669.775246] RDX: 000000000028ba52 RSI: 00007fff7c736b90 RDI: 0000000000000001 [ 2669.776170] RBP: 00007fff7c736b2c R08: 0000000000000a6d R09: 00007fff7c7e3080 [ 2669.777133] R10: 00007fff7c7e3090 R11: 00000000004766d6 R12: 0000000000000032 [ 2669.778064] R13: 000000000028b254 R14: 000000000000000d R15: 00007fff7c736b90 [ 2669.779479] Mem-Info: [ 2669.779819] active_anon:620 inactive_anon:62472 isolated_anon:0 [ 2669.779819] active_file:17 inactive_file:22 isolated_file:0 [ 2669.779819] unevictable:0 dirty:0 writeback:0 [ 2669.779819] slab_reclaimable:9315 slab_unreclaimable:61445 [ 2669.779819] mapped:69639 shmem:211 pagetables:1240 bounce:0 [ 2669.779819] free:2808 free_pcp:31 free_cma:0 [ 2669.784029] Node 0 active_anon:2480kB inactive_anon:249888kB active_file:68kB inactive_file:88kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:844kB writeback_tmp:0kB kernel_stack:4256kB all_unreclaimable? yes [ 2669.787047] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2669.790449] lowmem_reserve[]: 0 1616 1616 1616 [ 2669.791065] Node 0 DMA32 free:4720kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:2480kB inactive_anon:249888kB active_file:172kB inactive_file:32kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:4960kB bounce:0kB free_pcp:124kB local_pcp:0kB free_cma:0kB [ 2669.794765] lowmem_reserve[]: 0 0 0 0 [ 2669.795284] Node 0 DMA: 2*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 2669.797140] Node 0 DMA32: 498*4kB (UME) 182*8kB (UM) 67*16kB (UM) 11*32kB (ME) 7*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5320kB [ 2669.799006] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2669.800111] 254 total pagecache pages [ 2669.800664] 0 pages in swap cache [ 2669.801180] Swap cache stats: add 0, delete 0, find 0/0 [ 2669.801885] Free swap = 0kB [ 2669.802284] Total swap = 0kB [ 2669.802697] 524158 pages RAM [ 2669.803105] 0 pages HighMem/MovableOnly [ 2669.803648] 105067 pages reserved [ 2669.804094] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz7,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=290,uid=0 [ 2669.806022] Out of memory (oom_kill_allocating_task): Killed process 290 (syz-executor.7) total-vm:93280kB, anon-rss:388kB, file-rss:34568kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 2669.852231] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2669.853744] CPU: 1 PID: 178 Comm: in:imklog Not tainted 5.10.232 #1 [ 2669.855593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.857980] Call Trace: [ 2669.858634] dump_stack+0x107/0x167 [ 2669.859553] dump_header+0x106/0x655 [ 2669.860488] oom_kill_process.cold+0x10/0x15 [ 2669.861700] out_of_memory+0x1149/0x1440 [ 2669.862900] ? oom_killer_disable+0x280/0x280 [ 2669.864265] ? mutex_trylock+0x237/0x2b0 [ 2669.865447] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2669.866948] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2669.868431] ? lock_acquire+0x167/0x470 [ 2669.869471] ? warn_alloc+0x190/0x190 [ 2669.870451] __alloc_pages_nodemask+0x51d/0x600 [ 2669.871662] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2669.873188] ? find_get_entry+0x2c8/0x740 [ 2669.874206] alloc_pages_current+0x187/0x280 [ 2669.875276] __page_cache_alloc+0x2d2/0x360 [ 2669.876329] pagecache_get_page+0x2c7/0xc80 [ 2669.877269] filemap_fault+0x177d/0x2210 [ 2669.877771] ? read_cache_page_gfp+0x30/0x30 [ 2669.878311] ? replace_page_cache_page+0x1200/0x1200 [ 2669.878935] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2669.879607] ext4_filemap_fault+0x87/0xc0 [ 2669.880110] __do_fault+0x113/0x410 [ 2669.880595] handle_mm_fault+0x1e53/0x3500 [ 2669.881151] ? __pmd_alloc+0x5e0/0x5e0 [ 2669.881636] ? vmacache_find+0x55/0x2a0 [ 2669.882118] ? vmacache_update+0xce/0x140 [ 2669.882627] do_user_addr_fault+0x56e/0xc60 [ 2669.883157] exc_page_fault+0xa2/0x1a0 [ 2669.883630] ? asm_exc_page_fault+0x8/0x30 [ 2669.884143] asm_exc_page_fault+0x1e/0x30 [ 2669.884642] RIP: 0033:0x7f1346d6b08c [ 2669.885122] Code: Unable to access opcode bytes at RIP 0x7f1346d6b062. [ 2669.885917] RSP: 002b:00007f13463074d0 EFLAGS: 00010246 [ 2669.886567] RAX: 0000000000000ed8 RBX: 0000000000000000 RCX: 00007f1346d6b08c [ 2669.887429] RDX: 0000000000001fa0 RSI: 00007f1346307d00 RDI: 0000000000000005 [ 2669.888291] RBP: 00005584593584c0 R08: 0000000000000000 R09: 0000558459354e88 [ 2669.889187] R10: a3d70a3d70a3d70b R11: 0000000000000246 R12: 00007f1346307d00 [ 2669.890057] R13: 0000000000001fa0 R14: 00007f1346307d00 R15: 00007f134630943a [ 2669.892052] Mem-Info: [ 2669.892511] active_anon:620 inactive_anon:62430 isolated_anon:0 [ 2669.892511] active_file:38 inactive_file:14 isolated_file:0 [ 2669.892511] unevictable:0 dirty:0 writeback:0 [ 2669.892511] slab_reclaimable:9315 slab_unreclaimable:61445 [ 2669.892511] mapped:69639 shmem:211 pagetables:1240 bounce:0 [ 2669.892511] free:2653 free_pcp:162 free_cma:0 [ 2669.896305] Node 0 active_anon:2480kB inactive_anon:249720kB active_file:152kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:844kB writeback_tmp:0kB kernel_stack:4256kB all_unreclaimable? yes [ 2669.899105] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2669.902281] lowmem_reserve[]: 0 1616 1616 1616 [ 2669.902903] Node 0 DMA32 free:4124kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:2480kB inactive_anon:249888kB active_file:116kB inactive_file:20kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:4960kB bounce:0kB free_pcp:696kB local_pcp:248kB free_cma:0kB [ 2669.906376] lowmem_reserve[]: 0 0 0 0 [ 2669.906879] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2669.908572] Node 0 DMA32: 391*4kB (UME) 167*8kB (UM) 54*16kB (UM) 6*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3956kB [ 2669.910297] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2669.911350] 254 total pagecache pages [ 2669.911807] 0 pages in swap cache [ 2669.912224] Swap cache stats: add 0, delete 0, find 0/0 [ 2669.912885] Free swap = 0kB [ 2669.913265] Total swap = 0kB [ 2669.913652] 524158 pages RAM [ 2669.914017] 0 pages HighMem/MovableOnly [ 2669.914517] 105067 pages reserved [ 2669.914934] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=178,uid=0 [ 2669.917047] Out of memory (oom_kill_allocating_task): Killed process 173 (rsyslogd) total-vm:220876kB, anon-rss:1148kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2669.945807] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2669.947179] CPU: 0 PID: 255 Comm: syz-fuzzer Not tainted 5.10.232 #1 [ 2669.948009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2669.949094] Call Trace: [ 2669.949453] dump_stack+0x107/0x167 [ 2669.949925] dump_header+0x106/0x655 [ 2669.950411] oom_kill_process.cold+0x10/0x15 [ 2669.950982] out_of_memory+0x1149/0x1440 [ 2669.951515] ? oom_killer_disable+0x280/0x280 [ 2669.952098] ? mutex_trylock+0x237/0x2b0 [ 2669.952629] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2669.953415] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2669.954180] ? lock_acquire+0x167/0x470 [ 2669.954699] ? warn_alloc+0x190/0x190 [ 2669.955211] __alloc_pages_nodemask+0x51d/0x600 [ 2669.955816] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2669.956597] ? find_get_entry+0x2c8/0x740 [ 2669.957150] alloc_pages_current+0x187/0x280 [ 2669.957723] __page_cache_alloc+0x2d2/0x360 [ 2669.958288] pagecache_get_page+0x2c7/0xc80 [ 2669.958859] filemap_fault+0x177d/0x2210 [ 2669.959395] ? read_cache_page_gfp+0x30/0x30 [ 2669.959967] ? replace_page_cache_page+0x1200/0x1200 [ 2669.960624] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2669.961319] ext4_filemap_fault+0x87/0xc0 [ 2669.961862] __do_fault+0x113/0x410 [ 2669.962338] handle_mm_fault+0x1e53/0x3500 [ 2669.962892] ? _copy_from_user+0xfb/0x1b0 [ 2669.963432] ? __pmd_alloc+0x5e0/0x5e0 [ 2669.963944] ? vmacache_find+0x55/0x2a0 [ 2669.964468] do_user_addr_fault+0x56e/0xc60 [ 2669.965032] exc_page_fault+0xa2/0x1a0 [ 2669.965553] ? asm_exc_page_fault+0x8/0x30 [ 2669.966100] asm_exc_page_fault+0x1e/0x30 [ 2669.966632] RIP: 0033:0x466533 [ 2669.967047] Code: Unable to access opcode bytes at RIP 0x466509. [ 2669.967829] RSP: 002b:000000c00003fe80 EFLAGS: 00010206 [ 2669.968520] RAX: ffffffffffffff92 RBX: 00000000240657dd RCX: 0000000000466533 [ 2669.969459] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000001f20e78 [ 2669.970382] RBP: 000000c00003fec8 R08: 0000000000000000 R09: 0000000000000000 [ 2669.971305] R10: 000000c00003feb8 R11: 0000000000000206 R12: 0000000000438880 [ 2669.972228] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 2669.973243] Mem-Info: [ 2669.973598] active_anon:620 inactive_anon:62388 isolated_anon:0 [ 2669.973598] active_file:35 inactive_file:10 isolated_file:0 [ 2669.973598] unevictable:0 dirty:0 writeback:0 [ 2669.973598] slab_reclaimable:9315 slab_unreclaimable:61445 [ 2669.973598] mapped:69639 shmem:211 pagetables:1240 bounce:0 [ 2669.973598] free:2401 free_pcp:310 free_cma:0 [ 2669.978185] Node 0 active_anon:2480kB inactive_anon:249552kB active_file:140kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:844kB writeback_tmp:0kB kernel_stack:4224kB all_unreclaimable? yes [ 2669.981311] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2669.986877] lowmem_reserve[]: 0 1616 1616 1616 [ 2669.987521] Node 0 DMA32 free:3116kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:2480kB inactive_anon:249888kB active_file:108kB inactive_file:8kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:4960kB bounce:0kB free_pcp:1240kB local_pcp:744kB free_cma:0kB [ 2669.991347] lowmem_reserve[]: 0 0 0 0 [ 2669.991866] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2669.994275] Node 0 DMA32: 304*4kB (ME) 156*8kB (UM) 44*16kB (UM) 2*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3232kB [ 2669.997481] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2669.998608] 254 total pagecache pages [ 2669.999101] 0 pages in swap cache [ 2669.999572] Swap cache stats: add 0, delete 0, find 0/0 [ 2670.000255] Free swap = 0kB [ 2670.000662] Total swap = 0kB [ 2670.001052] 524158 pages RAM [ 2670.001502] 0 pages HighMem/MovableOnly [ 2670.002011] 105067 pages reserved [ 2670.002480] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=255,uid=0 [ 2670.004496] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1237652kB, anon-rss:213388kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:920kB oom_score_adj:0 [ 2670.018918] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 2670.020644] CPU: 1 PID: 12026 Comm: syz-executor.7 Not tainted 5.10.232 #1 [ 2670.021496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2670.022503] Call Trace: [ 2670.022827] dump_stack+0x107/0x167 [ 2670.023274] warn_alloc.cold+0x95/0x18a [ 2670.023762] ? zone_watermark_ok_safe+0x260/0x260 [ 2670.024348] ? queue_oom_reaper+0x86/0x1e0 [ 2670.024909] ? wait_for_completion_io+0x270/0x270 [ 2670.025944] __alloc_pages_slowpath.constprop.0+0x1c33/0x2170 [ 2670.027432] ? lock_acquire+0x167/0x470 [ 2670.028408] ? warn_alloc+0x190/0x190 [ 2670.029455] __alloc_pages_nodemask+0x51d/0x600 [ 2670.030871] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2670.032498] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2670.034168] ? __sanitizer_cov_trace_const_cmp2+0x4/0x20 [ 2670.035548] alloc_pages_current+0x187/0x280 [ 2670.036652] relay_open_buf.part.0+0x2a5/0xc00 [ 2670.037486] relay_open+0x531/0xa10 [ 2670.037939] do_blk_trace_setup+0x4cf/0xc10 [ 2670.038465] ? _copy_from_user+0xfb/0x1b0 [ 2670.038972] __blk_trace_setup+0xca/0x180 [ 2670.039477] ? do_blk_trace_setup+0xc10/0xc10 [ 2670.040040] blk_trace_ioctl+0x155/0x290 [ 2670.040538] ? blk_add_trace_bio_remap+0x5d0/0x5d0 [ 2670.041201] ? do_vfs_ioctl+0x283/0x10d0 [ 2670.041699] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2670.042337] ? generic_block_fiemap+0x60/0x60 [ 2670.042882] ? lock_downgrade+0x6d0/0x6d0 [ 2670.043395] blkdev_ioctl+0xc1/0x710 [ 2670.043850] ? blkdev_common_ioctl+0x1930/0x1930 [ 2670.044429] ? selinux_file_ioctl+0xb6/0x270 [ 2670.044969] block_ioctl+0xf9/0x140 [ 2670.045844] ? blkdev_read_iter+0x1c0/0x1c0 [ 2670.046934] __x64_sys_ioctl+0x19a/0x210 [ 2670.047963] do_syscall_64+0x33/0x40 [ 2670.048885] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2670.050230] RIP: 0033:0x7f5e32a0bb19 [ 2670.051171] Code: Unable to access opcode bytes at RIP 0x7f5e32a0baef. [ 2670.052817] RSP: 002b:00007f5e2ff81188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2670.053902] RAX: ffffffffffffffda RBX: 00007f5e32b1ef60 RCX: 00007f5e32a0bb19 [ 2670.054768] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 2670.055635] RBP: 00007f5e32a65f6d R08: 0000000000000000 R09: 0000000000000000 [ 2670.056513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2670.057740] R13: 00007fff7c73687f R14: 00007f5e2ff81300 R15: 0000000000022000 [ 2670.059605] Mem-Info: [ 2670.060202] active_anon:620 inactive_anon:62367 isolated_anon:0 [ 2670.060202] active_file:35 inactive_file:10 isolated_file:0 [ 2670.060202] unevictable:0 dirty:0 writeback:0 [ 2670.060202] slab_reclaimable:9315 slab_unreclaimable:61301 [ 2670.060202] mapped:69639 shmem:211 pagetables:1173 bounce:0 [ 2670.060202] free:2566 free_pcp:357 free_cma:0 [ 2670.068861] Node 0 active_anon:2480kB inactive_anon:249468kB active_file:140kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:844kB writeback_tmp:0kB kernel_stack:4192kB all_unreclaimable? yes [ 2670.074942] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2670.082705] lowmem_reserve[]: 0 1616 1616 1616 [ 2670.083999] Node 0 DMA32 free:3776kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:2480kB inactive_anon:249540kB active_file:108kB inactive_file:60kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:4692kB bounce:0kB free_pcp:1528kB local_pcp:496kB free_cma:0kB [ 2670.090171] lowmem_reserve[]: 0 0 0 0 [ 2670.090684] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2670.092349] Node 0 DMA32: 304*4kB (ME) 162*8kB (UM) 49*16kB (UM) 14*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3808kB [ 2670.095118] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2670.097184] 254 total pagecache pages [ 2670.098304] 0 pages in swap cache [ 2670.099335] Swap cache stats: add 0, delete 0, find 0/0 [ 2670.100910] Free swap = 0kB [ 2670.101439] Total swap = 0kB [ 2670.101813] 524158 pages RAM [ 2670.102184] 0 pages HighMem/MovableOnly [ 2670.102694] 105067 pages reserved [ 2671.084014] systemd-rfkill invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=0 [ 2671.085637] CPU: 0 PID: 12082 Comm: systemd-rfkill Not tainted 5.10.232 #1 [ 2671.086507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2671.087559] Call Trace: [ 2671.087940] dump_stack+0x107/0x167 [ 2671.088400] dump_header+0x106/0x655 [ 2671.088894] oom_kill_process.cold+0x10/0x15 [ 2671.089464] out_of_memory+0x1149/0x1440 [ 2671.089978] ? oom_killer_disable+0x280/0x280 [ 2671.090539] ? mutex_trylock+0x237/0x2b0 [ 2671.091091] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2671.091860] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2671.092600] ? lock_acquire+0x167/0x470 [ 2671.093147] ? warn_alloc+0x190/0x190 [ 2671.093672] __alloc_pages_nodemask+0x51d/0x600 [ 2671.094250] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2671.095028] ? up_write+0x191/0x550 [ 2671.095485] ? rwlock_bug.part.0+0x90/0x90 [ 2671.096017] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2671.096720] alloc_pages_vma+0xbb/0x410 [ 2671.097260] handle_mm_fault+0x152f/0x3500 [ 2671.097820] ? vm_mmap_pgoff+0x1b7/0x1f0 [ 2671.098320] ? vm_mmap_pgoff+0xe8/0x1f0 [ 2671.098859] ? __pmd_alloc+0x5e0/0x5e0 [ 2671.099348] ? vmacache_find+0x55/0x2a0 [ 2671.099868] ? vmacache_update+0xce/0x140 [ 2671.100384] do_user_addr_fault+0x56e/0xc60 [ 2671.100922] exc_page_fault+0xa2/0x1a0 [ 2671.101424] ? asm_exc_page_fault+0x8/0x30 [ 2671.101955] asm_exc_page_fault+0x1e/0x30 [ 2671.102467] RIP: 0033:0x7f9aa356acf6 [ 2671.102946] Code: be 01 00 00 00 4c 89 5c 24 20 48 89 54 24 18 e8 60 53 ff ff 49 89 c6 48 85 c0 0f 84 41 02 00 00 48 8b 54 24 18 4c 8b 5c 24 20 <48> 89 40 28 4c 89 e6 4c 8d 8c 10 80 04 00 00 4c 89 da 4c 89 88 d0 [ 2671.105272] RSP: 002b:00007fffaa802ba0 EFLAGS: 00010206 [ 2671.105935] RAX: 00007f9aa305d000 RBX: 0000000000000000 RCX: 00007f9aa305d4b0 [ 2671.106812] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 [ 2671.107692] RBP: 00007f9aa355d000 R08: 00000000ffffffff R09: 0000000000000000 [ 2671.108569] R10: 0000000000000022 R11: 0000000000000010 R12: 00007f9aa32fdc09 [ 2671.109469] R13: 000000000000000f R14: 00007f9aa305d000 R15: 0000000000000000 [ 2671.110661] Mem-Info: [ 2671.110989] active_anon:53 inactive_anon:30664 isolated_anon:105 [ 2671.110989] active_file:916 inactive_file:839 isolated_file:39 [ 2671.110989] unevictable:0 dirty:0 writeback:0 [ 2671.110989] slab_reclaimable:8613 slab_unreclaimable:59650 [ 2671.110989] mapped:18835 shmem:106 pagetables:609 bounce:0 [ 2671.110989] free:3967 free_pcp:361 free_cma:0 [ 2671.115036] Node 0 active_anon:176kB inactive_anon:122704kB active_file:3652kB inactive_file:3336kB unevictable:0kB isolated(anon):348kB isolated(file):156kB mapped:75308kB dirty:0kB writeback:0kB shmem:420kB writeback_tmp:0kB kernel_stack:3168kB all_unreclaimable? no [ 2671.118041] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:8kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2671.121362] lowmem_reserve[]: 0 1616 1616 1616 [ 2671.121948] Node 0 DMA32 free:9616kB min:17744kB low:19396kB high:21048kB reserved_highatomic:0KB active_anon:176kB inactive_anon:122620kB active_file:3980kB inactive_file:3660kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:2380kB bounce:0kB free_pcp:1628kB local_pcp:1324kB free_cma:0kB [ 2671.125669] lowmem_reserve[]: 0 0 0 0 [ 2671.126168] Node 0 DMA: 0*4kB 1*8kB (M) 1*16kB (U) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2671.128136] Node 0 DMA32: 782*4kB (UME) 453*8kB (UME) 151*16kB (UME) 24*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9936kB [ 2671.129905] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2671.130969] 1810 total pagecache pages [ 2671.131461] 0 pages in swap cache [ 2671.131934] Swap cache stats: add 0, delete 0, find 0/0 [ 2671.132613] Free swap = 0kB [ 2671.133009] Total swap = 0kB [ 2671.133415] 524158 pages RAM [ 2671.133808] 0 pages HighMem/MovableOnly [ 2671.134310] 105067 pages reserved [ 2671.134828] Unreclaimable slab info: [ 2671.135472] Name Used Total [ 2671.136231] pid_3 7KB 7KB [ 2671.136909] pid_2 63KB 63KB [ 2671.137598] IEEE-802.15.4-MAC 31KB 31KB [ 2671.138304] IEEE-802.15.4-RAW 63KB 63KB [ 2671.139004] p9_req_t 8KB 8KB [ 2671.139692] fib6_nodes 28KB 28KB [ 2671.140363] ip6_dst_cache 41KB 41KB [ 2671.141017] PINGv6 63KB 63KB [ 2671.141728] RAWv6 283KB 283KB [ 2671.142430] UDPLITEv6 31KB 31KB [ 2671.143108] UDPv6 93KB 93KB [ 2671.143797] TCPv6 62KB 62KB [ 2671.144473] scsi_sense_cache 8KB 8KB [ 2671.145149] sd_ext_cdb 3KB 3KB [ 2671.145837] virtio_scsi_cmd 16KB 16KB [ 2671.146521] sgpool-128 59KB 59KB [ 2671.147205] sgpool-64 63KB 63KB [ 2671.147873] sgpool-32 157KB 157KB [ 2671.148544] sgpool-16 82KB 82KB [ 2671.149279] sgpool-8 45KB 45KB [ 2671.149984] io_kiocb 22KB 22KB [ 2671.150655] mqueue_inode_cache 62KB 62KB [ 2671.151387] nfs_commit_data 15KB 15KB [ 2671.152072] nfs_write_data 47KB 47KB [ 2671.152751] jbd2_inode 7KB 7KB [ 2671.153447] ext4_system_zone 3KB 3KB [ 2671.154101] ext4_io_end_vec 7KB 7KB [ 2671.154773] ext4_bio_post_read_ctx 15KB 15KB [ 2671.155496] kioctx 31KB 31KB [ 2671.156160] aio_kiocb 3KB 3KB [ 2671.156869] bio-2 4KB 4KB [ 2671.157571] fasync_cache 3KB 3KB [ 2671.158277] pid_namespace 7KB 7KB [ 2671.158982] posix_timers_cache 15KB 15KB [ 2671.159664] rpc_buffers 31KB 31KB [ 2671.160386] rpc_tasks 3KB 3KB [ 2671.161060] UNIX 294KB 320KB [ 2671.161800] ip4-frags 31KB 31KB [ 2671.162475] tcp_bind_bucket 8KB 8KB [ 2671.163130] inet_peer_cache 8KB 8KB [ 2671.163804] ip_fib_trie 8KB 8KB [ 2671.164483] ip_fib_alias 15KB 15KB [ 2671.165157] ip_dst_cache 79KB 120KB [ 2671.165841] RAW 125KB 125KB [ 2671.166526] UDP 257KB 283KB [ 2671.167181] request_sock_TCP 7KB 7KB [ 2671.167861] TCP 60KB 60KB [ 2671.168536] hugetlbfs_inode_cache 15KB 15KB [ 2671.169266] bio-1 11KB 11KB [ 2671.169945] eventpoll_pwq 19KB 19KB [ 2671.170623] eventpoll_epi 47KB 47KB [ 2671.171333] inotify_inode_mark 54KB 54KB [ 2671.172042] request_queue 60KB 60KB [ 2671.172715] blkdev_ioc 18KB 18KB [ 2671.177543] bio-0 208KB 208KB [ 2671.178209] biovec-max 1279KB 1279KB [ 2671.178891] biovec-64 220KB 220KB [ 2671.179564] biovec-16 63KB 63KB [ 2671.180224] user_namespace 31KB 31KB [ 2671.180900] uid_cache 8KB 8KB [ 2671.185676] dmaengine-unmap-2 4KB 4KB [ 2671.189842] audit_buffer 7KB 7KB [ 2671.193773] skbuff_fclone_cache 75KB 75KB [ 2671.194469] skbuff_head_cache 559KB 562KB [ 2671.195135] file_lock_cache 47KB 51KB [ 2671.195839] file_lock_ctx 7KB 7KB [ 2671.196510] fsnotify_mark_connector 24KB 24KB [ 2671.197252] net_namespace 143KB 143KB [ 2671.197924] task_delay_info 80KB 92KB [ 2671.198596] taskstats 54KB 54KB [ 2671.199252] proc_dir_entry 416KB 427KB [ 2671.199931] pde_opener 35KB 35KB [ 2671.200607] seq_file 56KB 56KB [ 2671.201309] sigqueue 63KB 63KB [ 2671.202029] shmem_inode_cache 1304KB 1352KB [ 2671.202705] kernfs_iattrs_cache 235KB 235KB [ 2671.203401] kernfs_node_cache 5734KB 5734KB [ 2671.204055] mnt_cache 244KB 244KB [ 2671.204749] filp 970KB 1575KB [ 2671.205438] names_cache 6562KB 6562KB [ 2671.206093] hashtab_node 274KB 274KB [ 2671.206765] ebitmap_node 1149KB 1149KB [ 2671.207437] avtab_node 4976KB 4976KB [ 2671.208094] avc_node 31KB 31KB [ 2671.208813] lsm_inode_cache 2716KB 3091KB [ 2671.209500] lsm_file_cache 180KB 192KB [ 2671.210155] key_jar 31KB 31KB [ 2671.210832] uts_namespace 15KB 15KB [ 2671.211504] nsproxy 7KB 7KB [ 2671.212170] vm_area_struct 883KB 984KB [ 2671.212844] fs_cache 64KB 64KB [ 2671.221630] files_cache 207KB 207KB [ 2671.222317] signal_cache 284KB 401KB [ 2671.223037] sighand_cache 305KB 360KB [ 2671.223729] task_struct 971KB 1260KB [ 2671.224437] cred_jar 83KB 168KB [ 2671.225154] anon_vma_chain 198KB 248KB [ 2671.225842] anon_vma 213KB 235KB [ 2671.226517] pid 42KB 63KB [ 2671.227176] Acpi-Operand 136KB 170KB [ 2671.227851] Acpi-ParseExt 27KB 27KB [ 2671.228525] Acpi-Parse 166KB 181KB [ 2671.229201] Acpi-State 133KB 149KB [ 2671.229875] Acpi-Namespace 24KB 24KB [ 2671.230559] numa_policy 3KB 3KB [ 2671.231220] trace_event_file 176KB 176KB [ 2671.231891] ftrace_event_field 280KB 280KB [ 2671.232577] pool_workqueue 40KB 40KB [ 2671.233302] task_group 16KB 16KB [ 2671.233984] mm_struct 259KB 315KB [ 2671.234657] vmap_area 149KB 149KB [ 2671.235314] page->ptl 236KB 236KB [ 2671.235993] kmemleak_scan_area 75KB 75KB [ 2671.237783] kmemleak_object 139178KB 155694KB [ 2671.238528] kmalloc-8k 4672KB 4832KB [ 2671.239195] kmalloc-4k 7464KB 7968KB [ 2671.239876] kmalloc-2k 4524KB 5024KB [ 2671.240559] kmalloc-1k 2682KB 3584KB [ 2671.245394] kmalloc-512 3211KB 4320KB [ 2671.253764] kmalloc-256 1376KB 1376KB [ 2671.254481] kmalloc-192 664KB 664KB [ 2671.255155] kmalloc-128 490KB 580KB [ 2671.255853] kmalloc-96 389KB 732KB [ 2671.256571] kmalloc-64 908KB 1288KB [ 2671.257253] kmalloc-32 770KB 824KB [ 2671.257940] kmalloc-16 343KB 368KB [ 2671.258617] kmalloc-8 346KB 346KB [ 2671.259354] kmem_cache_node 47KB 47KB [ 2671.260044] kmem_cache 75KB 75KB [ 2671.260720] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-rfkill.service,task=systemd-rfkill,pid=12082,uid=0 [ 2671.271780] Out of memory (oom_kill_allocating_task): Killed process 12082 (systemd-rfkill) total-vm:5488kB, anon-rss:84kB, file-rss:256kB, shmem-rss:0kB, UID:0 pgtables:40kB oom_score_adj:0 [ 2671.882538] oom_reaper: reaped process 12026 (syz-executor.7), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2671.933626] systemd invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 2671.935161] CPU: 0 PID: 1 Comm: systemd Not tainted 5.10.232 #1 [ 2671.935904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2671.936939] Call Trace: [ 2671.937300] dump_stack+0x107/0x167 [ 2671.937759] dump_header+0x106/0x655 [ 2671.938257] oom_kill_process.cold+0x10/0x15 [ 2671.938808] out_of_memory+0x358/0x1440 [ 2671.939331] ? oom_killer_disable+0x280/0x280 [ 2671.939912] ? mutex_trylock+0x237/0x2b0 [ 2671.940445] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2671.941190] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2671.941977] ? lock_acquire+0x167/0x470 [ 2671.942478] ? warn_alloc+0x190/0x190 [ 2671.942966] __alloc_pages_nodemask+0x51d/0x600 [ 2671.943547] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2671.944293] ? find_held_lock+0x2c/0x110 [ 2671.944804] alloc_pages_current+0x187/0x280 [ 2671.945369] ? __lock_acquire+0x1657/0x5b00 [ 2671.945906] pte_alloc_one+0x16/0x1a0 [ 2671.946380] __pte_alloc+0x1d/0x330 [ 2671.946834] copy_page_range+0x1b62/0x3810 [ 2671.947391] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2671.948077] ? vm_iomap_memory+0x190/0x190 [ 2671.948638] ? downgrade_write+0x3a0/0x3a0 [ 2671.949181] ? down_write_killable+0x180/0x180 [ 2671.949793] ? __vma_link_rb+0x540/0x700 [ 2671.950326] copy_process+0x759b/0x7800 [ 2671.950836] ? __cleanup_sighand+0xb0/0xb0 [ 2671.951410] ? lock_acquire+0x197/0x470 [ 2671.951909] kernel_clone+0xe7/0x980 [ 2671.952373] ? __might_fault+0xd3/0x180 [ 2671.952861] ? create_io_thread+0xf0/0xf0 [ 2671.953404] __do_sys_clone+0xc8/0x110 [ 2671.953883] ? kernel_clone+0x980/0x980 [ 2671.954377] ? vmacache_find+0x55/0x2a0 [ 2671.954880] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2671.955524] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2671.956159] do_syscall_64+0x33/0x40 [ 2671.956619] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2671.961292] RIP: 0033:0x7ff0d52dd4bb [ 2671.961755] Code: Unable to access opcode bytes at RIP 0x7ff0d52dd491. [ 2671.962606] RSP: 002b:00007ffc3fc5f740 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2671.963574] RAX: ffffffffffffffda RBX: 0000556821468108 RCX: 00007ff0d52dd4bb [ 2671.964455] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2671.965356] RBP: 0000000000000001 R08: 0000000000000000 R09: 00007ff0d4b33900 [ 2671.966236] R10: 00007ff0d4b33bd0 R11: 0000000000000246 R12: 0000000000000001 [ 2671.967108] R13: 00005568214646b0 R14: 0000000000000000 R15: 0000556821464690 [ 2671.968016] Mem-Info: [ 2671.968343] active_anon:36 inactive_anon:7856 isolated_anon:0 [ 2671.968343] active_file:11 inactive_file:5 isolated_file:0 [ 2671.968343] unevictable:0 dirty:0 writeback:0 [ 2671.968343] slab_reclaimable:8510 slab_unreclaimable:59340 [ 2671.968343] mapped:17410 shmem:94 pagetables:385 bounce:0 [ 2671.968343] free:2613 free_pcp:62 free_cma:0 [ 2671.972146] Node 0 active_anon:144kB inactive_anon:31424kB active_file:44kB inactive_file:104kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:69640kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3104kB all_unreclaimable? yes [ 2671.974990] Node 0 DMA free:6480kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:28kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2671.978249] lowmem_reserve[]: 0 1616 1616 1616 [ 2671.978869] Node 0 DMA32 free:48324kB min:11260kB low:12912kB high:14564kB reserved_highatomic:0KB active_anon:144kB inactive_anon:31412kB active_file:44kB inactive_file:104kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:1512kB bounce:0kB free_pcp:1452kB local_pcp:0kB free_cma:0kB [ 2671.982455] lowmem_reserve[]: 0 0 0 0 [ 2671.982952] Node 0 DMA: 2*4kB (UM) 3*8kB (UM) 1*16kB (U) 1*32kB (M) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6480kB [ 2671.985015] Node 0 DMA32: 2630*4kB (UME) 2627*8kB (UME) 1934*16kB (UME) 809*32kB (U) 15*64kB (U) 3*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 90992kB [ 2671.987118] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2671.988171] 131 total pagecache pages [ 2671.988653] 0 pages in swap cache [ 2671.989077] Swap cache stats: add 0, delete 0, find 0/0 [ 2671.989760] Free swap = 0kB [ 2671.990131] Total swap = 0kB [ 2671.990521] 524158 pages RAM [ 2671.990891] 0 pages HighMem/MovableOnly [ 2671.991409] 105067 pages reserved [ 2671.991917] Unreclaimable slab info: [ 2671.992616] Name Used Total [ 2671.993396] pid_3 7KB 7KB [ 2671.994056] pid_2 63KB 63KB [ 2671.994755] IEEE-802.15.4-MAC 31KB 31KB [ 2671.995464] IEEE-802.15.4-RAW 63KB 63KB [ 2671.996134] p9_req_t 8KB 8KB [ 2671.996810] fib6_nodes 28KB 28KB [ 2671.997518] ip6_dst_cache 41KB 41KB [ 2671.998170] PINGv6 63KB 63KB [ 2671.998838] RAWv6 283KB 283KB [ 2671.999507] UDPLITEv6 31KB 31KB [ 2672.000157] UDPv6 93KB 93KB [ 2672.000877] TCPv6 62KB 62KB [ 2672.001577] scsi_sense_cache 8KB 8KB [ 2672.002229] sd_ext_cdb 3KB 3KB [ 2672.002941] virtio_scsi_cmd 16KB 16KB [ 2672.003652] sgpool-128 59KB 59KB [ 2672.004306] sgpool-64 63KB 63KB [ 2672.005019] sgpool-32 173KB 173KB [ 2672.005708] sgpool-16 82KB 82KB [ 2672.006382] sgpool-8 45KB 45KB [ 2672.007033] io_kiocb 22KB 22KB [ 2672.007701] mqueue_inode_cache 62KB 62KB [ 2672.008386] nfs_commit_data 15KB 15KB [ 2672.009037] nfs_write_data 47KB 47KB [ 2672.009734] jbd2_inode 7KB 7KB [ 2672.010406] ext4_system_zone 3KB 3KB [ 2672.011057] ext4_io_end_vec 7KB 7KB [ 2672.011734] ext4_bio_post_read_ctx 15KB 15KB [ 2672.012463] kioctx 31KB 31KB [ 2672.013119] aio_kiocb 3KB 3KB [ 2672.013857] bio-2 4KB 4KB [ 2672.014532] fasync_cache 3KB 3KB [ 2672.015183] pid_namespace 7KB 7KB [ 2672.015852] posix_timers_cache 15KB 15KB [ 2672.016540] rpc_buffers 31KB 31KB [ 2672.017219] rpc_tasks 3KB 3KB [ 2672.017914] UNIX 294KB 320KB [ 2672.018587] ip4-frags 31KB 31KB [ 2672.019242] tcp_bind_bucket 8KB 8KB [ 2672.019910] inet_peer_cache 8KB 8KB [ 2672.020581] ip_fib_trie 8KB 8KB [ 2672.021254] ip_fib_alias 15KB 15KB [ 2672.021937] ip_dst_cache 79KB 120KB [ 2672.022638] RAW 125KB 125KB [ 2672.023290] UDP 257KB 283KB [ 2672.023972] tw_sock_TCP 7KB 7KB [ 2672.024645] request_sock_TCP 7KB 7KB [ 2672.025315] TCP 60KB 60KB [ 2672.025985] hugetlbfs_inode_cache 15KB 15KB [ 2672.026696] bio-1 11KB 11KB [ 2672.027370] eventpoll_pwq 19KB 19KB [ 2672.028021] eventpoll_epi 47KB 47KB [ 2672.028691] inotify_inode_mark 54KB 54KB [ 2672.029404] request_queue 60KB 60KB [ 2672.030056] blkdev_ioc 18KB 18KB [ 2672.030732] bio-0 168KB 192KB [ 2672.031403] biovec-max 476KB 773KB [ 2672.032054] biovec-64 220KB 220KB [ 2672.032722] biovec-16 63KB 63KB [ 2672.033416] user_namespace 31KB 31KB [ 2672.034068] uid_cache 8KB 8KB [ 2672.034738] dmaengine-unmap-2 4KB 4KB [ 2672.035407] audit_buffer 7KB 7KB [ 2672.036060] skbuff_fclone_cache 75KB 75KB [ 2672.036749] skbuff_head_cache 611KB 611KB [ 2672.037443] file_lock_cache 47KB 51KB [ 2672.038104] file_lock_ctx 7KB 7KB [ 2672.038799] fsnotify_mark_connector 24KB 24KB [ 2672.039530] net_namespace 143KB 143KB [ 2672.040182] task_delay_info 80KB 92KB [ 2672.040894] taskstats 54KB 54KB [ 2672.041619] proc_dir_entry 416KB 427KB [ 2672.042272] pde_opener 35KB 35KB [ 2672.042992] seq_file 56KB 56KB [ 2672.043665] sigqueue 63KB 63KB [ 2672.044317] shmem_inode_cache 1304KB 1352KB [ 2672.045035] kernfs_iattrs_cache 235KB 235KB [ 2672.045789] kernfs_node_cache 5734KB 5734KB [ 2672.046460] mnt_cache 244KB 244KB [ 2672.047132] filp 922KB 1537KB [ 2672.047812] names_cache 5678KB 6200KB [ 2672.048481] hashtab_node 274KB 274KB [ 2672.049131] ebitmap_node 1149KB 1149KB [ 2672.049823] avtab_node 4976KB 4976KB [ 2672.050503] avc_node 31KB 31KB [ 2672.051192] lsm_inode_cache 2705KB 3083KB [ 2672.051891] lsm_file_cache 180KB 192KB [ 2672.052602] key_jar 31KB 31KB [ 2672.053279] uts_namespace 15KB 15KB [ 2672.053978] nsproxy 7KB 7KB [ 2672.054655] vm_area_struct 913KB 984KB [ 2672.055307] fs_cache 64KB 64KB [ 2672.055980] files_cache 207KB 207KB [ 2672.056660] signal_cache 284KB 401KB [ 2672.057359] sighand_cache 305KB 360KB [ 2672.058038] task_struct 971KB 1260KB [ 2672.058722] cred_jar 83KB 168KB [ 2672.059413] anon_vma_chain 200KB 248KB [ 2672.060082] anon_vma 213KB 235KB [ 2672.060760] pid 42KB 63KB [ 2672.061466] Acpi-Operand 136KB 170KB [ 2672.062119] Acpi-ParseExt 27KB 27KB [ 2672.062793] Acpi-Parse 166KB 181KB [ 2672.063464] Acpi-State 133KB 149KB [ 2672.064114] Acpi-Namespace 24KB 24KB [ 2672.064794] numa_policy 3KB 3KB [ 2672.065517] trace_event_file 176KB 176KB [ 2672.066170] ftrace_event_field 280KB 280KB [ 2672.066849] pool_workqueue 40KB 40KB [ 2672.067542] task_group 16KB 16KB [ 2672.068221] mm_struct 259KB 315KB [ 2672.068921] vmap_area 149KB 149KB [ 2672.069611] page->ptl 236KB 236KB [ 2672.070265] kmemleak_scan_area 75KB 75KB [ 2672.072042] kmemleak_object 138276KB 155626KB [ 2672.072741] kmalloc-8k 4672KB 4832KB [ 2672.073464] kmalloc-4k 7552KB 7968KB [ 2672.074133] kmalloc-2k 4564KB 5024KB [ 2672.074863] kmalloc-1k 2700KB 3584KB [ 2672.075582] kmalloc-512 3345KB 4224KB [ 2672.076235] kmalloc-256 1376KB 1376KB [ 2672.076904] kmalloc-192 664KB 664KB [ 2672.077681] kmalloc-128 487KB 580KB [ 2672.078377] kmalloc-96 387KB 724KB [ 2672.079083] kmalloc-64 917KB 1284KB [ 2672.079808] kmalloc-32 770KB 824KB [ 2672.080489] kmalloc-16 343KB 368KB [ 2672.081156] kmalloc-8 346KB 346KB [ 2672.081870] kmem_cache_node 47KB 47KB [ 2672.082575] kmem_cache 75KB 75KB [ 2672.083231] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=12016,uid=0 [ 2672.085693] Out of memory: Killed process 12036 (syz-executor.2) total-vm:94336kB, anon-rss:480kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:140kB oom_score_adj:1000 VM DIAGNOSIS: 09:56:23 Registers: info registers vcpu 0 RAX=ffffffff83e7e960 RBX=0000000000000000 RCX=ffffffff83e6653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7ef68 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85677688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e96e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff0d51a9288 CR3=00000000006fa000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00656369767265732e6873732f656369 XMM02=73732f746c75616665642f6374652f2d XMM03=70206f742064656c696146000d0a0920 XMM04=206f742073736170206f7420736e6f69 XMM05=6e692f6374652f20230a6d6f72662068 XMM06=7320736920656c69662073696854202e XMM07=6f662073676e697474657320746c7561 XMM08=4c4b4a4948474645444342417a797877 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000200000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7e960 RBX=0000000000000001 RCX=ffffffff83e6653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7ef68 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85677688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e96e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe2800000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff0d51b6300 CR3=000000000cf4e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00656369767265732e6873732f656369 XMM02=73732f746c75616665642f6374652f2d XMM03=70206f742064656c696146000d0a0920 XMM04=206f742073736170206f7420736e6f69 XMM05=6e692f6374652f20230a6d6f72662068 XMM06=7320736920656c69662073696854202e XMM07=6f662073676e697474657320746c7561 XMM08=4c4b4a4948474645444342417a797877 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000200000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000