{0x2, 0x4d2}, 0x0, 0xbc67, 0x1000, 0x7, 0x7, 0x3048, 0x43d, @usage=0x1, 0x3, 0x8, [0x7f, 0x8, 0x20, 0x9, 0x1, 0xfffffffffffffffa]}, {0x8}}) write$binfmt_elf32(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x8, 0x4, 0xa9, 0x4d7, 0x3, 0x3, 0x2332, 0x356, 0x38, 0x354, 0x1ff, 0x6, 0x20, 0x1, 0x7, 0xaea5, 0x4}, [{0x6, 0x6, 0x1, 0x5c8, 0xfff, 0x5, 0x7, 0x7f}], "d95b0c229154162fad3145aa3d7e980c95accfd02f930dc98d4c24c36badb2710e3fb3b43d4787cefb4dce4a6e92b98e2275ba379997b826aff3c9d31cf2cdc9090c0a4d84d443e2ae364204d0944aabc2db362caf873baf042f2399bf", ['\x00', '\x00', '\x00', '\x00']}, 0x4b5) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$AUTOFS_IOC_CATATONIC(r2, 0x9362, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000d00)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) r4 = socket$inet(0x2, 0x2, 0x8) ppoll(&(0x7f0000000d40)=[{r3, 0x80}, {r0, 0x4000}, {r4, 0xc400}], 0x3, &(0x7f0000000d80)={0x77359400}, &(0x7f0000000dc0)={[0x1]}, 0x8) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000e00), 0x101001, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000e40)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x5, 0x6, 0x0, 0x1, 0x3ff, 0x6c3}, {0x10000, 0x9, 0x1, 0x4, 0x3, 0x80000001}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) ioctl$sock_inet_SIOCGIFBRDADDR(r5, 0x8919, &(0x7f0000001040)={'vxcan1\x00', {0x2, 0x0, @local}}) openat$sr(0xffffffffffffff9c, &(0x7f0000001080), 0x2000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendfile(r5, r6, &(0x7f00000010c0)=0x7ff, 0xebc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000001100)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000001300)={{r7, 0x3, 0x101, 0x5, 0x5, 0xffffffffffffffff, 0xb9, 0x80000000, 0x4, 0x3, 0x129, 0x2, 0x3d2, 0xfffffffffffffffd, 0x1ff}, 0x18, [0x0, 0x0, 0x0]}) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) write(r8, &(0x7f00000013c0)="f99a98cf80d1085640e462bdaa88c116af41047af17a1da7f68fba5442399b472e03bd459312fc9cf4ae45d3b96044973ed4639f6b08d8cbc80d659ab07f7e13628533aaaba268f69a411e514a906bd1af4ab916c953d4db09a554301e21454c1f973672ca7657d4ec56fd56dc9c7e3a1d92feffefcbc04f3ce4495fb48ac0124d962f958dcd5c5050bf", 0x8a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000002e80)=0xc1f, 0x7fffffff) 01:57:53 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1397.627590] FAULT_INJECTION: forcing a failure. [ 1397.627590] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.630093] CPU: 0 PID: 7630 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1397.631573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.633292] Call Trace: [ 1397.633849] dump_stack+0x107/0x167 [ 1397.634628] should_fail.cold+0x5/0xa [ 1397.635413] ? create_object.isra.0+0x3a/0xa20 [ 1397.636354] should_failslab+0x5/0x20 [ 1397.637132] kmem_cache_alloc+0x5b/0x360 [ 1397.638014] create_object.isra.0+0x3a/0xa20 [ 1397.638935] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1397.639980] kmem_cache_alloc+0x159/0x360 [ 1397.640844] __skb_ext_alloc+0x19/0x90 [ 1397.641639] skb_ext_add+0x508/0x670 [ 1397.642403] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1397.643545] __alloc_skb+0x3c1/0x620 [ 1397.644321] alloc_skb_with_frags+0x92/0x570 [ 1397.645212] ? perf_trace_lock+0xac/0x490 [ 1397.646088] sock_alloc_send_pskb+0x741/0x8a0 [ 1397.647070] ? sk_reset_timer+0xc0/0xc0 [ 1397.647880] ? lock_downgrade+0x6d0/0x6d0 [ 1397.648715] ? rwlock_bug.part.0+0x90/0x90 [ 1397.649605] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1397.650697] ? __local_bh_enable_ip+0x9d/0x100 [ 1397.651656] raw_sendmsg+0x331/0x680 [ 1397.652430] ? dgram_connect+0x470/0x470 [ 1397.653270] ? __import_iovec+0x458/0x590 [ 1397.654146] ? ieee802154_sock_release+0xb0/0xb0 [ 1397.655138] sock_sendmsg+0x154/0x190 [ 1397.655951] ____sys_sendmsg+0x334/0x870 [ 1397.656792] ? kernel_sendmsg+0x50/0x50 [ 1397.657635] ? do_recvmmsg+0x6d0/0x6d0 [ 1397.658453] ? perf_trace_lock+0xac/0x490 [ 1397.659368] ? __lockdep_reset_lock+0x180/0x180 [ 1397.660318] ? perf_trace_lock+0xac/0x490 [ 1397.661178] ___sys_sendmsg+0xf3/0x170 [ 1397.661979] ? sendmsg_copy_msghdr+0x160/0x160 [ 1397.662937] ? lock_downgrade+0x6d0/0x6d0 [ 1397.663836] ? __fget_files+0x296/0x480 [ 1397.664689] ? __fget_light+0xea/0x290 [ 1397.665520] __sys_sendmmsg+0x195/0x470 [ 1397.666333] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1397.667226] ? lock_downgrade+0x6d0/0x6d0 [ 1397.668107] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1397.669111] ? wait_for_completion+0x270/0x270 [ 1397.669950] FAULT_INJECTION: forcing a failure. [ 1397.669950] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.670102] ? rcu_read_lock_any_held+0x75/0xa0 [ 1397.670121] ? vfs_write+0x354/0xa30 [ 1397.670153] ? fput_many+0x2f/0x1a0 [ 1397.674911] ? ksys_write+0x1a9/0x260 [ 1397.675725] __x64_sys_sendmmsg+0x99/0x100 [ 1397.676600] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1397.677661] do_syscall_64+0x33/0x40 [ 1397.678439] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1397.679491] RIP: 0033:0x7f867efe2b19 [ 1397.680258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.684064] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1397.685651] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1397.687122] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1397.688594] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1397.690065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1397.691528] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1397.693032] CPU: 1 PID: 7639 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1397.693275] hpet: Lost 3 RTC interrupts [ 1397.694552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.694567] Call Trace: [ 1397.695935] ieee802154 phy0 wpan0: encryption failed: -22 [ 1397.697152] dump_stack+0x107/0x167 [ 1397.697189] should_fail.cold+0x5/0xa [ 1397.700347] ? create_object.isra.0+0x3a/0xa20 [ 1397.701292] should_failslab+0x5/0x20 [ 1397.702096] kmem_cache_alloc+0x5b/0x360 [ 1397.702947] create_object.isra.0+0x3a/0xa20 [ 1397.703867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1397.704907] kmem_cache_alloc+0x159/0x360 [ 1397.705789] __skb_ext_alloc+0x19/0x90 [ 1397.706604] skb_ext_add+0x508/0x670 [ 1397.707384] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1397.708479] __alloc_skb+0x3c1/0x620 [ 1397.709271] alloc_skb_with_frags+0x92/0x570 [ 1397.710167] ? perf_trace_lock+0xac/0x490 [ 1397.711170] sock_alloc_send_pskb+0x741/0x8a0 [ 1397.712137] ? sk_reset_timer+0xc0/0xc0 [ 1397.712966] ? lock_downgrade+0x6d0/0x6d0 [ 1397.713820] ? rwlock_bug.part.0+0x90/0x90 [ 1397.714746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1397.715834] ? __local_bh_enable_ip+0x9d/0x100 [ 1397.716814] raw_sendmsg+0x331/0x680 [ 1397.717582] ? dgram_connect+0x470/0x470 [ 1397.718415] ? __import_iovec+0x458/0x590 [ 1397.719317] ? ieee802154_sock_release+0xb0/0xb0 [ 1397.720299] sock_sendmsg+0x154/0x190 [ 1397.721096] ____sys_sendmsg+0x334/0x870 [ 1397.721944] ? kernel_sendmsg+0x50/0x50 [ 1397.722781] ? do_recvmmsg+0x6d0/0x6d0 [ 1397.723592] ? perf_trace_lock+0xac/0x490 [ 1397.724472] ? __lockdep_reset_lock+0x180/0x180 [ 1397.725425] ? perf_trace_lock+0xac/0x490 [ 1397.726366] ___sys_sendmsg+0xf3/0x170 [ 1397.727192] ? sendmsg_copy_msghdr+0x160/0x160 [ 1397.728155] ? lock_downgrade+0x6d0/0x6d0 [ 1397.729048] ? __fget_files+0x296/0x480 [ 1397.729904] ? __fget_light+0xea/0x290 [ 1397.730741] __sys_sendmmsg+0x195/0x470 [ 1397.731587] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1397.732470] ? lock_downgrade+0x6d0/0x6d0 [ 1397.733371] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1397.734370] ? wait_for_completion+0x270/0x270 [ 1397.735341] ? rcu_read_lock_any_held+0x75/0xa0 [ 1397.736297] ? vfs_write+0x354/0xa30 [ 1397.737087] ? fput_many+0x2f/0x1a0 [ 1397.737851] ? ksys_write+0x1a9/0x260 [ 1397.738689] __x64_sys_sendmmsg+0x99/0x100 [ 1397.739583] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1397.740655] do_syscall_64+0x33/0x40 [ 1397.741431] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1397.742596] RIP: 0033:0x7f8542659b19 [ 1397.743371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.747153] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1397.748729] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1397.750196] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1397.751712] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1397.753190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1397.754682] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1397.757893] ieee802154 phy0 wpan0: encryption failed: -22 01:57:53 executing program 3: sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001140)={&(0x7f00000000c0)={0x106c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xfffffff7, 0x70}}}}, [@NL80211_ATTR_TESTDATA={0x1004, 0x45, "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"}, @NL80211_ATTR_TESTDATA={0x45, 0x45, "55aa321ba861f8f80405c7a3c3af05a54a57736741418506562e29895fb5092c33155e360a92f779a0f2f81d5e7a37bba8560e915e9b5f3c371af500c1a4e9e31b"}]}, 0x106c}, 0x1, 0x0, 0x0, 0x800}, 0x40080) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:57:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 01:57:53 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 9) 01:57:53 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:57:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x101}, 0x14}}, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000440)=""/205, 0xcd}], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) perf_event_open(&(0x7f0000001180)={0x6, 0x80, 0x0, 0x80, 0x8, 0x6, 0x0, 0x7, 0x2200, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x40, 0x10001, 0x93, 0x1, 0x363, 0xffffffff, 0x5, 0x0, 0x2, 0x0, 0x3f}, 0x0, 0xc, r2, 0x2) sendfile(r0, r2, 0x0, 0xa7a4) io_uring_enter(r2, 0x5afa, 0xbc2e, 0x1, &(0x7f0000000040)={[0x9c39]}, 0x8) getdents(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, &(0x7f0000000100)=0x1c) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000001300)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40}) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x24, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x9}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) socket$nl_xfrm(0x10, 0x3, 0x6) 01:57:53 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x20000, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)=@v3={0x3000000, [{0x3, 0xeee}, {0x1ff, 0x1000000}], 0xffffffffffffffff}, 0x18, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1398.049093] FAULT_INJECTION: forcing a failure. [ 1398.049093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1398.051663] CPU: 0 PID: 7661 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1398.053109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.054853] Call Trace: [ 1398.055420] dump_stack+0x107/0x167 [ 1398.056186] should_fail.cold+0x5/0xa [ 1398.056986] _copy_from_iter_full+0x1ff/0x940 [ 1398.057925] ? __check_object_size+0x319/0x440 [ 1398.058905] raw_sendmsg+0x46c/0x680 [ 1398.059670] ? dgram_connect+0x470/0x470 [ 1398.060488] ? __import_iovec+0x458/0x590 [ 1398.061359] ? ieee802154_sock_release+0xb0/0xb0 [ 1398.062333] sock_sendmsg+0x154/0x190 [ 1398.063140] ____sys_sendmsg+0x334/0x870 [ 1398.063990] ? kernel_sendmsg+0x50/0x50 [ 1398.064811] ? do_recvmmsg+0x6d0/0x6d0 [ 1398.065620] ? perf_trace_lock+0xac/0x490 [ 1398.066517] ? __lockdep_reset_lock+0x180/0x180 [ 1398.067477] ? perf_trace_lock+0xac/0x490 [ 1398.068350] ___sys_sendmsg+0xf3/0x170 [ 1398.069157] ? sendmsg_copy_msghdr+0x160/0x160 [ 1398.070117] ? lock_downgrade+0x6d0/0x6d0 [ 1398.071052] ? __fget_files+0x296/0x480 [ 1398.071927] ? __fget_light+0xea/0x290 [ 1398.072769] __sys_sendmmsg+0x195/0x470 [ 1398.073618] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1398.074553] ? lock_downgrade+0x6d0/0x6d0 [ 1398.075461] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1398.076512] ? wait_for_completion+0x270/0x270 [ 1398.077473] ? rcu_read_lock_any_held+0x75/0xa0 [ 1398.078462] ? vfs_write+0x354/0xa30 [ 1398.079259] ? fput_many+0x2f/0x1a0 [ 1398.080054] ? ksys_write+0x1a9/0x260 [ 1398.080885] __x64_sys_sendmmsg+0x99/0x100 [ 1398.081776] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1398.082867] do_syscall_64+0x33/0x40 [ 1398.083666] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1398.084727] RIP: 0033:0x7f8542659b19 [ 1398.085517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.089885] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1398.091492] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1398.092968] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1398.094479] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.095966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1398.097465] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1398.099229] hpet: Lost 2 RTC interrupts 01:57:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 01:57:53 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 9) [ 1398.151231] FAULT_INJECTION: forcing a failure. [ 1398.151231] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1398.153854] CPU: 0 PID: 7667 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1398.155261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.156945] Call Trace: [ 1398.157502] dump_stack+0x107/0x167 [ 1398.158266] should_fail.cold+0x5/0xa [ 1398.159094] _copy_from_iter_full+0x1ff/0x940 [ 1398.160006] ? __check_object_size+0x319/0x440 [ 1398.160947] raw_sendmsg+0x46c/0x680 [ 1398.161713] ? dgram_connect+0x470/0x470 [ 1398.162560] ? __import_iovec+0x458/0x590 [ 1398.163430] ? ieee802154_sock_release+0xb0/0xb0 [ 1398.164439] sock_sendmsg+0x154/0x190 [ 1398.165225] ____sys_sendmsg+0x334/0x870 [ 1398.166068] ? kernel_sendmsg+0x50/0x50 [ 1398.167057] ? do_recvmmsg+0x6d0/0x6d0 [ 1398.167856] ? perf_trace_lock+0xac/0x490 [ 1398.168727] ? __lockdep_reset_lock+0x180/0x180 [ 1398.169672] ? perf_trace_lock+0xac/0x490 [ 1398.170558] ___sys_sendmsg+0xf3/0x170 [ 1398.171352] ? sendmsg_copy_msghdr+0x160/0x160 [ 1398.172297] ? lock_downgrade+0x6d0/0x6d0 [ 1398.173180] ? __fget_files+0x296/0x480 [ 1398.174029] ? __fget_light+0xea/0x290 [ 1398.174880] __sys_sendmmsg+0x195/0x470 [ 1398.175709] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1398.176591] ? lock_downgrade+0x6d0/0x6d0 [ 1398.177491] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1398.178495] ? wait_for_completion+0x270/0x270 [ 1398.179443] ? rcu_read_lock_any_held+0x75/0xa0 [ 1398.180384] ? vfs_write+0x354/0xa30 [ 1398.181158] ? fput_many+0x2f/0x1a0 [ 1398.181927] ? ksys_write+0x1a9/0x260 [ 1398.182754] __x64_sys_sendmmsg+0x99/0x100 [ 1398.183638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1398.184697] do_syscall_64+0x33/0x40 [ 1398.185470] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1398.186538] RIP: 0033:0x7f867efe2b19 [ 1398.187306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.191003] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1398.192561] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1398.194022] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1398.195494] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.196948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1398.198397] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1398.200145] hpet: Lost 2 RTC interrupts 01:57:53 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0xee, 0x8, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, 0x40, 0x8000, 0x5, 0x3ff}}) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x13, 0x8, 0x70bd29, 0x25dfdbfc, {0x3, 0x1, 0x7f, 0x5, {0x4e24, 0x4e23, [0x7f, 0x0, 0x80000001, 0x1f0], [0x1, 0x4d9e74e1, 0x2, 0x1], r1, [0x9690, 0x8001]}, 0x8, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0x1c, 0x1, "b7735234b09b7f6755bb28f2fa9a611331eac31e4ad6f8c3"}]}, 0x68}, 0x1, 0x0, 0x0, 0x10000000}, 0x20004000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_POOL_SET(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8a0200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x114, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000000}, {0x6, 0x11, 0x7ff}, {0x8, 0x13, 0x4}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xed}, {0x6, 0x11, 0x9}, {0x8, 0x13, 0xb7}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x1c}, {0x8, 0x13, 0x3ff}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x6}, {0x8, 0x13, 0x7fffffff}, {0x5}}]}, 0x114}, 0x1, 0x0, 0x0, 0x84}, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000004cc0)={'syztnl2\x00', &(0x7f0000004c40)={'ip6gre0\x00', r1, 0x29, 0x7, 0x16, 0x58fe2ec, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x8000, 0x4, 0xb4f8}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000004d80)={'syztnl1\x00', &(0x7f0000004d00)={'syztnl0\x00', r1, 0x4, 0x20, 0x7f, 0x9, 0x27, @local, @mcast2, 0x40, 0x700, 0x9, 0x6}}) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000004dc0)={@rand_addr, 0x0}, &(0x7f0000004e00)=0x14) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000004e80)={'ip_vti0\x00', &(0x7f0000004e40)={'erspan0\x00', r1, 0x1, 0x7, 0x76cc, 0x7fff, {{0x6, 0x4, 0x2, 0x1f, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x33}, {[@end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000004fc0)={'syztnl1\x00', &(0x7f0000004f40)={'syztnl0\x00', r1, 0x29, 0x3, 0x81, 0xffffffff, 0x44, @mcast2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000, 0xfb68b17c1ab95d5d, 0x4e54b75, 0xff}}) getsockname$packet(r2, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005040)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000005200)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000051c0)={&(0x7f0000005080)={0x130, r4, 0x4, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x130}}, 0xc0) r11 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000005240), 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r11, 0x4004f506, &(0x7f0000005280)=0x1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000006a40)={'syztnl1\x00', &(0x7f00000069c0)={'ip6_vti0\x00', r7, 0x0, 0x8, 0x4, 0x42, 0x40, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7, 0x7800, 0x81, 0x7}}) sendmmsg$inet6(r0, &(0x7f0000006d40)=[{{&(0x7f00000052c0)={0xa, 0x4e22, 0x8000, @ipv4={'\x00', '\xff\xff', @remote}, 0x80}, 0x1c, &(0x7f0000006440)=[{&(0x7f0000005300)="a1a9f5922b9a801fab0e33af212c3c02", 0x10}, {&(0x7f0000005340)="8c3c4017b7ba585ee54042083d545d4b6fd70ec959ba1dca519de418303783155fafeac8ae5640cb5a91fc4c63dee77f0cfbb4e93f6daa24f5f965efb18652721cccfd60f7826a028c1c6e484b91fc5aa9aecaf990cbc538af4d42aa45f12650229e2edeff8956", 0x67}, {&(0x7f00000053c0)="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", 0x1000}, {&(0x7f00000063c0)="e2933f7a560992a27d6149b9fb57e0afe279089b79b5b54066e5af56a75f98cbd3fe71458e272012de9b0ecfa0d4024a3762228d6a37b136", 0x38}, {&(0x7f0000006400)="95e241aa2d57f2876733de54e9eb805f2c13b4ed1d2e4c513ee06d672e24db7e", 0x20}], 0x5, &(0x7f00000064c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2, r10}}}, @hoplimit={{0x14, 0x29, 0x34, 0x3ff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @hopopts={{0x20, 0x29, 0x36, {0x0, 0x0, '\x00', [@pad1, @ra={0x5, 0x2, 0x5}]}}}], 0x78}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f0000006540)="95c97aa4e8892799e151a50a7e5384caca0a4676cd1d953987e4f0661f661b7756e2905fa2f0569b78baab4c79efc77e6d66609a6889c842a9314a7f73d50aea00ad07fc90876cb3c75df3b7973471ae1e4cd5be58e2a39a3f57e537fb7ace2cd8ea38fe23a33098f9fbf3edca7e6300279280dbd8f6f65a3ac4d610123078b19e630cd66ae97de0fde2706c00a0a44d0ad6d5a9444b176115375250c1722cd58a87400e0c7edae33fa85e20045962f4b78b6d8f8d2831bb4a", 0xb9}, {&(0x7f0000006600)="01a48d3773437570781d9da6b61d060b8c0be71c96face7eb94f22a15446b6c32dc5caf22edf04724febc2bf96afeeaee4aa87b94b2794d52f4cd81afd504e78b00ccb4ce553b43b3193b5a588553ca5dae851", 0x53}, {&(0x7f0000006680)="c49f1b46f8f402b6162ce7c9f34e33616f8ca0949a8802d0d7d78722af42675a2c01b3c70ebfc09b8f4a2b4bb4fa214b7aab216699", 0x35}, {0xfffffffffffffffc}, {&(0x7f00000066c0)="8f59b1e0c52fa07f5979695d78144b04aa6b229b4a60a0c28a11bf362d1667a8f85d14f248cc534f9b888e11ee84f3a1e47f184c3551ef1597acbc98699c21738b98de2e77657d919bf7f3977f6668fada37b5ea2d1d5d74d04473ec5b4bd0a0d7d01e28c021dab461218c0af6181d7cdba510afe595ab17687a7f0935706560808fd3666d275f8697cd07d589495c8062959d899af743877a1030d284cd4f513de37a0b58148e5b1aae848d939420333c0bcb9a97e7356476034e23515f72dbe3e7bd02fc8173491d733de2fd7adda3d9b93d3abc2d", 0xd6}, {&(0x7f00000067c0)="cf3416224e07550c553022730edfd1e1ace641857e20fe81e96a0b2c652fa0762c38daa529450415462407ae474eb4877cff90c0d07a7e693c1347a93fd3890881124baf1d1ec9572f36eda591d66edf1f4a461b1e7d860f13d46bd4d82bf640f12307cb9ad06d90acfd86b295ec579e60ee66c9b41c94489583dedb7e620d1908abbbf5731eff2f4ce6d43602dcb55774dfb3434183cb1aa6fdf612f820fd5792b98606ea05e7fb3fa538426670830e5fd5", 0xb2}, {&(0x7f0000006880)="807891f94071c979fec96f15", 0xc}], 0x7, &(0x7f0000006a80)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r12}}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x88, 0x9, '\x00', [@enc_lim, @calipso={0x7, 0x48, {0x2, 0x10, 0x7, 0x101, [0x6, 0x4, 0x80, 0x0, 0xff, 0xffffffffffffffc0, 0x6, 0xfffffffffffffff8]}}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffff001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}], 0xd8}}, {{&(0x7f0000006b80)={0xa, 0x4e22, 0x3ff, @mcast2, 0x7}, 0x1c, &(0x7f0000006d00)=[{&(0x7f0000006bc0)="c5bce471cd467ecd91d976f6e0e29179", 0x10}, {&(0x7f0000006c00)="85bc66ff89dc536f90ca9d4ee618d11cdf3d0bb0f409d868330353d68c59a5f789ba6e90a43d5d84e9fe4c4a70cb7812255f6fa7f556ab2b4f1995e3a07490d29bdd4232ff1112a7691074a43a", 0x4d}, {&(0x7f0000006c80)="b1623b7298959cce84decee38e8bceada0f3851f1f02c3a04f0ea3f5caed115e91be041799", 0x25}, {&(0x7f0000006cc0)="575bc36ef1782ee7ff23eabb2ccc37f077ee13ca81a1f5a2500b", 0x1a}], 0x4}}], 0x3, 0x40) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000006e00)={0xc, 0xe, '\x00', [@enc_lim={0x4, 0x1, 0x5}, @pad1, @calipso={0x7, 0x20, {0x2, 0x6, 0xbb, 0x1, [0x8d4a, 0x80, 0x7]}}, @calipso={0x7, 0x48, {0x2, 0x10, 0x5, 0xfffd, [0x1e0, 0x3ff, 0x4, 0x8000, 0x7fff, 0x1, 0x100000, 0x5]}}, @padn={0x1, 0x1, [0x0]}]}, 0x80) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000006f40)={&(0x7f0000006e80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000006f00)={&(0x7f0000006ec0)={0x34, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000000}, 0x40084) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000007000)={'sit0\x00', &(0x7f0000006f80)={'ip6_vti0\x00', r12, 0x4, 0x9, 0x6, 0x7fffffff, 0x55, @mcast1, @remote, 0x40, 0x7800, 0x0, 0x6}}) 01:57:53 executing program 1: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1410.837390] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:58:15 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x20000, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)=@v3={0x3000000, [{0x3, 0xeee}, {0x1ff, 0x1000000}], 0xffffffffffffffff}, 0x18, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:58:15 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 10) 01:58:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2881}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f00000000c0)="20000000000000000000000000000000d3f4655f000000000000000000000000a722c876af30c9f6cf9221", 0x2b, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x400}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5000}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)="0000008000000000000000000000000000000000000000006c657273797a6b616c6c657273797a6b61856c657273797a6b616c6c657273797a6b616c6c657273", 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x181000, 0x4) mount$9p_fd(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180), 0x691c8f9be0d7c2df, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0xfffffffffffffff7}}, {@msize={'msize', 0x3d, 0x8001}}, {@cache_mmap}, {@loose}, {@afid={'afid', 0x3d, 0x6}}, {@debug={'debug', 0x3d, 0x3a7b}}, {@afid={'afid', 0x3d, 0x8}}, {@access_client}], [{@subj_type={'subj_type', 0x3d, '&^\'[@,+][+()#}\\+'}}, {@hash}, {@appraise_type}, {@fowner_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vcsu\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/vcsu\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x33, 0x62, 0x0, 0x39, 0x51, 0x36, 0x36], 0x2d, [0x63, 0x31, 0x66, 0x32], 0x2d, [0x64, 0xa91e8e082dc4ba9f, 0x62, 0x61], 0x2d, [0x39, 0x61, 0x33, 0x64], 0x2d, [0x34, 0x32, 0x39, 0x37, 0x37, 0x33, 0x61, 0x36]}}}]}}) 01:58:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x8, 0x8, 0x7, 0x5, 0x0, 0x5, 0x10, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xfa1, 0x11}, 0x8026, 0x3, 0x67f, 0x5, 0x6, 0x101, 0x4, 0x0, 0x7, 0x0, 0x7f}, 0x0, 0x6, 0xffffffffffffffff, 0x8) 01:58:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffbf}]}) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000, 0x2121, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @loopback, 0x3}, 0x80) 01:58:16 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x20000, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:58:16 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 10) [ 1420.492796] ieee802154 phy0 wpan0: encryption failed: -22 [ 1420.495726] ieee802154 phy0 wpan0: encryption failed: -22 [ 1420.499528] FAULT_INJECTION: forcing a failure. [ 1420.499528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1420.501957] CPU: 1 PID: 7700 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1420.503314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1420.504933] Call Trace: [ 1420.505461] dump_stack+0x107/0x167 [ 1420.506185] should_fail.cold+0x5/0xa [ 1420.506955] _copy_from_user+0x2e/0x1b0 [ 1420.507759] __copy_msghdr_from_user+0x91/0x4b0 [ 1420.508713] ? __ia32_sys_shutdown+0x80/0x80 [ 1420.509589] ? perf_trace_lock+0xac/0x490 [ 1420.510404] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1420.511453] sendmsg_copy_msghdr+0xa1/0x160 [ 1420.512297] ? do_recvmmsg+0x6d0/0x6d0 [ 1420.513073] ? find_held_lock+0x2c/0x110 [ 1420.513907] ___sys_sendmsg+0xc6/0x170 [ 1420.514675] ? sendmsg_copy_msghdr+0x160/0x160 [ 1420.515609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1420.516638] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1420.517547] ? trace_hardirqs_on+0x5b/0x180 [ 1420.518395] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1420.519336] ? finish_task_switch+0x126/0x5d0 [ 1420.520247] ? finish_task_switch+0xef/0x5d0 [ 1420.521142] ? __switch_to+0x572/0xff0 [ 1420.521929] ? __switch_to_asm+0x3a/0x60 [ 1420.522754] ? __switch_to_asm+0x34/0x60 [ 1420.523636] ? __schedule+0x850/0x1e90 [ 1420.524434] ? io_schedule_timeout+0x140/0x140 [ 1420.525384] __sys_sendmmsg+0x195/0x470 [ 1420.526201] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1420.527099] ? lock_downgrade+0x6d0/0x6d0 [ 1420.527992] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1420.528980] ? wait_for_completion+0x270/0x270 [ 1420.529909] ? rcu_read_lock_any_held+0x75/0xa0 [ 1420.530862] ? vfs_write+0x354/0xa30 [ 1420.531621] ? fput_many+0x2f/0x1a0 [ 1420.532373] ? ksys_write+0x1a9/0x260 [ 1420.533158] __x64_sys_sendmmsg+0x99/0x100 [ 1420.534018] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1420.535081] do_syscall_64+0x33/0x40 [ 1420.535868] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1420.536908] RIP: 0033:0x7f867efe2b19 [ 1420.537670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1420.541458] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1420.543024] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1420.544465] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1420.545911] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1420.547364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.548807] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1420.552959] FAULT_INJECTION: forcing a failure. [ 1420.552959] name fail_usercopy, interval 1, probability 0, space 0, times 0 01:58:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1420.555589] CPU: 0 PID: 7698 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1420.557094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1420.558788] Call Trace: [ 1420.559338] dump_stack+0x107/0x167 [ 1420.560095] should_fail.cold+0x5/0xa [ 1420.560894] _copy_from_user+0x2e/0x1b0 [ 1420.561723] __copy_msghdr_from_user+0x91/0x4b0 [ 1420.562685] ? __ia32_sys_shutdown+0x80/0x80 [ 1420.563632] ? perf_trace_lock+0xac/0x490 [ 1420.564487] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1420.565572] sendmsg_copy_msghdr+0xa1/0x160 [ 1420.566451] ? do_recvmmsg+0x6d0/0x6d0 [ 1420.567277] ? find_held_lock+0x2c/0x110 [ 1420.568134] ___sys_sendmsg+0xc6/0x170 [ 1420.568933] ? sendmsg_copy_msghdr+0x160/0x160 [ 1420.569870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1420.570968] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1420.571883] ? trace_hardirqs_on+0x5b/0x180 [ 1420.572771] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1420.573685] ? finish_task_switch+0x126/0x5d0 [ 1420.574599] ? finish_task_switch+0xef/0x5d0 [ 1420.575523] ? __switch_to+0x572/0xff0 [ 1420.576314] ? __switch_to_asm+0x3a/0x60 [ 1420.577143] ? __switch_to_asm+0x34/0x60 [ 1420.577981] ? __schedule+0x850/0x1e90 [ 1420.578813] ? io_schedule_timeout+0x140/0x140 [ 1420.579785] __sys_sendmmsg+0x195/0x470 [ 1420.580624] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1420.581512] ? lock_downgrade+0x6d0/0x6d0 [ 1420.582414] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1420.583417] ? wait_for_completion+0x270/0x270 [ 1420.584359] ? rcu_read_lock_any_held+0x75/0xa0 [ 1420.585304] ? vfs_write+0x354/0xa30 [ 1420.586075] ? fput_many+0x2f/0x1a0 [ 1420.586838] ? ksys_write+0x1a9/0x260 [ 1420.587648] __x64_sys_sendmmsg+0x99/0x100 [ 1420.588515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1420.589569] do_syscall_64+0x33/0x40 [ 1420.590333] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1420.591388] RIP: 0033:0x7f8542659b19 [ 1420.592145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1420.595875] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1420.597428] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1420.598899] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1420.600345] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1420.601798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.603254] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1420.604967] hpet: Lost 2 RTC interrupts 01:58:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) fcntl$setstatus(r0, 0x4, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_complete(r2) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0xca7d, 0x0, 0x0, 0x3, 0x1}, 0x7) 01:58:16 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 11) 01:58:16 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = accept4(r0, &(0x7f0000000240)=@alg, &(0x7f0000000080)=0x80, 0x80800) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) syz_emit_ethernet(0x46, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaa31f52699464f080046000038000000000006907864010100ac1414aa94040005000000000000000000004600000000000000000000000000000000000000000064b06fee71481e6d1a1cd17643b0ecef0c7109c1e06a2b4271f99a10002b95d798acfedee11a961042d2fbead9ad1308a1221810e0480ee7b137ddb489b959503a52927efb887cddac59097da5acc6f1057065698383afec30bd01f9195453a9b3dd5183c809fda523773cd846ff674aed7a2603d56b49653efd186e9f6987a1e2c967d37c7f0bee86f4f543edfe7700aac86c7fbf0c32601dfbd3eb45d7f15bece84b3fedd3600132f71227969fd4e009b49a81478abc09fa1352dbda4c138ab7bd499872177cdb1d90ef9399f203082c3104e43c1e989c4436b5ed3a6366efe98f9764c4a977e147f14ddeaef8d500a13402fbddd26d231d3d91898e5a9a86d130cf0500000000000000531771b7a7fcc0018d102bd1755efd4e6967d2e82e4e3a34bcb832b36d25b0670e1551a892ee6f92b4471bf16c88b5a2dce0683a00102fbe00000000000000bcf33fb2ec374e04156ff79bea36ba7ff18d6ae908590de7d463316059da9e49b6fe48d2430dfaf1f9c6bef6713ef90db10d7b3e0bb0d47eb3732ae798e48011b572d5e4b64866c9df1304ad610e06864d997aad2c35666bd86ba4f0bd9e1e86648abe1f5114d33e19620bb4793e16886072979ea1cfa01a93f8e61cf4809f1970421aa482280b906901407360b077da6de1bab93694b13a719b9d4abcfbe9548c0c05ca38af15f1c5ce68ee7caf7ddad33fa05a15d472e4ce7d2776d2bbe13ad93444dc9c118fdc4acbd13925904d2987a81a2d0135eacde3a1ed2a962e27e27e00454792a6bd1ed48a84e44de2f6898dab2d09b669ca3a7df2a97b25f8b4ab3f470b127cfe40b8a1237d5f8c6ff44f3ad4"], 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) r4 = signalfd4(r0, &(0x7f00000000c0)={[0xde47]}, 0x8, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8922, &(0x7f0000000100)={'vlan0\x00'}) getsockopt$inet_tcp_int(r3, 0x6, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 01:58:16 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x20000, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:58:16 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/100, 0x64}, {&(0x7f00000001c0)=""/125, 0x7d}], 0x2, 0x6, 0x91e9) 01:58:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1420.768363] ieee802154 phy0 wpan0: encryption failed: -22 [ 1420.776735] FAULT_INJECTION: forcing a failure. [ 1420.776735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1420.779241] CPU: 1 PID: 7720 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1420.780632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1420.782312] Call Trace: [ 1420.782877] dump_stack+0x107/0x167 [ 1420.783625] should_fail.cold+0x5/0xa [ 1420.784410] _copy_from_user+0x2e/0x1b0 [ 1420.785227] __copy_msghdr_from_user+0x91/0x4b0 [ 1420.786170] ? __ia32_sys_shutdown+0x80/0x80 [ 1420.787078] ? ieee802154_sock_release+0xb0/0xb0 [ 1420.788042] ? sock_sendmsg+0x55/0x190 [ 1420.788839] sendmsg_copy_msghdr+0xa1/0x160 [ 1420.789778] ? do_recvmmsg+0x6d0/0x6d0 [ 1420.790581] ? __lock_acquire+0x1657/0x5b00 [ 1420.791503] ___sys_sendmsg+0xc6/0x170 [ 1420.792298] ? sendmsg_copy_msghdr+0x160/0x160 [ 1420.793226] ? __lockdep_reset_lock+0x180/0x180 [ 1420.794185] ? find_held_lock+0x2c/0x110 [ 1420.795033] ? __might_fault+0xd3/0x180 [ 1420.795839] ? lock_downgrade+0x6d0/0x6d0 [ 1420.796687] ? io_schedule_timeout+0x140/0x140 [ 1420.797630] __sys_sendmmsg+0x195/0x470 [ 1420.798448] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1420.799353] ? lock_downgrade+0x6d0/0x6d0 [ 1420.800216] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1420.801243] ? wait_for_completion+0x270/0x270 [ 1420.802193] ? rcu_read_lock_any_held+0x75/0xa0 [ 1420.803175] ? vfs_write+0x354/0xa30 [ 1420.803946] ? fput_many+0x2f/0x1a0 [ 1420.804742] ? ksys_write+0x1a9/0x260 [ 1420.805535] __x64_sys_sendmmsg+0x99/0x100 [ 1420.806395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1420.807452] do_syscall_64+0x33/0x40 [ 1420.808216] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1420.809258] RIP: 0033:0x7f867efe2b19 [ 1420.810014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1420.813741] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1420.815301] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1420.816753] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1420.818207] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1420.819668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.821163] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 01:58:16 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 11) 01:58:16 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x7, 0x0) 01:58:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200102, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5ce0}}, './file0\x00'}) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 01:58:16 executing program 2: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000180)={r0, r1+60000000}, 0x1, 0x1, 0x1, {0x0, r2}}, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x80, 0x1000, 0x1, {0x0, r2}}, 0x4) syz_emit_ethernet(0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb0800460000200000000000029078ac1414aa0a000102070200000000907880040200"], 0x0) [ 1420.913327] ieee802154 phy0 wpan0: encryption failed: -22 01:58:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1420.926387] FAULT_INJECTION: forcing a failure. [ 1420.926387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1420.928850] CPU: 0 PID: 7733 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1420.930284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1420.931991] Call Trace: [ 1420.932551] dump_stack+0x107/0x167 [ 1420.933315] should_fail.cold+0x5/0xa [ 1420.934123] _copy_from_user+0x2e/0x1b0 [ 1420.934972] __copy_msghdr_from_user+0x91/0x4b0 [ 1420.935928] ? __ia32_sys_shutdown+0x80/0x80 [ 1420.936845] ? ieee802154_sock_release+0xb0/0xb0 [ 1420.937824] ? sock_sendmsg+0x55/0x190 [ 1420.938642] sendmsg_copy_msghdr+0xa1/0x160 [ 1420.939539] ? do_recvmmsg+0x6d0/0x6d0 [ 1420.940350] ? __lock_acquire+0x1657/0x5b00 [ 1420.941269] ___sys_sendmsg+0xc6/0x170 [ 1420.942077] ? sendmsg_copy_msghdr+0x160/0x160 [ 1420.943047] ? __lockdep_reset_lock+0x180/0x180 [ 1420.943999] ? trace_hardirqs_on+0x5b/0x180 [ 1420.944904] ? find_held_lock+0x2c/0x110 [ 1420.945757] ? __might_fault+0xd3/0x180 [ 1420.946574] ? lock_downgrade+0x6d0/0x6d0 [ 1420.947441] ? io_schedule_timeout+0x140/0x140 [ 1420.948413] __sys_sendmmsg+0x195/0x470 [ 1420.949243] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1420.950129] ? lock_downgrade+0x6d0/0x6d0 [ 1420.951037] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1420.952032] ? wait_for_completion+0x270/0x270 [ 1420.952977] ? rcu_read_lock_any_held+0x75/0xa0 [ 1420.953928] ? vfs_write+0x354/0xa30 [ 1420.954703] ? fput_many+0x2f/0x1a0 [ 1420.955462] ? ksys_write+0x1a9/0x260 [ 1420.956271] __x64_sys_sendmmsg+0x99/0x100 [ 1420.957142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1420.958197] do_syscall_64+0x33/0x40 [ 1420.958970] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1420.960017] RIP: 0033:0x7f8542659b19 [ 1420.960783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1420.964532] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1420.966094] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1420.967575] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1420.969032] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1420.970486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.971957] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1420.973635] hpet: Lost 2 RTC interrupts 01:58:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:58:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000000)={0x10000, 0x48, '\x00', 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) [ 1435.718009] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:58:41 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 12) 01:58:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x48a1}, 0x4050) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), r0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r3, 0x2, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x40, 0x0, 0x9, 0x2}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x4004) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={&(0x7f0000004cc0)={0x24, r3, 0x0, 0x70bd26, 0x0, {{}, {}, {0x8}}, ["", "", "", ""]}, 0x24}}, 0x20000000) openat(r2, &(0x7f00000002c0)='\x00', 0x200400, 0x8c) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x6, 0x1, 0x7, 0x20, 0x0, 0xffffffff, 0x400, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_config_ext={0x3, 0x9}, 0x0, 0x8, 0x2, 0x5, 0x0, 0x2, 0x7, 0x0, 0xffffffe1, 0x0, 0x2}, 0x0, 0x9, r5, 0x2) sendmmsg$inet6(r4, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:58:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 01:58:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0xfffffffffffffd97, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101100, 0x2) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) 01:58:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 12) 01:58:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x16, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x20}, 0x0, 0x0, 0x0, 0x16, 0x0, 0x101}, 0x20) dup2(r0, r0) 01:58:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:41 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x20000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1445.570859] ieee802154 phy0 wpan0: encryption failed: -22 [ 1445.579147] FAULT_INJECTION: forcing a failure. [ 1445.579147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1445.581823] CPU: 1 PID: 7763 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1445.583213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.584867] Call Trace: [ 1445.585412] dump_stack+0x107/0x167 [ 1445.586156] should_fail.cold+0x5/0xa [ 1445.586986] _copy_from_user+0x2e/0x1b0 [ 1445.587913] __copy_msghdr_from_user+0x91/0x4b0 [ 1445.588856] ? __ia32_sys_shutdown+0x80/0x80 [ 1445.589882] ? ieee802154_sock_release+0xb0/0xb0 [ 1445.590839] ? sock_sendmsg+0x55/0x190 [ 1445.591646] sendmsg_copy_msghdr+0xa1/0x160 [ 1445.592512] ? do_recvmmsg+0x6d0/0x6d0 [ 1445.593303] ? __lock_acquire+0x1657/0x5b00 [ 1445.594188] ___sys_sendmsg+0xc6/0x170 [ 1445.594979] ? sendmsg_copy_msghdr+0x160/0x160 [ 1445.595919] ? __lockdep_reset_lock+0x180/0x180 [ 1445.596852] ? trace_hardirqs_on+0x5b/0x180 [ 1445.597729] ? find_held_lock+0x2c/0x110 [ 1445.598553] ? __might_fault+0xd3/0x180 [ 1445.599365] ? lock_downgrade+0x6d0/0x6d0 [ 1445.600203] ? io_schedule_timeout+0x140/0x140 [ 1445.601154] __sys_sendmmsg+0x195/0x470 [ 1445.602010] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1445.602892] ? lock_downgrade+0x6d0/0x6d0 [ 1445.603765] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1445.604735] ? wait_for_completion+0x270/0x270 [ 1445.605660] ? rcu_read_lock_any_held+0x75/0xa0 [ 1445.606581] ? vfs_write+0x354/0xa30 [ 1445.607352] ? fput_many+0x2f/0x1a0 [ 1445.608075] ? ksys_write+0x1a9/0x260 [ 1445.608859] __x64_sys_sendmmsg+0x99/0x100 [ 1445.609705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.610730] do_syscall_64+0x33/0x40 [ 1445.611491] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.612512] RIP: 0033:0x7f867efe2b19 [ 1445.613252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.616923] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1445.618484] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1445.619922] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1445.621350] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.622776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1445.624193] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1445.628564] ieee802154 phy0 wpan0: encryption failed: -22 [ 1445.630041] FAULT_INJECTION: forcing a failure. [ 1445.630041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1445.632586] CPU: 1 PID: 7774 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1445.634191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.635936] Call Trace: [ 1445.636490] dump_stack+0x107/0x167 [ 1445.637402] should_fail.cold+0x5/0xa [ 1445.638363] _copy_from_user+0x2e/0x1b0 [ 1445.639324] __copy_msghdr_from_user+0x91/0x4b0 [ 1445.640272] ? __ia32_sys_shutdown+0x80/0x80 [ 1445.641187] ? ieee802154_sock_release+0xb0/0xb0 [ 1445.642162] ? sock_sendmsg+0x55/0x190 [ 1445.642967] sendmsg_copy_msghdr+0xa1/0x160 [ 1445.643880] ? do_recvmmsg+0x6d0/0x6d0 [ 1445.644692] ? __lock_acquire+0x1657/0x5b00 [ 1445.645611] ___sys_sendmsg+0xc6/0x170 [ 1445.646415] ? sendmsg_copy_msghdr+0x160/0x160 [ 1445.647376] ? __lockdep_reset_lock+0x180/0x180 [ 1445.648329] ? trace_hardirqs_on+0x5b/0x180 [ 1445.649275] ? find_held_lock+0x2c/0x110 [ 1445.650128] ? __might_fault+0xd3/0x180 [ 1445.650941] ? lock_downgrade+0x6d0/0x6d0 [ 1445.651805] ? io_schedule_timeout+0x140/0x140 [ 1445.652772] __sys_sendmmsg+0x195/0x470 [ 1445.653596] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1445.654475] ? lock_downgrade+0x6d0/0x6d0 [ 1445.655390] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1445.656587] ? wait_for_completion+0x270/0x270 [ 1445.657522] ? rcu_read_lock_any_held+0x75/0xa0 [ 1445.658662] ? vfs_write+0x354/0xa30 [ 1445.659453] ? fput_many+0x2f/0x1a0 [ 1445.660205] ? ksys_write+0x1a9/0x260 [ 1445.661008] __x64_sys_sendmmsg+0x99/0x100 [ 1445.661875] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.662920] do_syscall_64+0x33/0x40 [ 1445.663701] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.664783] RIP: 0033:0x7f8542659b19 [ 1445.665552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.669254] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1445.670795] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1445.672240] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1445.673682] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.675154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1445.676594] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 01:58:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:41 executing program 4: timer_create(0x3, &(0x7f00000001c0)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, &(0x7f0000000180)) setpriority(0x0, 0x0, 0xfffffffffffffffd) clone3(&(0x7f00000000c0)={0x42182f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 01:58:41 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 13) 01:58:41 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 13) [ 1445.879551] ieee802154 phy0 wpan0: encryption failed: -22 [ 1445.883490] ieee802154 phy0 wpan0: encryption failed: -22 [ 1445.889528] FAULT_INJECTION: forcing a failure. [ 1445.889528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1445.892466] CPU: 1 PID: 7791 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1445.893844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.895880] Call Trace: [ 1445.896427] dump_stack+0x107/0x167 [ 1445.897319] should_fail.cold+0x5/0xa [ 1445.898106] _copy_from_user+0x2e/0x1b0 [ 1445.899236] __copy_msghdr_from_user+0x91/0x4b0 [ 1445.900459] ? __ia32_sys_shutdown+0x80/0x80 [ 1445.901621] ? ieee802154_sock_release+0xb0/0xb0 [ 1445.902870] ? sock_sendmsg+0x55/0x190 [ 1445.903916] sendmsg_copy_msghdr+0xa1/0x160 [ 1445.905048] ? do_recvmmsg+0x6d0/0x6d0 [ 1445.906075] ? __lock_acquire+0x1657/0x5b00 [ 1445.907238] ___sys_sendmsg+0xc6/0x170 [ 1445.908260] ? sendmsg_copy_msghdr+0x160/0x160 [ 1445.909460] ? __lockdep_reset_lock+0x180/0x180 [ 1445.910678] ? trace_hardirqs_on+0x5b/0x180 [ 1445.910784] FAULT_INJECTION: forcing a failure. [ 1445.910784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1445.911778] ? find_held_lock+0x2c/0x110 [ 1445.911817] ? __might_fault+0xd3/0x180 [ 1445.916483] ? lock_downgrade+0x6d0/0x6d0 [ 1445.917491] ? io_schedule_timeout+0x140/0x140 [ 1445.918624] __sys_sendmmsg+0x195/0x470 [ 1445.919628] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1445.920667] ? lock_downgrade+0x6d0/0x6d0 [ 1445.921706] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1445.922877] ? wait_for_completion+0x270/0x270 [ 1445.923995] ? rcu_read_lock_any_held+0x75/0xa0 [ 1445.925116] ? vfs_write+0x354/0xa30 [ 1445.926030] ? fput_many+0x2f/0x1a0 [ 1445.926922] ? ksys_write+0x1a9/0x260 [ 1445.927878] __x64_sys_sendmmsg+0x99/0x100 [ 1445.928909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.930198] do_syscall_64+0x33/0x40 [ 1445.931115] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.932353] RIP: 0033:0x7f867efe2b19 [ 1445.933250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.937693] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1445.939541] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1445.941255] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1445.942969] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.944690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1445.946554] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1445.950262] CPU: 0 PID: 7792 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1445.952083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.954305] Call Trace: [ 1445.955023] dump_stack+0x107/0x167 [ 1445.956024] should_fail.cold+0x5/0xa [ 1445.957055] _copy_from_user+0x2e/0x1b0 [ 1445.958171] __copy_msghdr_from_user+0x91/0x4b0 [ 1445.959464] ? __ia32_sys_shutdown+0x80/0x80 [ 1445.960667] ? ieee802154_sock_release+0xb0/0xb0 [ 1445.961938] ? sock_sendmsg+0x55/0x190 [ 1445.962994] sendmsg_copy_msghdr+0xa1/0x160 [ 1445.964176] ? do_recvmmsg+0x6d0/0x6d0 [ 1445.965253] ? __lock_acquire+0x1657/0x5b00 [ 1445.966439] ___sys_sendmsg+0xc6/0x170 [ 1445.967522] ? sendmsg_copy_msghdr+0x160/0x160 [ 1445.968764] ? __lockdep_reset_lock+0x180/0x180 [ 1445.969991] ? trace_hardirqs_on+0x5b/0x180 [ 1445.971181] ? find_held_lock+0x2c/0x110 [ 1445.972325] ? __might_fault+0xd3/0x180 [ 1445.973391] ? lock_downgrade+0x6d0/0x6d0 [ 1445.974508] ? io_schedule_timeout+0x140/0x140 [ 1445.975860] __sys_sendmmsg+0x195/0x470 [ 1445.976947] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1445.978096] ? lock_downgrade+0x6d0/0x6d0 [ 1445.979268] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1445.980554] ? wait_for_completion+0x270/0x270 [ 1445.981776] ? rcu_read_lock_any_held+0x75/0xa0 [ 1445.983004] ? vfs_write+0x354/0xa30 [ 1445.984048] ? fput_many+0x2f/0x1a0 [ 1445.985050] ? ksys_write+0x1a9/0x260 [ 1445.986108] __x64_sys_sendmmsg+0x99/0x100 [ 1445.987267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.988658] do_syscall_64+0x33/0x40 [ 1445.989674] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.991034] RIP: 0033:0x7f8542659b19 [ 1445.992046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.996576] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1445.998461] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1446.000255] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1446.002005] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.003748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1446.005210] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1446.006909] hpet: Lost 2 RTC interrupts 01:58:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:41 executing program 4: getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x13, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @private2, 0xa4d}, 0x1c) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x5c, &(0x7f0000000100), &(0x7f00000001c0)=0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0xa44e, @mcast2, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @loopback}, &(0x7f00000000c0)=0xc) 01:58:41 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:58:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:58:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1f}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb5433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000026c0)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000180)={r3, r4+60000000}, 0x1, 0x1, 0x1, {0x0, r5}}, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002680)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000002600)={0x90800, 0x5, 0x5}, &(0x7f0000002640)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r5}}, 0x200) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) connect$inet(r2, &(0x7f00000025c0)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmsg$inet(r2, &(0x7f0000002580)={&(0x7f00000000c0)={0x2, 0x4e23, @private=0xa010102}, 0x10, &(0x7f0000002500)=[{&(0x7f0000000240)="a1bfda9b6dbbc4923a7765677c8dddb799b4b4eec99550c47ee4626424fe9cc4b52144a5a468587f2fe018e6d8ad9125e9", 0x31}, {&(0x7f0000000280)="de3a6defae45c776ff971b80493c6e6dfac90061910356ef6ba5b6c3acd58b4ade42c6e79d671c53d6c062ebeedfb5bfd213af838e200538e69c16ca37b7d5de593d27ea9c706c1e29548b61fdfb74e22cda845f3a8ecacd2e9583336c136bf346686cd58db5ed50159f7603faad771698168096675d0f56ab4f321ca75bb32ae55b3153c3aafcb00cb9445ef47311a009d050522d9f8b5abd392af2bc5f7cdf388a361c6d863ff7dada235c84890500000000000000d377917adec6a2f3d842217b9300"/210, 0xd2}, {&(0x7f0000000380)="8259d70bbb3cd17505d24fed2e35a63c8dabc8325e0b1184a89dc78383f42f69a9d9d3d242168d3d7899ab8ec25378f3b0c91881f0b6309f7951b8e020c0d2bd860336c82add97eb9dbae88cc6597029591f52e4ec17972e025038ddfa680a75cafb5f13c02aa5a9ab9564bbbcb9c936abf4606638437c339ae62c26782853d7a91804db8b1e4380a0f3a971382038aea115b1f642017be531d13e4dbd2582c70f1c7a0e08f737ed8e678cdf9173fb117f0a39321fd1e25ce6cc51968de78d45edcaaff425b7ae5b1e3175854342ad92c64f0fd89f765e878b793af503bc41de68d339a9213422c9b8156542923f55144e5ca916082f3a055007ce20e1fe24ba1ffbe4b9748d89b5e3385d227085f959f03e8878b4e7dc8ea27eb31c430f0d6e1cb4be391a0f507dfa844928542e47aa1f65d659b3ffe2bdeb8d03e4dfabccd4360085f0df725c0559305ddac9eb632a44dbc83edf5b7f56c63927a4505894e88ec19be0c1a3b04ce2f01ace2dbfe6eed82f205eb085dfc6ee503acc133ce9a94f91cd0df85d2c33a86dc5669467d7999f1f179bf60c6880ee0ded727299b13c05918156ad05ad51717cb08014a5c2eae463f33a70f3e616a24e3aa08e15021b17b8f0d649ea099931c5268fbe7883fdb20bf4047f87b4aacf005d4f0aa27d3b5c947da45bd2e372f37ec0a361d94af6cbb9e8d820252f8ad895c72b07d4b0b09d22085378acdcb21ce91d4fb6495b3311cb4b17d51be83de0c8948e763430f609fcf7cdd6a85bed2eab4e046e71af99c8daeee92bd66ecd5c330e7f45c1b586a2fa3ffab5388933bb64cd28fcfc629f4cc77a63b6816535487aabf180a972e6831ce6847bb1d18428152656daf795229357f3faebd22859e9a9749ec25d288fc8ab0163753ec3586099dffc208b2f99736812bdc429fda584614ee52766245e9cd5e842798ef8063ad79ab3cce2c30b5b58756e6d4433b0a2aa59aae81e1a8de64377b464159d91ac0609f65a584cad10771f2819c61da3805eec9fb811502d15b7e78022c307549d7872957042501e510e8abfa6d7b8144431cc7ec8e4a05a1346c7f1d05713bef16574599f02e530bad65528245a08c37e6e80ab36438e48fec0bf70ce8377066e554ed7d123c7f74519d59743352fe66668a151c0b050176c0183101e4da026e3c276a1bf9bd603e34b114829ef3dda3a8a84af2721b7829b3181eff03f37496ea59d1c777a0263240c949b6b583f7402db326a66e765b1d652900e093c4f23dd33d2c8cd090848f59e04b56257fbaee6647ebfa7ec606599f858f22f202e56d5e23c18d18a91683a6514c79ef8e4be3f627cea0c60cb52ccf73836111e9015a1bc78876acf0cf3bc06a2273a44dc8be2e6d31c3243029c3fdd85178545f9c61145c480068faaef4d2d52dd8c8a44f6628bebe42f227e56afd36537c554292990f4b1e0238ace84bd078137e5b66db50c2b05036fa11efde8abac9e122df43988a5fd3e23ba414154f2c53ff7822e4607cca5587a4e5f248bc2be316926a82365270c032a0ba71bd155daa3354ed778bcaaed7d756f4b7325ec9e89f406a15ac358da3af88254c84de648560bd97d171102341350a7700c5f1cd96b43c7456d1f51dfa1db15802e8cc53cbce5770aac56ecb3188a8290aa423499baedeb8bb713b38d7bbc0a8bad2d145c0e74945677d181d3bcc14470158421ea90796f7c0dd466b857e1a1825fa9c0f124093a777abf155b3ae5935fd49ebe6a1766fd9c3d25c2e2f3a862dd7504529b494083eb7e275f2bece72bee47c4356fcc6b84917ecdfc3eb7c7f32ddaae2441d37cf905cbd4ea9f9aff3e17b5c835bbe64d82481abc15225f5cbb4e2e7407d3c56530d174977444b54f73e757f83b72e703ffd7cbbf7962159bcb6db13216826408223bec5431a5d4e7cb65bb629846abfa480cc9dd30048d805ba0064a7a15c3e3fcca20c84303107e87cb52890d5716da82e0ec6d60da0537189fb52535b31ca073adacd6c1a3a0512b2ded2f0fd55a09859eed6ecd8d72b3608674f6547cc3aa2bc6c5429763b49c738c26deae044d4eacdec41c6e9d4b36c3a7942119bc56e8b8e47fe906d01e3e475359b13acefa61595e55ae91de2844eddb5473a273cc6e61ac82a1a3828adf09c8776e5c44ca6a6fd9c1606477fc76789428add9fd0dc45043d0e04ae74b189245f9d1e75b53f20d0ea6884c71096a0b31d3bc6b5cf62b2a0d2b00903255a35e578e0cf91e590b5ef7e2ba5cf54b45fa6234844b19fe7247f53a56aa5d91371a211c84984d48b9324ccce00612c95eb65022c2e4d02b6168fe18f4e334732e9f5888b1f71928f1d73652c5c58226cbc0c920444e4d4e9908c8e7b813b95454973c2a78e4661d43489613d3e2c4cdabf847fe430ab30ba8e1fe5a985c4b03e2ffd4ab6094dd71ca4c85891d1cd25b37f03cda0d26050f26cbc3efc65082eef2a6d007b0fa84ff1d2d2503d0c9a7ac33bf75df1fedf6b4716b05b44162a968aad5981e880d5d60b8fa19bf362e1e3e946bb6f68cca6bb95fc0e6aa4234203841e68e18499769767d415d173699a1c9ec9bf1efbac20b648d6987cebce387569cc9e0cf912682c2f3c76732eee384dab780d45ce0a7435fdcf6dd1f42e548dd763342276af417858303c5c3379562258564f5cf41c56bc941befd20b67fa11208756b19587eca1eaeaa83ba2e1742902f7dcecd8f85bd7e58c34bcec70a7bd299b317c15bb736504d71d488611a28551fc1496f41fb496f3f7f35eb4579b6ac9911b3aa9689b5ae53b5aadc8b9ce9cc5e82051f267658c06e946c4ecd202c51e30243c6e8643de09106b73150a056ba06925cf63c64172473cbdafcc47369f9d860ada5eff44800390f597382cfd55dc830498e7205d0078c7ebf5b5699e3bab2219294a59017ba653d840319e07f57fce97baf3105ed512f61c0461e07b7e01040f4a32989bc6dbeebbf36609a0bcc44771e547205f2f1249f4a08d6706d64e380f742b92472adcfb6b83d83b9e2bf560a5bef006802dbd6c7d4a60d1ee07ab7ca5ec6b69d195dd64f64866c28890b1e39492884b474f548bbd5834b606ce6ef870bdac6aedfc9dd4fa6062bbd55c1ccfce79c0c75b5a89743ab2a33bfac607040dece078e4302a18b4b16f158431562ea34768e67b5171751cd9fbfbf10176bb70bb716409e4998a4e732135047f711ac22871435b3d6e85aee704409f4ab5243bdd4daa3815a6d0adeadde894115f1205ef0b0a2fff1e2386af1cfcdd2b85c9ddcaa2350779b531208dd7729f51aabeefc9fbaab9f3e86292d4b549ccf72feccf02caab6040a7f5565910fc6b4eba0851f1491203d2ed9c3a001980a02b6a1dd96a661cf66abeb3d5f8137f4ae02cf9a76830d24ded26db661fa72a4f224a6e423a48669df801c33df0b40aee7cd16a9b91888c202a6c75e1e206af47f25d5fe09db4e077768bdafeec367cf3b2466c4e3eb82090dbcbfba6ee8eb749acbf40f23529023fb39ac5d06e2c095e431c5650f1f93725884c09fab0296926a4b8bce048cf4598563c19a0cfcb602503f9539849a3cd4bff70ce473af3c8f22e1aa286d7e3e4a850147bde24f8a6d5f136c9bb2fecf2312c0d9a2f523279535db26a5caf57a655053a68d14f58db999313a62bc03207c11e52fc060d6fea47ad81deeb4e404f78b30443e5a7eecab57d6045ac22d90c1da78d659512a0579bf8c4c4d2b0e08d921763e323723d06e67cbe7eb6c08ac32d7f22aab98b51a1aaf6023622e1c1424de4310f2b97bdbf2fbee0d219355aa74bb0ee1dd7afe12f78ff70d0a4ce3a1452fc09286957ebb75c0c39df3527ce140f99c0708b8c434d5331fa45e069c10f5b7dd7277f8f2a1ce33f0d550fe23bb93ffd10180041300a1109bfc232bc5bcaccf2fd42525182a1f9e8885d4f68840694ece1f971d585c23e83fc6a1144b481b9d9c46b2ea9e6c9251efdd92c57af4f4f31d44f3e8150e37cdcf544a69b98c1226b34c25b8e67b6aaa97c55a1b595d307d67a5742cd4b59dd105e94519d344bfc6a98a17f27326459c8b853f76c919b8ce748b32ae9f88e156a919c12f9dd0121c4882b40730b3468fb1adab3edbb108ca03afa82307f0a326c468c495905923cd2a0432880fde10355a4f1f02e9c7b362646d3e3d0e18aa64f9bbfd4e3e0bae7f3b63476f89c4c7e32f7d2d1edd04df73088333872e88bd2c61a0349ab44c47ece4d96789f0b8e2d703b91be213c0eec82493d3726a9693f2d9d4f9f5858d9a131c04e08b44c2e86e2644b63cb488be53978ef2468f0da94574868fb04490b8d10c7e0d5b852797474f03a98c975556d75d57b59bd612075d45fe01e5569eef2e9f7b4ad6a8abf2699234636afd2ce597e652f8274e79e5b63666c9e610b2e3943f01b270e3d605dc663f6de055a703b6d28dfdc62f03492646b4f3beb5149fb916316d82390ce7f5c244cbbfffc0e2d2f6eb77d72fc6e822b65777a0b841015b7090c39db0c08ad5612624c8b60c6a09fdea640986b359e95248040406e152e4a7a2c7bc2ab96f8169547d2bdfffe6275594b471740384532f7ca83b27b62555b13aba56589cf089144c0c3d47e6233a168f721ca40b6743fb65e837f6389f32d8174c4f4e5c9182fffb684e9ff949a8f4f97edf9e3c51df7c31909adef9b77fe61d23700105cd6de368d90b91858955d91437d18f5a5bb6ecad0a469d8d0c334ad54fa73ca445f73396fc24a0e99dc030207f5ed649bc8d65b65f2927aafb156b0b7810526e186e3b0b5d52277901b1b3d61f0acd07bf44a30853b82971459ffc85789b33c1543804d9796db2aa07bdfd0919839070dab6490dad854c12e7961f1ca35e53997080e71073d1fee8be6900e5bd98524e9190bea73ff70c75d2139314ddd82fcc4fe46e92bfcd1ebeb0c76fda5067440b0f189a2b841bfbf11c2ea9099ce524ba923601dabb84ec2f8128055a5dc247fcc2b4f1d8e29c966bb34e3f491882fbb440c2931b67d1feaa9b049f16555b67f8c18b3dfd4aa6594e78840b3b6908a3651f815da9506e9ebd6dc0021aa551f9bf322f0e17028d58d9726d2e409e278a72325f7007901e078c5531c61e48ba3ed0971fcc2c8c81b23afcb9c510acc420bfb8e2d21cf213b1e6fd92a35d52081efcb38cf4cabba2e3e04b0d30c132a532644e0e484d94eb0d7f48a3f7b2204ead3a1f9a3705bfcf0ca2d9a73848dfc22f82d96cebac78aab131a9cde91743f2d73950a7e7b1f78483e17cfd6bb255a16e582bf8cf2b87949f0f2ba5a190db0cdc79f29698625074e2bd78c6f8dd5c8a742c00d15d66ea83dcdec4121921e1cbab0cdd488d787b73c5ee8bf2b9c9f70e82d2d123da16a098a90074b139a3529e36549e920a971f6eb2518e42a667d37f14d6792adfba2829a63f75cd19c0addd0b28b94efe06e57824c3131efabd70feede948467c1a5449737c1389fda15d4233f2b62ec5583f8756a6be2e48136d9617cf52961b357a2b7bfce3f1b344ef4a00729e341463b6d10d6965e4b0c7ce530eeb6996f4ced64d286c3524226792c2008e1b3abc529332781ab39378475a5df3f3325231342a60b8a96209c7b8a6b60beb103f234bd69f55ad4714d961289660f0a78bb244041ffd859330d48bbd23a82d9dce0023e4b006e5af282b192c0ece31b1f77012cf031ee97b75d01260ecfa4ee349df0aeb3796c375e32ebd7f34651c8cc459014a795c84588cd776614a5d136290ca190eac0d", 0x1000}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="71872b", 0x3}, {&(0x7f00000023c0)="4d255b0f0ba137ac7f986e4ed305f2092d0933882d073ca5d136399b7bc538a8bf3c0def9b32e0f8d49edd35a51393d1055e30aa5adcc904d9e809b36642943f571ccc84b3d8bea86b68c3c58e6caa7e29251eace87c2cb5da8797cda97c98883009683b237fb2664b5d8005f6566be1f192e9b9d215a7f6152459d2fc4b806e15848bad86a575dc9dba5954a6374fad9e74d42793be23211edaeaacb3d2c8b8c5264381c43d", 0xa6}, {&(0x7f0000002480)="a3bcb3d099c7336fdd38b982d6dc5df195eb8dbc95224c3b28bd35558bce79c49b214f61e4f69030aa766f2be8f1b8f5c8a77e57029d08234a8ffcbd772acdbc71ad", 0x42}], 0x7}, 0x40008000) 01:58:42 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:58:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1462.875089] kmemleak: 177 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:59:06 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 14) 01:59:06 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 14) 01:59:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000080)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad0190710", 0x85}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x6}], 0x0, &(0x7f0000000180)) 01:59:06 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/209) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:59:06 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:59:06 executing program 4: getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x13, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @private2, 0xa4d}, 0x1c) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x5c, &(0x7f0000000100), &(0x7f00000001c0)=0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e22, 0xa44e, @mcast2, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @loopback}, &(0x7f00000000c0)=0xc) 01:59:06 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:59:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r1, 0x4, 0x2000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = fork() setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r2, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r3, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x9, 0x1, 0x80, 0x1, 0x0, 0x7, 0x2010, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfb3, 0x1, @perf_config_ext={0x4c6, 0x80}, 0x4023, 0x4, 0x3, 0x1, 0xfff, 0x8, 0x94, 0x0, 0x9, 0x0, 0x7}, r2, 0xe, r3, 0x9) [ 1470.702650] ieee802154 phy0 wpan0: encryption failed: -22 [ 1470.704165] FAULT_INJECTION: forcing a failure. [ 1470.704165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1470.706774] CPU: 0 PID: 7819 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1470.708192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1470.709879] Call Trace: [ 1470.710430] dump_stack+0x107/0x167 [ 1470.711188] should_fail.cold+0x5/0xa [ 1470.712038] _copy_from_user+0x2e/0x1b0 [ 1470.712870] __copy_msghdr_from_user+0x91/0x4b0 [ 1470.713826] ? __ia32_sys_shutdown+0x80/0x80 [ 1470.714746] ? ieee802154_sock_release+0xb0/0xb0 [ 1470.715733] ? sock_sendmsg+0x55/0x190 [ 1470.716561] sendmsg_copy_msghdr+0xa1/0x160 [ 1470.717445] ? do_recvmmsg+0x6d0/0x6d0 [ 1470.718290] ? __lock_acquire+0x1657/0x5b00 [ 1470.719213] ___sys_sendmsg+0xc6/0x170 [ 1470.720084] ? sendmsg_copy_msghdr+0x160/0x160 [ 1470.721030] ? __lockdep_reset_lock+0x180/0x180 [ 1470.721976] ? trace_hardirqs_on+0x5b/0x180 [ 1470.722890] ? find_held_lock+0x2c/0x110 [ 1470.723768] ? __might_fault+0xd3/0x180 [ 1470.724593] ? lock_downgrade+0x6d0/0x6d0 [ 1470.725469] ? io_schedule_timeout+0x140/0x140 [ 1470.726452] __sys_sendmmsg+0x195/0x470 [ 1470.727301] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1470.728208] ? lock_downgrade+0x6d0/0x6d0 [ 1470.729105] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1470.730114] ? wait_for_completion+0x270/0x270 [ 1470.731063] ? rcu_read_lock_any_held+0x75/0xa0 [ 1470.732034] ? vfs_write+0x354/0xa30 [ 1470.732820] ? fput_many+0x2f/0x1a0 [ 1470.733590] ? ksys_write+0x1a9/0x260 [ 1470.734405] __x64_sys_sendmmsg+0x99/0x100 [ 1470.735269] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1470.736349] do_syscall_64+0x33/0x40 [ 1470.737120] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1470.738180] RIP: 0033:0x7f867efe2b19 [ 1470.738954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1470.742787] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1470.744363] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1470.745843] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1470.747306] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1470.748794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1470.750269] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1470.752032] hpet: Lost 2 RTC interrupts [ 1470.753554] ieee802154 phy0 wpan0: encryption failed: -22 [ 1470.757293] FAULT_INJECTION: forcing a failure. [ 1470.757293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1470.759829] CPU: 1 PID: 7830 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1470.761256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1470.762949] Call Trace: [ 1470.763516] dump_stack+0x107/0x167 [ 1470.764286] should_fail.cold+0x5/0xa [ 1470.765089] _copy_from_user+0x2e/0x1b0 [ 1470.765918] __copy_msghdr_from_user+0x91/0x4b0 [ 1470.766885] ? __ia32_sys_shutdown+0x80/0x80 [ 1470.767830] ? ieee802154_sock_release+0xb0/0xb0 [ 1470.768812] ? sock_sendmsg+0x55/0x190 [ 1470.769628] sendmsg_copy_msghdr+0xa1/0x160 [ 1470.770517] ? do_recvmmsg+0x6d0/0x6d0 [ 1470.771331] ? __lock_acquire+0x1657/0x5b00 [ 1470.772260] ___sys_sendmsg+0xc6/0x170 [ 1470.773075] ? sendmsg_copy_msghdr+0x160/0x160 [ 1470.774084] ? __lockdep_reset_lock+0x180/0x180 [ 1470.775045] ? trace_hardirqs_on+0x5b/0x180 [ 1470.775977] ? find_held_lock+0x2c/0x110 [ 1470.776831] ? __might_fault+0xd3/0x180 [ 1470.777656] ? lock_downgrade+0x6d0/0x6d0 [ 1470.778515] ? io_schedule_timeout+0x140/0x140 [ 1470.779514] __sys_sendmmsg+0x195/0x470 [ 1470.780349] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1470.781249] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1470.782352] ? finish_task_switch+0x127/0x5d0 [ 1470.783276] ? __switch_to_asm+0x34/0x60 [ 1470.784127] ? __schedule+0x850/0x1e90 [ 1470.784951] ? io_schedule_timeout+0x140/0x140 [ 1470.785896] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1470.787049] __x64_sys_sendmmsg+0x99/0x100 [ 1470.787943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1470.789005] do_syscall_64+0x33/0x40 [ 1470.789834] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1470.790885] RIP: 0033:0x7f8542659b19 [ 1470.791662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1470.795423] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1470.796989] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1470.798462] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1470.799943] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1470.801423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1470.802897] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 01:59:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000040), 0x12) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) copy_file_range(r1, &(0x7f0000000080)=0x8, r0, &(0x7f00000000c0)=0xfff, 0x9, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 1470.853818] syz-executor.2 (7838): /proc/7838/oom_adj is deprecated, please use /proc/7838/oom_score_adj instead. [ 1483.403665] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1492.892943] ieee802154 phy0 wpan0: encryption failed: -22 [ 1492.894272] FAULT_INJECTION: forcing a failure. [ 1492.894272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1492.896713] CPU: 1 PID: 7847 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1492.898118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1492.899928] Call Trace: [ 1492.900478] dump_stack+0x107/0x167 [ 1492.901237] should_fail.cold+0x5/0xa [ 1492.902048] _copy_from_user+0x2e/0x1b0 [ 1492.902879] __copy_msghdr_from_user+0x91/0x4b0 [ 1492.903868] ? __ia32_sys_shutdown+0x80/0x80 [ 1492.904789] ? ieee802154_sock_release+0xb0/0xb0 [ 1492.905765] ? sock_sendmsg+0x55/0x190 [ 1492.906572] sendmsg_copy_msghdr+0xa1/0x160 [ 1492.907457] ? do_recvmmsg+0x6d0/0x6d0 [ 1492.908270] ? __lock_acquire+0x1657/0x5b00 [ 1492.909163] ___sys_sendmsg+0xc6/0x170 [ 1492.909955] ? sendmsg_copy_msghdr+0x160/0x160 [ 1492.910892] ? __lockdep_reset_lock+0x180/0x180 [ 1492.911870] ? lock_downgrade+0x6d0/0x6d0 [ 1492.912725] ? find_held_lock+0x2c/0x110 [ 1492.913572] ? __might_fault+0xd3/0x180 [ 1492.914388] ? lock_downgrade+0x6d0/0x6d0 [ 1492.915333] __sys_sendmmsg+0x195/0x470 [ 1492.916168] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1492.917032] ? lock_downgrade+0x6d0/0x6d0 [ 1492.917902] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1492.918881] ? wait_for_completion+0x270/0x270 [ 1492.919824] ? rcu_read_lock_any_held+0x75/0xa0 [ 1492.920774] ? vfs_write+0x354/0xa30 [ 1492.921547] ? fput_many+0x2f/0x1a0 [ 1492.922296] ? ksys_write+0x1a9/0x260 [ 1492.923086] __x64_sys_sendmmsg+0x99/0x100 [ 1492.923979] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1492.925036] do_syscall_64+0x33/0x40 [ 1492.925799] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1492.926839] RIP: 0033:0x7f867efe2b19 [ 1492.927603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1492.931432] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1492.932995] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1492.934448] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1492.935921] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.937371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1492.938814] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 01:59:28 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 15) 01:59:28 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000200)={r2, 0x3, 0x2, 0x10001}) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000280)=0x40, 0x0, 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xb00) syz_io_uring_submit(0x0, 0x0, &(0x7f00000004c0)=@IORING_OP_WRITEV={0x2, 0x2, 0x2000, @fd, 0x8, &(0x7f0000000480)=[{&(0x7f00000005c0)="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", 0xfc0}, {&(0x7f0000000340)="ed57c9c6e0eeced10bc95f5599b51348db316ac5175d136a77e9edbeae1e808dae517186dba27cc7b454d7d3efbb91123e809a741b", 0x35}, {&(0x7f0000000380)="2dc34ae686a804da6deb884ea6a91acc1d71d06bd3ece3dbbcee317d85703ecc98dc326d417caa93ce20c2d9053d1811b78f4c97c842780d1f915384403d7981c574809977cb8508e80ea4c878919e6da46f1652a0913dbcfe55599495e6657f8e933403116e9387d0e8cecc1601b5c4792fa939d396fca6000fc8eae5a105d1551398d8384ca49f68381f0a97bbaffe60861822a1d8d704b42fdfb6259b43bc9609e8ccc38a4e1bc425eb86115493", 0xaf}, {&(0x7f0000000440)="c527f368533d9b150c9552811d627d3df5032f45cf8823066f87ba0487bfbf12a0547e2528e3d6684df966a52d", 0x2d}], 0x4, 0xc, 0x0, {0x2}}, 0x2) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x76d2, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r6, 0x0, 0x1, &(0x7f0000000140)=""/146, &(0x7f0000000000)=0x92) 01:59:28 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2}) dup(r0) close_range(r1, r1, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'netdevsim0\x00', @local}) r3 = syz_open_dev$vcsa(0x0, 0xe11, 0x4000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x96c02000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x810, r3, 0xde4c3000) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f00000001c0)) 01:59:28 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='setgroups\x00') ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:59:28 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:59:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder-control\x00', 0x800, 0x0) dup3(r0, r2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) 01:59:28 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 15) 01:59:28 executing program 2: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x84000802) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r1, 0x0) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, 0x0, 0x100) mount(0x0, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='autofs\x00', 0x0, &(0x7f0000000ac0)='\xa1\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0x8001}}, './file0/file0\x00'}) lgetxattr(0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'0000000000000000000000000000000', 0x31}, 0x20, 0x0) [ 1493.002582] ieee802154 phy0 wpan0: encryption failed: -22 [ 1493.004064] FAULT_INJECTION: forcing a failure. [ 1493.004064] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1493.006454] CPU: 1 PID: 7860 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1493.007908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1493.009691] Call Trace: [ 1493.010245] dump_stack+0x107/0x167 [ 1493.011012] should_fail.cold+0x5/0xa [ 1493.011825] _copy_from_user+0x2e/0x1b0 [ 1493.012664] __copy_msghdr_from_user+0x91/0x4b0 [ 1493.013624] ? __ia32_sys_shutdown+0x80/0x80 [ 1493.014549] ? ieee802154_sock_release+0xb0/0xb0 [ 1493.015523] ? sock_sendmsg+0x55/0x190 [ 1493.016361] sendmsg_copy_msghdr+0xa1/0x160 [ 1493.017252] ? do_recvmmsg+0x6d0/0x6d0 [ 1493.018058] ? __lock_acquire+0x1657/0x5b00 [ 1493.018975] ___sys_sendmsg+0xc6/0x170 [ 1493.019798] ? sendmsg_copy_msghdr+0x160/0x160 [ 1493.020747] ? __lockdep_reset_lock+0x180/0x180 [ 1493.021698] ? lock_downgrade+0x6d0/0x6d0 [ 1493.022583] ? find_held_lock+0x2c/0x110 [ 1493.023438] ? __might_fault+0xd3/0x180 [ 1493.024269] ? lock_downgrade+0x6d0/0x6d0 [ 1493.025227] __sys_sendmmsg+0x195/0x470 [ 1493.026060] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1493.026953] ? lock_downgrade+0x6d0/0x6d0 [ 1493.027860] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1493.028863] ? wait_for_completion+0x270/0x270 [ 1493.029814] ? rcu_read_lock_any_held+0x75/0xa0 [ 1493.030765] ? vfs_write+0x354/0xa30 [ 1493.031552] ? fput_many+0x2f/0x1a0 [ 1493.032312] ? ksys_write+0x1a9/0x260 [ 1493.033119] __x64_sys_sendmmsg+0x99/0x100 [ 1493.033993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1493.035065] do_syscall_64+0x33/0x40 [ 1493.035863] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1493.036918] RIP: 0033:0x7f8542659b19 [ 1493.037694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1493.041500] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1493.043062] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1493.044547] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1493.045998] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.047463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1493.048939] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 01:59:28 executing program 5: syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f00000000c0)={0x14, &(0x7f0000000140)={0x40, 0x2, 0x51, {0x51, 0x2d, "c773378a12821fc88774f04a8697cb27617c4e746f894c68dff421d96b34385d7f63c30942c39f7b39acb565fa54b82b7a6fd584cc546a1bf66fdf2fcd7846cb131250a3977cd783476e55e03849f7"}}, &(0x7f0000000000)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x180c}}}, &(0x7f0000000380)={0x34, &(0x7f00000001c0)={0x0, 0x8, 0x78, "ca67982b95410ee4a5fdcf79ecb9eb03573c09520b6672d0a69eec293bdf94ecfb9e9cdfbc9311eb96381cccadc0bbdad9d0fdb8f573f38b083864f11e08d16b29c717c1f80ee911be1aee2673567ab1d17530373e44a83b9accca5c79c6a360600b15564b49ffc33b09fe0ddaa299bfaed43ced20d1b134"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x9a}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x6}, &(0x7f00000002c0)={0x20, 0x0, 0x25, {0x23, "778be869a94062f307a124386203685d84422f79788b798cef5739f5cf797896f5023b"}}, &(0x7f0000000300)={0x20, 0x1, 0x1, 0x48}, &(0x7f0000000340)={0x20, 0x0, 0x1, 0x8}}) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f00000005c0)={0x14, &(0x7f00000003c0)={0x20, 0x9, 0xbe, {0xbe, 0xa, "aac834204c2867378981aae3ea3aa48059cad69fcea2b10d52e7ce61c2fc1c6fff65fdb92acc3ef1f08f2cddb8b1043a36451689ef170f63479916e1bd16ff093246eb438d594424e0db873c92a7f0049da00172464deb090188e072c6f306c76af5688f1f4b8a737857c3816d3c26ce84ab084db1bd85e35fc5359578d7427a95c26e2c4b63f84f05e52ea90e62539c7ca6f9c5fdbc5760ed25eae921154c948150a14a25c67b19eb370129beeec6740003f2cf55dcb9b5a44e0cb3"}}, &(0x7f00000004c0)={0x0, 0x3, 0xca, @string={0xca, 0x3, "b8060b32b9e2918bcf7f9d14c3217ad11fddaecccd9846626d6da53766e7e7b2c409fea0f4fba333a05894ac5c9cc360db9aa7cd06ccd099f1d7b6ca818d212a0ea2be981460ab44f1e15a094d8b18f5243e294d817abc8814aa62c7a0a2a6c4ebce811fb6b260cc1a5a06ecd47e3b3886daed04b0640919520c7b51283b50a2153938635b4b47c1c7fddaea00da9f856bf2a1a887adfd4f5b4b5cc15efc5a1f9310e1a214c531d4149a31155e70dd4ab164bd705795813557536fd7292c9c2068b5d389259f5083"}}}, &(0x7f0000000880)={0x34, &(0x7f0000000600)={0x40, 0x14, 0x6d, "f0e985e617b55e02ef769f63eae592408211e587bef50927923b3783429328daa611daf9bca6bbe7f48ffa07b9ced7bd75b9367b4719b6e0cbcac52521e055e70581501244fb5fbe795b777a962a120c05ceceb04cbd3331b28844079e02d646cd600668e849bd9512100f484d"}, &(0x7f0000000680)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000006c0)={0x0, 0x8, 0x1, 0x7}, &(0x7f0000000700)={0x20, 0x0, 0xf1, {0xef, "fdca558554d562aa72c47af88c9cae90b1f435138e36511fda98763d63647621f2442ef4132e88d09b1ef132429a6df6745822c8b8252ce309818a0b56e16e77a915b8233d0a67c2cd8467b98c3ec910bf377efa3f359766df5625f532de8454211818a3765c2d32cd6f43476b8e8aae49851161340c20dc6362e137f2a4ea9888e6ea9ac2f016fc19351da7e7346c6e3fbec1902d7c2cd61c52ff0461bded4ef4e71a21f4d8d98e855ffe90225a830db50c809d277e16208b2a66ef4140b88d9c2e9cf30b320ebec2ae794ef716281e71e53b16af90b266e07805b83e5933d2f61737f7eff0e4fde13e83d2fcad0b"}}, &(0x7f0000000800)={0x20, 0x1, 0x1, 0xf8}, &(0x7f0000000840)={0x20, 0x0, 0x1}}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 01:59:28 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1510.046740] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:59:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x590}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x9, 0x5, 0x0, 0x1826, 0x7}) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) shutdown(r2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 01:59:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) close(r1) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) quotactl(0x24000000000, &(0x7f00000000c0)='./file0\x00', r6, &(0x7f0000000180)="dc783948ab8544268016f4607a0ea1b42357be83ec32e887958f3f6927ca55a4853242e9477c1584719b868ec422643f2ed99323082ed16ec6682eb7f3300aa9efbcf925f63ebb90385bf9ca407f0d813ae9bf9c1dab66cd9be709357a95cf978bdb23363497b41e322a5fa5c1dc95769a39f18cd7ad6c8b91c10f7f37a441aab58717441549e7d0e4ffe0e97690b8deff5b3811bcdb45832e834406b8a3d8ac0606d9148c4498b4128a04c85994d880e5c9b62768e8f2502932d11763de1ae512ff90a9ac8ad3d49b98e2438bbe9ae5b38cfdfb5ee9e07a7b543ecc5b316b21bb0d94b53ca019a5b357c9fa13c43a8ea06fd2acac0721b0") dup2(r5, r4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r7, r4, 0x0, 0x7ffffff9) truncate(&(0x7f0000000080)='./file1\x00', 0x5) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000280)={0x0, 0x7fffffff}) 01:59:55 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2}) dup(r0) close_range(r1, r1, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'netdevsim0\x00', @local}) r3 = syz_open_dev$vcsa(0x0, 0xe11, 0x4000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10010, r3, 0x96c02000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x810, r3, 0xde4c3000) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f00000001c0)) 01:59:55 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:59:55 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 16) 01:59:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000200)={r2, 0x3, 0x2, 0x10001}) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000280)=0x40, 0x0, 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xb00) syz_io_uring_submit(0x0, 0x0, &(0x7f00000004c0)=@IORING_OP_WRITEV={0x2, 0x2, 0x2000, @fd, 0x8, &(0x7f0000000480)=[{&(0x7f00000005c0)="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", 0xfc0}, {&(0x7f0000000340)="ed57c9c6e0eeced10bc95f5599b51348db316ac5175d136a77e9edbeae1e808dae517186dba27cc7b454d7d3efbb91123e809a741b", 0x35}, {&(0x7f0000000380)="2dc34ae686a804da6deb884ea6a91acc1d71d06bd3ece3dbbcee317d85703ecc98dc326d417caa93ce20c2d9053d1811b78f4c97c842780d1f915384403d7981c574809977cb8508e80ea4c878919e6da46f1652a0913dbcfe55599495e6657f8e933403116e9387d0e8cecc1601b5c4792fa939d396fca6000fc8eae5a105d1551398d8384ca49f68381f0a97bbaffe60861822a1d8d704b42fdfb6259b43bc9609e8ccc38a4e1bc425eb86115493", 0xaf}, {&(0x7f0000000440)="c527f368533d9b150c9552811d627d3df5032f45cf8823066f87ba0487bfbf12a0547e2528e3d6684df966a52d", 0x2d}], 0x4, 0xc, 0x0, {0x2}}, 0x2) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x76d2, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r6, 0x0, 0x1, &(0x7f0000000140)=""/146, &(0x7f0000000000)=0x92) 01:59:55 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:59:55 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 16) [ 1519.885815] ieee802154 phy0 wpan0: encryption failed: -22 [ 1519.889911] ieee802154 phy0 wpan0: encryption failed: -22 [ 1519.891421] FAULT_INJECTION: forcing a failure. [ 1519.891421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1519.894089] CPU: 0 PID: 7902 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1519.895536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1519.897276] Call Trace: [ 1519.897840] dump_stack+0x107/0x167 [ 1519.898616] should_fail.cold+0x5/0xa [ 1519.899435] _copy_from_user+0x2e/0x1b0 [ 1519.900300] __copy_msghdr_from_user+0x91/0x4b0 [ 1519.901305] ? __ia32_sys_shutdown+0x80/0x80 [ 1519.902250] ? ieee802154_sock_release+0xb0/0xb0 [ 1519.903250] ? sock_sendmsg+0x55/0x190 [ 1519.904081] sendmsg_copy_msghdr+0xa1/0x160 [ 1519.904970] ? do_recvmmsg+0x6d0/0x6d0 [ 1519.905825] ? __lock_acquire+0x1657/0x5b00 [ 1519.906894] ___sys_sendmsg+0xc6/0x170 [ 1519.907707] ? sendmsg_copy_msghdr+0x160/0x160 [ 1519.908688] ? __lockdep_reset_lock+0x180/0x180 [ 1519.909673] ? trace_hardirqs_on+0x5b/0x180 [ 1519.910638] ? find_held_lock+0x2c/0x110 [ 1519.911490] ? __might_fault+0xd3/0x180 [ 1519.912316] ? lock_downgrade+0x6d0/0x6d0 [ 1519.913188] ? io_schedule_timeout+0x140/0x140 [ 1519.914170] __sys_sendmmsg+0x195/0x470 [ 1519.915016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1519.915916] ? lock_downgrade+0x6d0/0x6d0 [ 1519.916856] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1519.917870] ? wait_for_completion+0x270/0x270 [ 1519.918822] ? rcu_read_lock_any_held+0x75/0xa0 [ 1519.919817] ? vfs_write+0x354/0xa30 [ 1519.920616] ? fput_many+0x2f/0x1a0 [ 1519.921394] ? ksys_write+0x1a9/0x260 [ 1519.922202] __x64_sys_sendmmsg+0x99/0x100 [ 1519.923135] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.924207] do_syscall_64+0x33/0x40 [ 1519.925016] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1519.926107] RIP: 0033:0x7f867efe2b19 [ 1519.926897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1519.930718] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1519.932326] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1519.933810] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1519.935280] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.936758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1519.938222] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1519.939948] hpet: Lost 2 RTC interrupts 01:59:55 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1519.946048] FAULT_INJECTION: forcing a failure. [ 1519.946048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1519.948638] CPU: 1 PID: 7898 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1519.950042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1519.951738] Call Trace: [ 1519.952320] dump_stack+0x107/0x167 [ 1519.953067] should_fail.cold+0x5/0xa [ 1519.953871] _copy_from_user+0x2e/0x1b0 [ 1519.954704] __copy_msghdr_from_user+0x91/0x4b0 [ 1519.955658] ? __ia32_sys_shutdown+0x80/0x80 [ 1519.956615] ? ieee802154_sock_release+0xb0/0xb0 [ 1519.957587] ? sock_sendmsg+0x55/0x190 [ 1519.958423] sendmsg_copy_msghdr+0xa1/0x160 [ 1519.959315] ? do_recvmmsg+0x6d0/0x6d0 [ 1519.960136] ? __lock_acquire+0x1657/0x5b00 [ 1519.961056] ___sys_sendmsg+0xc6/0x170 [ 1519.961879] ? sendmsg_copy_msghdr+0x160/0x160 [ 1519.962897] ? __lockdep_reset_lock+0x180/0x180 [ 1519.963858] ? trace_hardirqs_on+0x5b/0x180 [ 1519.964776] ? find_held_lock+0x2c/0x110 [ 1519.965641] ? __might_fault+0xd3/0x180 [ 1519.966470] ? lock_downgrade+0x6d0/0x6d0 [ 1519.967323] ? io_schedule_timeout+0x140/0x140 [ 1519.968319] __sys_sendmmsg+0x195/0x470 [ 1519.969162] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1519.970055] ? lock_downgrade+0x6d0/0x6d0 [ 1519.970952] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1519.971946] ? wait_for_completion+0x270/0x270 [ 1519.972906] ? rcu_read_lock_any_held+0x75/0xa0 [ 1519.973860] ? vfs_write+0x354/0xa30 [ 1519.974639] ? fput_many+0x2f/0x1a0 [ 1519.975393] ? ksys_write+0x1a9/0x260 [ 1519.976218] __x64_sys_sendmmsg+0x99/0x100 [ 1519.977107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.978219] do_syscall_64+0x33/0x40 [ 1519.978991] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1519.980048] RIP: 0033:0x7f8542659b19 [ 1519.980813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1519.984574] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1519.986138] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1519.987589] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1519.989062] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.990511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1519.991963] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 01:59:55 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 17) 01:59:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) socketpair(0x3, 0xa, 0x101, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 1520.106192] ieee802154 phy0 wpan0: encryption failed: -22 [ 1520.107890] FAULT_INJECTION: forcing a failure. [ 1520.107890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1520.110341] CPU: 0 PID: 7913 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1520.111743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1520.113433] Call Trace: [ 1520.113986] dump_stack+0x107/0x167 [ 1520.114740] should_fail.cold+0x5/0xa [ 1520.115539] _copy_from_user+0x2e/0x1b0 [ 1520.116371] __copy_msghdr_from_user+0x91/0x4b0 [ 1520.117327] ? __ia32_sys_shutdown+0x80/0x80 [ 1520.118248] ? ieee802154_sock_release+0xb0/0xb0 [ 1520.119252] ? sock_sendmsg+0x55/0x190 [ 1520.120090] sendmsg_copy_msghdr+0xa1/0x160 [ 1520.120988] ? do_recvmmsg+0x6d0/0x6d0 [ 1520.121790] ? __lock_acquire+0x1657/0x5b00 [ 1520.122707] ___sys_sendmsg+0xc6/0x170 [ 1520.123510] ? sendmsg_copy_msghdr+0x160/0x160 [ 1520.124463] ? __lockdep_reset_lock+0x180/0x180 [ 1520.125417] ? trace_hardirqs_on+0x5b/0x180 [ 1520.126327] ? find_held_lock+0x2c/0x110 [ 1520.127173] ? __might_fault+0xd3/0x180 [ 1520.128004] ? lock_downgrade+0x6d0/0x6d0 [ 1520.128858] ? io_schedule_timeout+0x140/0x140 [ 1520.129821] __sys_sendmmsg+0x195/0x470 [ 1520.130644] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1520.131520] ? lock_downgrade+0x6d0/0x6d0 [ 1520.132424] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1520.133436] ? wait_for_completion+0x270/0x270 [ 1520.134370] ? rcu_read_lock_any_held+0x75/0xa0 [ 1520.135311] ? vfs_write+0x354/0xa30 [ 1520.136086] ? fput_many+0x2f/0x1a0 [ 1520.136834] ? ksys_write+0x1a9/0x260 [ 1520.137651] __x64_sys_sendmmsg+0x99/0x100 [ 1520.138543] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1520.139643] do_syscall_64+0x33/0x40 [ 1520.140575] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1520.141653] RIP: 0033:0x7f867efe2b19 [ 1520.142491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1520.146263] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1520.147825] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1520.149331] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1520.150944] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.152434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1520.153897] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1520.155875] hpet: Lost 2 RTC interrupts 01:59:55 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:59:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200001, 0x76) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1000003) r1 = socket$inet(0x2, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{&(0x7f0000000300)={0xa, 0x4e20, 0x9, @empty, 0x8}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)="63ce4f1e520650523493ce", 0xb}], 0x1, &(0x7f0000000480)=[@hopopts_2292={{0x138, 0x29, 0x36, {0x29, 0x23, '\x00', [@generic={0x40, 0x48, "05a7193325e3e23ed86885d48e279ac494e75068245e176fc8efa7d58abcb54e23b42db8d226be92e56f7234aaf29857cf38d68883d179f30f809a5c63563e8390d2cba443821c2d"}, @generic={0x5, 0x68, "aa1c9d4e993ce2a6cf744fa3e5afe4f52b1208d4510246a9c55132810a2272da549e0fa57b74c023b8dec5c91cb834dfbc4e5c3350e9d153fecd12bb9b64e04d873e973975ee74b87fb3ad3f23b8c58c13943580ce6cf9d07584e33bacda0d54d2a0d2d99be18528"}, @calipso={0x7, 0x58, {0x1, 0x14, 0x81, 0x3, [0x40, 0x0, 0x8001, 0x7, 0xffffffff, 0x1, 0x97a, 0x6, 0x0, 0x1]}}, @enc_lim={0x4, 0x1, 0x7f}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8}]}}}], 0x138}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000005c0)="06ed84f96d71564e319d1df06805eabd1366ea62d1f7a29ae20fe26007ca69d296137e239ffc6d42f9bf86eb8d043dfc55a7f74c6a", 0x35}, {&(0x7f0000000600)="1eebaeade80ac5a89acd902510710e8d851715afd1724011998b1718dd2188507a1c13729eb5fa2d7516f9f4b165e3e2c6d72112c9e943db3c0099fbd2c90129d13ae9229d697a0b40888231882fd0b7ffbb422c587e8141dcaca431dc3012899506325552b28870fa93e3c2e52db4c4ced7f90c13f1c4e607658d7f615533ac3b73ff68c2723cfdfef0a1e296feb4f3617fe4809a927d5d341878e9b86d45b841371da763469baeec694e10d52ce9baad02c3cd3908787c5f319c96a1b98db4aa169406fceaac8aef485294ea397f8c3e3ec684", 0xd4}, {&(0x7f0000000700)="61b6aebf405bfd65eef64e8396dd73f6cd306700ea5da6b2bdebb817f4c6a2df604dda1ee1f2ee1ac0494911ba7f5b184879d74931cee0fae0bcafe8f9946d2ae6f1a075a9583555f0cc5e7f9b84609adad52d736881017fa0bf430bbb482871af7c98cb27ac848ca274ac46944774db", 0x70}, {&(0x7f0000000780)="396f84559a7b1ce1ba847e", 0xb}], 0x4, &(0x7f0000000800)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x0, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0xa013}, @ra={0x5, 0x2, 0x7}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffffffe}}], 0x40}}], 0x2, 0x20040000) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='.\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) setresuid(0x0, r2, 0x0) mount$9p_xen(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x10805, &(0x7f00000001c0)={'trans=xen,', {[{@cache_none}, {@version_9p2000}, {@cachetag={'cachetag', 0x3d, ':{{^+!*(\\#'}}, {@loose}], [{@obj_role={'obj_role', 0x3d, '\x00'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_role={'subj_role', 0x3d, '\x00'}}]}}) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = signalfd4(r1, &(0x7f0000000280)={[0x7f]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000018000700", @ANYRES32=r5, @ANYBLOB="f7ffffff010000002e2f66696c653100"]) shutdown(r1, 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x800005, 0xffffffff, 0x8000, 0x2, 0xfffffffb}) acct(&(0x7f0000000040)='./file0\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) unshare(0x48020200) 01:59:55 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 18) 01:59:56 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:59:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = fsopen(&(0x7f0000001800)='f2fs\x00', 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000001840)) [ 1520.473858] ieee802154 phy0 wpan0: encryption failed: -22 [ 1520.475357] FAULT_INJECTION: forcing a failure. [ 1520.475357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1520.477726] CPU: 1 PID: 7929 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1520.479114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1520.480770] Call Trace: [ 1520.481287] dump_stack+0x107/0x167 [ 1520.482025] should_fail.cold+0x5/0xa [ 1520.482774] _copy_from_user+0x2e/0x1b0 [ 1520.483549] __copy_msghdr_from_user+0x91/0x4b0 [ 1520.484464] ? __ia32_sys_shutdown+0x80/0x80 [ 1520.485337] ? ieee802154_sock_release+0xb0/0xb0 [ 1520.486253] ? sock_sendmsg+0x55/0x190 [ 1520.487016] sendmsg_copy_msghdr+0xa1/0x160 [ 1520.487837] ? do_recvmmsg+0x6d0/0x6d0 [ 1520.488607] ? __lock_acquire+0x1657/0x5b00 [ 1520.489445] ___sys_sendmsg+0xc6/0x170 [ 1520.490200] ? sendmsg_copy_msghdr+0x160/0x160 [ 1520.491085] ? __lockdep_reset_lock+0x180/0x180 [ 1520.491975] ? trace_hardirqs_on+0x5b/0x180 [ 1520.492839] ? find_held_lock+0x2c/0x110 [ 1520.493709] ? __might_fault+0xd3/0x180 [ 1520.494491] ? lock_downgrade+0x6d0/0x6d0 [ 1520.495300] ? io_schedule_timeout+0x140/0x140 [ 1520.496197] __sys_sendmmsg+0x195/0x470 [ 1520.496988] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1520.497848] ? lock_downgrade+0x6d0/0x6d0 [ 1520.498695] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1520.499630] ? wait_for_completion+0x270/0x270 [ 1520.500523] ? rcu_read_lock_any_held+0x75/0xa0 [ 1520.501417] ? vfs_write+0x354/0xa30 [ 1520.502161] ? fput_many+0x2f/0x1a0 [ 1520.502858] ? ksys_write+0x1a9/0x260 [ 1520.503593] __x64_sys_sendmmsg+0x99/0x100 [ 1520.504414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1520.505393] do_syscall_64+0x33/0x40 [ 1520.506110] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1520.507086] RIP: 0033:0x7f867efe2b19 [ 1520.507802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1520.511400] RSP: 002b:00007f867c537188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1520.512849] RAX: ffffffffffffffda RBX: 00007f867f0f6020 RCX: 00007f867efe2b19 [ 1520.514211] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1520.515577] RBP: 00007f867c5371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.516943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1520.518295] R13: 00007fffb7ecc00f R14: 00007f867c537300 R15: 0000000000022000 01:59:56 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)=r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa57a, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f00000005c0)={{r2}, "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"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0xb052) fcntl$dupfd(r4, 0x406, r2) io_setup(0x3e7, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="6bb38c5e", @ANYRES16=0x0, @ANYBLOB="058000001000000000000f11000008000300641a38c8857aa61bb94d4cd43280cf08f22e91a01bff73cbe572afb15e5cca1c0b27c1819fcede4226ba3031e5fe79", @ANYRES32=r6, @ANYBLOB], 0x1c}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000340)=0x7abc, 0x4) ftruncate(0xffffffffffffffff, 0x1000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r7, 0xffffffffffffffff, 0x0, 0xb052) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) lseek(r5, 0x20, 0x4) 01:59:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_io_uring_setup(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)) io_uring_enter(r2, 0x5c33, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000280)=0x2) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xe20, 0x8c, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) r4 = clone3(&(0x7f0000000200)={0x400, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x3a}, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/33, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40001, 0x80) r5 = syz_io_uring_complete(r3) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r5, 0x40047211, &(0x7f0000000340)=0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000003c0)={0x0, 0x1, 0x2, 0x5f2f}) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x0, 0x20040800) [ 1536.230607] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1544.971206] ieee802154 phy0 wpan0: encryption failed: -22 02:00:20 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 19) 02:00:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000140)="ee", 0x1, 0x800000}]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x8, 0x9}}, './file1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r3) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000280)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000003d00000008000300", @ANYRES32=r5, @ANYBLOB="08005d0500000000"], 0x24}}, 0x0) sendfile(r2, r4, &(0x7f0000000000)=0x5, 0x8000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) fcntl$setown(r8, 0x8, 0x0) sendfile(r7, r6, 0x0, 0x7ffffff9) 02:00:20 executing program 3: syz_io_uring_setup(0x4fb3, &(0x7f0000000000)={0x0, 0xb245, 0x2, 0x0, 0x3b3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r1 = syz_io_uring_setup(0x3638, &(0x7f0000000100)={0x0, 0xa79e, 0x1, 0x2, 0x1e4}, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240), &(0x7f00000001c0)) syz_io_uring_submit(0x0, r0, &(0x7f0000000200)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd=r1, 0x2e, {}, 0x1ff, 0x4}, 0x3) syz_io_uring_setup(0x6a21, &(0x7f0000000940), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000009c0), &(0x7f0000000a00)) 02:00:20 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)}], 0x1}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1544.990352] FAULT_INJECTION: forcing a failure. 02:00:20 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:00:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="c90d0000000000002e2f666f8d55dcf26eac205f7b48"]) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x2, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x40, 0x0, 0x9, 0x2}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x4004) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00000000000000fedf25010000000000000009410000004c00188000000073797a3100"/98], 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x80) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x44010) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x4}}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000400)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x0, 0x9, 0x80, 0x0, 0x10000000000, 0x10, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000002c0), 0x9}, 0x44c60, 0x8, 0x7ff, 0x0, 0x20, 0x0, 0x101, 0x0, 0xffff, 0x0, 0x769}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x80049370, &(0x7f0000000280)) [ 1544.990352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1544.993019] CPU: 0 PID: 7955 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1544.994433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1544.996132] Call Trace: [ 1544.996692] dump_stack+0x107/0x167 [ 1544.997454] should_fail.cold+0x5/0xa [ 1544.998261] _copy_from_user+0x2e/0x1b0 [ 1544.999133] __copy_msghdr_from_user+0x91/0x4b0 [ 1545.000100] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.001037] ? ieee802154_sock_release+0xb0/0xb0 [ 1545.002018] ? sock_sendmsg+0x55/0x190 [ 1545.002839] sendmsg_copy_msghdr+0xa1/0x160 [ 1545.003731] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.004568] ? __lock_acquire+0x1657/0x5b00 [ 1545.005492] ___sys_sendmsg+0xc6/0x170 [ 1545.006302] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.007255] ? __lockdep_reset_lock+0x180/0x180 [ 1545.008228] ? trace_hardirqs_on+0x5b/0x180 [ 1545.009148] ? find_held_lock+0x2c/0x110 [ 1545.010010] ? __might_fault+0xd3/0x180 [ 1545.010834] ? lock_downgrade+0x6d0/0x6d0 [ 1545.011698] ? io_schedule_timeout+0x140/0x140 [ 1545.012689] __sys_sendmmsg+0x195/0x470 [ 1545.013533] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.014436] ? lock_downgrade+0x6d0/0x6d0 [ 1545.015342] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.016368] ? wait_for_completion+0x270/0x270 [ 1545.017322] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.018281] ? vfs_write+0x354/0xa30 [ 1545.019061] ? fput_many+0x2f/0x1a0 [ 1545.019820] ? ksys_write+0x1a9/0x260 [ 1545.020642] __x64_sys_sendmmsg+0x99/0x100 [ 1545.021517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.022576] do_syscall_64+0x33/0x40 [ 1545.023345] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.024406] RIP: 0033:0x7f867efe2b19 [ 1545.025176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.028937] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.030482] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1545.031948] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.033418] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.034877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.036341] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1545.038062] hpet: Lost 2 RTC interrupts 02:00:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_io_uring_setup(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)) io_uring_enter(r2, 0x5c33, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000280)=0x2) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xe20, 0x8c, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) r4 = clone3(&(0x7f0000000200)={0x400, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x3a}, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/33, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40001, 0x80) r5 = syz_io_uring_complete(r3) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r5, 0x40047211, &(0x7f0000000340)=0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000003c0)={0x0, 0x1, 0x2, 0x5f2f}) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x0, 0x20040800) 02:00:20 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 17) 02:00:20 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:00:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x3, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x800) timerfd_settime(r0, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16=r1], 0xfdef) unshare(0x48020200) 02:00:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB]) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x6000c0, 0x3) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x34d1c0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0xa200, 0x8) write(r2, &(0x7f0000000240)="01", 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, @in_args={0x2}}, './file1\x00'}) acct(0x0) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x2270, &(0x7f00000000c0)=ANY=[@ANYBLOB="97000000000000000000000000000000000000000000000000000007000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e400"/155]) dup2(r1, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x64}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) [ 1545.252739] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.266003] FAULT_INJECTION: forcing a failure. [ 1545.266003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.268434] CPU: 1 PID: 7989 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1545.269826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.271494] Call Trace: [ 1545.272044] dump_stack+0x107/0x167 [ 1545.272817] should_fail.cold+0x5/0xa [ 1545.273616] _copy_from_user+0x2e/0x1b0 [ 1545.274446] __copy_msghdr_from_user+0x91/0x4b0 [ 1545.275474] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.276405] ? ieee802154_sock_release+0xb0/0xb0 [ 1545.277378] ? sock_sendmsg+0x55/0x190 [ 1545.278196] sendmsg_copy_msghdr+0xa1/0x160 [ 1545.279076] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.279880] ? __lock_acquire+0x1657/0x5b00 [ 1545.280806] ___sys_sendmsg+0xc6/0x170 [ 1545.281609] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.282549] ? __lockdep_reset_lock+0x180/0x180 [ 1545.283498] ? trace_hardirqs_on+0x5b/0x180 [ 1545.284420] ? find_held_lock+0x2c/0x110 [ 1545.285266] ? __might_fault+0xd3/0x180 [ 1545.286084] ? lock_downgrade+0x6d0/0x6d0 [ 1545.286934] ? io_schedule_timeout+0x140/0x140 [ 1545.287898] __sys_sendmmsg+0x195/0x470 [ 1545.288735] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.289616] ? lock_downgrade+0x6d0/0x6d0 [ 1545.290499] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.291571] ? wait_for_completion+0x270/0x270 [ 1545.292535] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.293475] ? vfs_write+0x354/0xa30 [ 1545.294245] ? fput_many+0x2f/0x1a0 [ 1545.294992] ? ksys_write+0x1a9/0x260 [ 1545.295798] __x64_sys_sendmmsg+0x99/0x100 [ 1545.296677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.297732] do_syscall_64+0x33/0x40 [ 1545.298495] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.299534] RIP: 0033:0x7f8542659b19 [ 1545.300294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.304009] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.305568] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1545.307100] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.308553] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.310000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.311441] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1545.331753] netlink: 776 bytes leftover after parsing attributes in process `syz-executor.5'. 02:00:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000003067000000000000000000000000000000000000006500000045c25ce4e2e34f488b163bb6fc3e5f06bb17f33055d6fdbc8bf79f73534d5543d61eeacd230e06fe3c1e5cb764831ea149341e4ee4e914033fcd38c698ef75d7338d01407d7dbb02cd7a687d487cf053de78cdda0fd05e647f6876f5cda3d290f028e24a53"], &(0x7f0000000240)=0x89) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4003000014000100000002000400840a0ae5760005000000", @ANYBLOB="1d0001"], 0x340}}, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)=r3) sendmsg$nl_generic(r1, &(0x7f0000000640)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000600)={&(0x7f00000002c0)={0x328, 0x2a, 0x10, 0x70bd27, 0x25dfdbfe, {0x15}, [@typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x26}}}, @generic="cf3e9542076ef99e27746e753266fc2238d8024ba5007066a9dfde70bd751be910360a0f26408adc100c7094724c4cf256297a4048fec796a886e991180c20ccfd8353d90ea57ea0b7ed34584792cd94fddaa37d83f28bbdb74cad4e3f", @typed={0xb, 0x6b, 0x0, 0x0, @str='filter\x00'}, @nested={0x20, 0x94, 0x0, 0x1, [@typed={0x8, 0x7b, 0x0, 0x0, @str=')\\-\x00'}, @typed={0x14, 0x6a, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, @generic, @typed={0x8, 0x4c, 0x0, 0x0, @ipv4=@private=0xa010101}, @nested={0x266, 0x4b, 0x0, 0x1, [@typed={0x30, 0x10, 0x0, 0x0, @binary="9776f1e37aa2182d0506ed9b135f833f2126e30fc91e86d9c43a2b0804602de0dbd13dc90f0d5d8e51053e8f"}, @generic="77273e2065c87686f433fa87cc8ccef95759f61fdadc081ca6ab04572bdd4c15b606439d19e49ee9959902da34b11233048494040c68d2c873ce999d5518aad79c91e7d533c0cbc2a362df9244a5e74faffb304ad07cbfa04eb99f7c40ce856c19f8f72780e3162f606916ff8b52e97480becb0d9e7093b00766e1190344f34a051b31e2dd8432e7fe4c726499371ae6b97ce655dc63272b117aafc9ab8c9ee5a88b0ddeaedfcbdfcb7cf67ce1f5ed1a0e666dff9eabdaa6b693506aa2062f18f4cf6ea4d2dd73c3e2c74bef122c9de1e297cdccefccd0", @typed={0x8, 0x66, 0x0, 0x0, @fd}, @generic="e625f35eb89724c72fd5e6e793777e0f760b1b1754c5f9eb18b89db19bb915356e7cc5ee8d6b39157bec37a60359c42f79ce9a1184b0a8aa44d1f39414f79dc1b068918a276f0bd8f081a81f8dc100e1c5dd3281622ddbb231b41d139e2cb2fd423f9371662ca665896eb306442480f83bafe91739e39fd598935ba4739b38f7aa7b193542c7d839f4db22ff4c81ce397fcac4f9639361df25ef52a59579556332d2b6b1fbdd898ddf8e1f56334846db232000139d557340106346d9e87f174844b0646e2ab8afa1ef17cf0b4e54564a17caee257ba6f380711970a078c2445aa35c6684", @typed={0x8, 0x7f, 0x0, 0x0, @pid=r3}, @generic="2272340bbd79a46ed7532cfe5e1a6b94758f1990", @generic="75ffe1ffd41e18dec3a2f7199d7b8d5674b760d18ebff5f22fea0083efd9e37b566b0910606227589f634bdcbb4cdde567ed60db96fe2973d1d0b8d2be698472e22cb1973d8d118fb421abbc0000fe7661305f"]}, @nested={0x4, 0x1f}]}, 0x328}, 0x1, 0x0, 0x0, 0x890}, 0x20000000) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0002}}}, 0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:00:20 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 20) 02:00:20 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1545.351631] ieee802154 phy0 wpan0: encryption failed: -22 02:00:20 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 1) socket$netlink(0x10, 0x3, 0x0) [ 1545.359382] FAULT_INJECTION: forcing a failure. [ 1545.359382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.361784] CPU: 1 PID: 7998 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1545.363152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.364850] Call Trace: [ 1545.365393] dump_stack+0x107/0x167 [ 1545.366148] should_fail.cold+0x5/0xa [ 1545.366935] _copy_from_user+0x2e/0x1b0 [ 1545.367754] __copy_msghdr_from_user+0x91/0x4b0 [ 1545.368768] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.369712] ? ieee802154_sock_release+0xb0/0xb0 [ 1545.370675] ? sock_sendmsg+0x55/0x190 [ 1545.371476] sendmsg_copy_msghdr+0xa1/0x160 [ 1545.372362] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.373161] ? __lock_acquire+0x1657/0x5b00 [ 1545.374054] ___sys_sendmsg+0xc6/0x170 [ 1545.374852] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.375782] ? __lockdep_reset_lock+0x180/0x180 [ 1545.376742] ? trace_hardirqs_on+0x5b/0x180 [ 1545.377627] ? find_held_lock+0x2c/0x110 [ 1545.378459] ? __might_fault+0xd3/0x180 [ 1545.379268] ? lock_downgrade+0x6d0/0x6d0 [ 1545.380107] ? io_schedule_timeout+0x140/0x140 [ 1545.381061] __sys_sendmmsg+0x195/0x470 [ 1545.381882] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.382758] ? lock_downgrade+0x6d0/0x6d0 [ 1545.383616] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.384707] ? wait_for_completion+0x270/0x270 [ 1545.385637] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.386584] ? vfs_write+0x354/0xa30 [ 1545.387348] ? fput_many+0x2f/0x1a0 [ 1545.388086] ? ksys_write+0x1a9/0x260 [ 1545.388886] __x64_sys_sendmmsg+0x99/0x100 [ 1545.389744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.390802] do_syscall_64+0x33/0x40 [ 1545.391557] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.392592] RIP: 0033:0x7f867efe2b19 [ 1545.393356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.394296] perf: interrupt took too long (5050 > 5026), lowering kernel.perf_event_max_sample_rate to 39000 [ 1545.397082] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.400690] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1545.402140] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.403579] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.405032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.406479] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1545.415963] netlink: 776 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1545.418574] FAULT_INJECTION: forcing a failure. [ 1545.418574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.421086] CPU: 1 PID: 8004 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1545.422482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.424190] Call Trace: [ 1545.424750] dump_stack+0x107/0x167 [ 1545.425491] should_fail.cold+0x5/0xa [ 1545.426271] _copy_from_user+0x2e/0x1b0 [ 1545.427085] __copy_msghdr_from_user+0x91/0x4b0 [ 1545.428030] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.428935] ? __lock_acquire+0xbb1/0x5b00 [ 1545.429806] sendmsg_copy_msghdr+0xa1/0x160 [ 1545.430677] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.431546] ? perf_trace_lock+0xac/0x490 [ 1545.432397] ? SOFTIRQ_verbose+0x10/0x10 [ 1545.433221] ? __lockdep_reset_lock+0x180/0x180 [ 1545.434159] ? perf_trace_lock+0xac/0x490 [ 1545.435008] ___sys_sendmsg+0xc6/0x170 [ 1545.435796] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.436737] ? __fget_files+0x26d/0x480 [ 1545.437538] ? lock_downgrade+0x6d0/0x6d0 [ 1545.438385] ? lock_downgrade+0x6d0/0x6d0 [ 1545.439227] ? __fget_files+0x296/0x480 [ 1545.440050] ? __fget_light+0xea/0x290 [ 1545.440838] __sys_sendmmsg+0x195/0x470 [ 1545.441627] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.442475] ? lock_downgrade+0x6d0/0x6d0 [ 1545.443313] ? ksys_write+0x12d/0x260 [ 1545.444093] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.445092] ? wait_for_completion+0x270/0x270 [ 1545.446016] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.447028] ? vfs_write+0x354/0xa30 [ 1545.447784] ? fput_many+0x2f/0x1a0 [ 1545.448532] ? ksys_write+0x1a9/0x260 [ 1545.449324] __x64_sys_sendmmsg+0x99/0x100 [ 1545.450181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.451217] do_syscall_64+0x33/0x40 [ 1545.451974] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.453020] RIP: 0033:0x7f8064db1b19 [ 1545.453774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.457506] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.459056] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1545.460525] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.461998] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.463500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1545.464960] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 02:00:20 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) bind$802154_raw(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0x2}}, 0x14) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:00:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1545.528455] ieee802154 phy0 wpan0: encryption failed: -22 02:00:21 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 18) 02:00:21 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 2) socket$netlink(0x10, 0x3, 0x0) [ 1545.644950] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.650642] FAULT_INJECTION: forcing a failure. [ 1545.650642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.653058] CPU: 0 PID: 8016 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1545.654472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.656176] Call Trace: [ 1545.656747] dump_stack+0x107/0x167 [ 1545.657524] should_fail.cold+0x5/0xa [ 1545.658335] _copy_from_user+0x2e/0x1b0 [ 1545.659178] __copy_msghdr_from_user+0x91/0x4b0 [ 1545.660158] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.661123] ? ieee802154_sock_release+0xb0/0xb0 [ 1545.662115] ? sock_sendmsg+0x55/0x190 [ 1545.662956] sendmsg_copy_msghdr+0xa1/0x160 [ 1545.663862] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.664695] ? __lock_acquire+0x1657/0x5b00 [ 1545.665651] ___sys_sendmsg+0xc6/0x170 [ 1545.666469] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.667424] ? __lockdep_reset_lock+0x180/0x180 [ 1545.668413] ? trace_hardirqs_on+0x5b/0x180 [ 1545.669337] ? find_held_lock+0x2c/0x110 [ 1545.670203] ? __might_fault+0xd3/0x180 [ 1545.671034] ? lock_downgrade+0x6d0/0x6d0 [ 1545.671904] ? io_schedule_timeout+0x140/0x140 [ 1545.672905] __sys_sendmmsg+0x195/0x470 [ 1545.673753] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.674657] ? lock_downgrade+0x6d0/0x6d0 [ 1545.675565] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.676590] ? wait_for_completion+0x270/0x270 [ 1545.677545] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.678518] ? vfs_write+0x354/0xa30 [ 1545.679309] ? fput_many+0x2f/0x1a0 [ 1545.680084] ? ksys_write+0x1a9/0x260 [ 1545.680939] __x64_sys_sendmmsg+0x99/0x100 [ 1545.681830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.682904] do_syscall_64+0x33/0x40 [ 1545.683681] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.684752] RIP: 0033:0x7f8542659b19 [ 1545.685537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.689344] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.690924] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1545.692409] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.693881] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.695363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1545.696844] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1545.698558] hpet: Lost 2 RTC interrupts [ 1545.707104] FAULT_INJECTION: forcing a failure. [ 1545.707104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.709558] CPU: 0 PID: 8017 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1545.710980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1545.712700] Call Trace: [ 1545.713257] dump_stack+0x107/0x167 [ 1545.714021] should_fail.cold+0x5/0xa [ 1545.714828] _copy_from_user+0x2e/0x1b0 [ 1545.715665] iovec_from_user+0x141/0x400 [ 1545.716555] __import_iovec+0x67/0x590 [ 1545.717365] ? __ia32_sys_shutdown+0x80/0x80 [ 1545.718316] import_iovec+0x83/0xb0 [ 1545.719097] sendmsg_copy_msghdr+0x131/0x160 [ 1545.720016] ? do_recvmmsg+0x6d0/0x6d0 [ 1545.720840] ? perf_trace_lock+0xac/0x490 [ 1545.721725] ? __lockdep_reset_lock+0x180/0x180 [ 1545.722692] ? perf_trace_lock+0xac/0x490 [ 1545.723570] ___sys_sendmsg+0xc6/0x170 [ 1545.724401] ? sendmsg_copy_msghdr+0x160/0x160 [ 1545.725372] ? __fget_files+0x26d/0x480 [ 1545.726210] ? lock_downgrade+0x6d0/0x6d0 [ 1545.727127] ? __fget_files+0x296/0x480 [ 1545.727995] ? __fget_light+0xea/0x290 [ 1545.728864] __sys_sendmmsg+0x195/0x470 [ 1545.729702] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1545.730598] ? lock_downgrade+0x6d0/0x6d0 [ 1545.731478] ? ksys_write+0x12d/0x260 [ 1545.732288] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1545.733312] ? wait_for_completion+0x270/0x270 [ 1545.734277] ? rcu_read_lock_any_held+0x75/0xa0 [ 1545.735233] ? vfs_write+0x354/0xa30 [ 1545.736016] ? fput_many+0x2f/0x1a0 [ 1545.736797] ? ksys_write+0x1a9/0x260 [ 1545.737625] __x64_sys_sendmmsg+0x99/0x100 [ 1545.738506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1545.739588] do_syscall_64+0x33/0x40 [ 1545.740392] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1545.741452] RIP: 0033:0x7f8064db1b19 [ 1545.742218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1545.745987] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1545.747535] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1545.748996] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1545.750437] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.751877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1545.753342] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1545.754982] hpet: Lost 1 RTC interrupts [ 1560.192428] kmemleak: 43 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:00:45 executing program 3: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="62746a1f002000"], &(0x7f00000000c0)=""/246, 0xf6) renameat2(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x6) lsetxattr$security_ima(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)=@md5={0x1, "9448359258ed3104ca743ea9dd803bb1"}, 0x11, 0x0) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "2cda35cee06a8e621bcff99acf335e65a4b4a2a9"}, 0x15, 0x1) r0 = syz_io_uring_setup(0x204, &(0x7f0000000280)={0x0, 0x0, 0x56}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000be8000/0x3000)=nil, &(0x7f0000000000), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=@random={'osx.', '$.).[$\'}\x00'}) 02:00:45 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) bind$802154_raw(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0x2}}, 0x14) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:00:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r2, 0x0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/30, 0x1e}], 0x1, &(0x7f0000000140)=""/199, 0xc7}, 0x0, 0x40000000, 0x0, {0x3}}, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffff8) 02:00:45 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 19) 02:00:45 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:00:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001f80)=[{{&(0x7f0000000000), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/140, 0x8c}, {&(0x7f0000000180)=""/76, 0x4c}, {&(0x7f0000000200)=""/214, 0xd6}, {&(0x7f0000000300)=""/81, 0x51}, {&(0x7f0000000380)=""/48, 0x30}], 0x5, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000000540), 0x6e, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/40, 0x28}, {&(0x7f0000000600)=""/6, 0x6}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000700)=""/129, 0x81}, {&(0x7f00000007c0)=""/217, 0xd9}, {&(0x7f00000008c0)=""/246, 0xf6}], 0x6, &(0x7f0000000a40)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000b00)=""/199, 0xc7}, {&(0x7f0000000c00)=""/244, 0xf4}, {&(0x7f0000000d00)=""/237, 0xed}, {&(0x7f0000000e00)=""/248, 0xf8}, {&(0x7f0000000f00)=""/112, 0x70}], 0x5, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000010c0), 0x6e, &(0x7f0000001580)=[{&(0x7f0000001140)=""/82, 0x52}, {&(0x7f00000011c0)=""/143, 0x8f}, {&(0x7f0000001280)=""/22, 0x16}, {&(0x7f00000012c0)=""/221, 0xdd}, {&(0x7f00000013c0)=""/155, 0x9b}, {&(0x7f0000001480)=""/248, 0xf8}], 0x6, &(0x7f0000001600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f00000016c0)=@abs, 0x6e, &(0x7f0000001900)=[{&(0x7f0000001740)=""/85, 0x55}, {&(0x7f00000017c0)=""/27, 0x1b}, {&(0x7f0000001800)=""/242, 0xf2}], 0x3, &(0x7f0000001940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001a40)=""/99, 0x63}, {&(0x7f0000001ac0)=""/124, 0x7c}, {&(0x7f0000001b40)=""/218, 0xda}], 0x3, &(0x7f0000001c80)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001dc0)=""/154, 0x9a}, {&(0x7f0000001e80)=""/93, 0x5d}, {&(0x7f0000001f00)=""/55, 0x37}], 0x3}}], 0x7, 0x0, &(0x7f0000002140)={0x77359400}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000002200)={'ip6tnl0\x00', &(0x7f0000002180)={'syztnl2\x00', 0x0, 0x4, 0x0, 0xa8, 0x9, 0x52, @dev={0xfe, 0x80, '\x00', 0x28}, @local, 0x80, 0x20, 0x9, 0x1000}}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000002240)={@private2, 0x6f, r2}) 02:00:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 3) socket$netlink(0x10, 0x3, 0x0) 02:00:45 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 21) [ 1569.843829] ieee802154 phy0 wpan0: encryption failed: -22 [ 1569.852974] FAULT_INJECTION: forcing a failure. [ 1569.852974] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.855792] CPU: 0 PID: 8042 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1569.856153] FAULT_INJECTION: forcing a failure. [ 1569.856153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.857177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.857187] Call Trace: [ 1569.857221] dump_stack+0x107/0x167 [ 1569.857255] should_fail.cold+0x5/0xa [ 1569.863261] ? __alloc_skb+0x6d/0x620 [ 1569.864042] should_failslab+0x5/0x20 [ 1569.864842] kmem_cache_alloc_node+0x55/0x370 [ 1569.865763] __alloc_skb+0x6d/0x620 [ 1569.866514] alloc_skb_with_frags+0x92/0x570 [ 1569.867405] ? perf_trace_lock+0xac/0x490 [ 1569.868272] sock_alloc_send_pskb+0x741/0x8a0 [ 1569.869252] ? sk_reset_timer+0xc0/0xc0 [ 1569.870063] ? lock_downgrade+0x6d0/0x6d0 [ 1569.870897] ? rwlock_bug.part.0+0x90/0x90 [ 1569.871868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1569.873078] ? __local_bh_enable_ip+0x9d/0x100 [ 1569.874124] raw_sendmsg+0x331/0x680 [ 1569.874972] ? dgram_connect+0x470/0x470 [ 1569.875890] ? __import_iovec+0x458/0x590 [ 1569.876858] ? ieee802154_sock_release+0xb0/0xb0 [ 1569.877937] sock_sendmsg+0x154/0x190 [ 1569.878809] ____sys_sendmsg+0x334/0x870 [ 1569.879748] ? kernel_sendmsg+0x50/0x50 [ 1569.880650] ? do_recvmmsg+0x6d0/0x6d0 [ 1569.881475] ? perf_trace_lock+0xac/0x490 [ 1569.882329] ? __lockdep_reset_lock+0x180/0x180 [ 1569.883258] ? perf_trace_lock+0xac/0x490 [ 1569.884109] ___sys_sendmsg+0xf3/0x170 [ 1569.884917] ? sendmsg_copy_msghdr+0x160/0x160 [ 1569.885850] ? lock_downgrade+0x6d0/0x6d0 [ 1569.886722] ? __fget_files+0x296/0x480 [ 1569.887553] ? __fget_light+0xea/0x290 [ 1569.888356] __sys_sendmmsg+0x195/0x470 [ 1569.889208] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1569.890182] ? lock_downgrade+0x6d0/0x6d0 [ 1569.891163] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1569.892259] ? wait_for_completion+0x270/0x270 [ 1569.893307] ? rcu_read_lock_any_held+0x75/0xa0 [ 1569.894352] ? vfs_write+0x354/0xa30 [ 1569.895205] ? fput_many+0x2f/0x1a0 [ 1569.896033] ? ksys_write+0x1a9/0x260 [ 1569.896943] __x64_sys_sendmmsg+0x99/0x100 [ 1569.897903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1569.899064] do_syscall_64+0x33/0x40 [ 1569.899908] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1569.901066] RIP: 0033:0x7f8064db1b19 [ 1569.901816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.905516] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1569.907040] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1569.908465] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1569.909892] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.911320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.912754] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1569.914243] CPU: 1 PID: 8036 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1569.914472] hpet: Lost 2 RTC interrupts [ 1569.915735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.915750] Call Trace: [ 1569.918855] dump_stack+0x107/0x167 [ 1569.919618] should_fail.cold+0x5/0xa [ 1569.920420] _copy_from_user+0x2e/0x1b0 [ 1569.921266] __copy_msghdr_from_user+0x91/0x4b0 [ 1569.922216] ? __ia32_sys_shutdown+0x80/0x80 [ 1569.923133] ? ieee802154_sock_release+0xb0/0xb0 [ 1569.924120] ? sock_sendmsg+0x55/0x190 [ 1569.924955] sendmsg_copy_msghdr+0xa1/0x160 [ 1569.925846] ? do_recvmmsg+0x6d0/0x6d0 [ 1569.926653] ? __lock_acquire+0x1657/0x5b00 [ 1569.927571] ___sys_sendmsg+0xc6/0x170 [ 1569.928378] ? sendmsg_copy_msghdr+0x160/0x160 [ 1569.929327] ? __lockdep_reset_lock+0x180/0x180 [ 1569.930282] ? trace_hardirqs_on+0x5b/0x180 [ 1569.931181] ? find_held_lock+0x2c/0x110 [ 1569.932103] ? __might_fault+0xd3/0x180 [ 1569.932929] ? lock_downgrade+0x6d0/0x6d0 [ 1569.933784] ? io_schedule_timeout+0x140/0x140 [ 1569.934750] __sys_sendmmsg+0x195/0x470 [ 1569.935577] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1569.936459] ? lock_downgrade+0x6d0/0x6d0 [ 1569.937353] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1569.938344] ? wait_for_completion+0x270/0x270 [ 1569.939288] ? rcu_read_lock_any_held+0x75/0xa0 [ 1569.940233] ? vfs_write+0x354/0xa30 [ 1569.941025] ? fput_many+0x2f/0x1a0 [ 1569.941773] ? ksys_write+0x1a9/0x260 [ 1569.942586] __x64_sys_sendmmsg+0x99/0x100 [ 1569.943450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1569.944517] do_syscall_64+0x33/0x40 [ 1569.945301] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1569.946354] RIP: 0033:0x7f8542659b19 [ 1569.947114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.950912] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1569.952494] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1569.953951] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1569.955403] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.956857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1569.958310] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1569.970233] ieee802154 phy0 wpan0: encryption failed: -22 [ 1569.973657] FAULT_INJECTION: forcing a failure. [ 1569.973657] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.976089] CPU: 0 PID: 8046 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1569.977528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.979545] Call Trace: [ 1569.980288] dump_stack+0x107/0x167 [ 1569.981181] should_fail.cold+0x5/0xa [ 1569.982250] _copy_from_user+0x2e/0x1b0 [ 1569.983181] __copy_msghdr_from_user+0x91/0x4b0 [ 1569.984461] ? __ia32_sys_shutdown+0x80/0x80 [ 1569.985492] ? ieee802154_sock_release+0xb0/0xb0 [ 1569.986807] ? sock_sendmsg+0x55/0x190 [ 1569.987717] sendmsg_copy_msghdr+0xa1/0x160 [ 1569.988918] ? do_recvmmsg+0x6d0/0x6d0 [ 1569.989823] ? __lock_acquire+0x1657/0x5b00 [ 1569.991039] ___sys_sendmsg+0xc6/0x170 [ 1569.991939] ? sendmsg_copy_msghdr+0x160/0x160 [ 1569.993220] ? __lockdep_reset_lock+0x180/0x180 [ 1569.994285] ? trace_hardirqs_on+0x5b/0x180 [ 1569.995489] ? find_held_lock+0x2c/0x110 [ 1569.996444] ? __might_fault+0xd3/0x180 [ 1569.997435] ? lock_downgrade+0x6d0/0x6d0 [ 1569.998383] ? io_schedule_timeout+0x140/0x140 [ 1569.999467] __sys_sendmmsg+0x195/0x470 [ 1570.000386] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1570.001388] ? lock_downgrade+0x6d0/0x6d0 [ 1570.002374] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.003475] ? wait_for_completion+0x270/0x270 [ 1570.004515] ? rcu_read_lock_any_held+0x75/0xa0 [ 1570.005581] ? vfs_write+0x354/0xa30 [ 1570.006439] ? fput_many+0x2f/0x1a0 [ 1570.007273] ? ksys_write+0x1a9/0x260 [ 1570.008167] __x64_sys_sendmmsg+0x99/0x100 [ 1570.009140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.010309] do_syscall_64+0x33/0x40 [ 1570.011156] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1570.012320] RIP: 0033:0x7f867efe2b19 [ 1570.013191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.016971] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1570.018503] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1570.019926] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1570.021364] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.022784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1570.023465] ieee802154 phy0 wpan0: encryption failed: -22 [ 1570.024215] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1570.024556] hpet: Lost 2 RTC interrupts 02:00:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 4) socket$netlink(0x10, 0x3, 0x0) 02:00:45 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3e}}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r1 = fork() setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r1, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) move_pages(r1, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0) 02:00:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x1f, 0x6, 0x2, 0x0, 0x7, 0x20202, 0xf, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x100000001, 0x7}, 0x22, 0x8, 0x2, 0x3, 0x4, 0x80, 0x2, 0x0, 0x8, 0x0, 0x77e}, 0xffffffffffffffff, 0x0, r1, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) [ 1570.184209] FAULT_INJECTION: forcing a failure. [ 1570.184209] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.186736] CPU: 1 PID: 8059 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1570.188149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.189872] Call Trace: [ 1570.190424] dump_stack+0x107/0x167 [ 1570.191182] should_fail.cold+0x5/0xa [ 1570.191972] ? create_object.isra.0+0x3a/0xa20 [ 1570.192934] should_failslab+0x5/0x20 [ 1570.193720] kmem_cache_alloc+0x5b/0x360 [ 1570.194564] create_object.isra.0+0x3a/0xa20 [ 1570.195476] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1570.196525] kmem_cache_alloc_node+0x169/0x370 [ 1570.197552] __alloc_skb+0x6d/0x620 [ 1570.198300] alloc_skb_with_frags+0x92/0x570 [ 1570.199207] ? perf_trace_lock+0xac/0x490 [ 1570.200069] sock_alloc_send_pskb+0x741/0x8a0 [ 1570.201040] ? sk_reset_timer+0xc0/0xc0 [ 1570.201850] ? lock_downgrade+0x6d0/0x6d0 [ 1570.202694] ? rwlock_bug.part.0+0x90/0x90 [ 1570.203558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.204626] ? __local_bh_enable_ip+0x9d/0x100 [ 1570.205572] raw_sendmsg+0x331/0x680 [ 1570.206344] ? dgram_connect+0x470/0x470 [ 1570.207177] ? __import_iovec+0x458/0x590 [ 1570.208028] ? ieee802154_sock_release+0xb0/0xb0 [ 1570.209022] sock_sendmsg+0x154/0x190 [ 1570.209801] ____sys_sendmsg+0x334/0x870 [ 1570.210637] ? kernel_sendmsg+0x50/0x50 [ 1570.211443] ? do_recvmmsg+0x6d0/0x6d0 [ 1570.212242] ? perf_trace_lock+0xac/0x490 [ 1570.213155] ? __lockdep_reset_lock+0x180/0x180 [ 1570.214103] ? perf_trace_lock+0xac/0x490 [ 1570.214954] ___sys_sendmsg+0xf3/0x170 [ 1570.215748] ? sendmsg_copy_msghdr+0x160/0x160 [ 1570.216706] ? lock_downgrade+0x6d0/0x6d0 [ 1570.217567] ? lock_downgrade+0x6d0/0x6d0 [ 1570.218415] ? __fget_files+0x296/0x480 [ 1570.219241] ? __fget_light+0xea/0x290 [ 1570.220047] __sys_sendmmsg+0x195/0x470 [ 1570.220876] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1570.221753] ? lock_downgrade+0x6d0/0x6d0 [ 1570.222617] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.223604] ? wait_for_completion+0x270/0x270 [ 1570.224543] ? rcu_read_lock_any_held+0x75/0xa0 [ 1570.225496] ? vfs_write+0x354/0xa30 [ 1570.226265] ? fput_many+0x2f/0x1a0 [ 1570.227007] ? ksys_write+0x1a9/0x260 [ 1570.227800] __x64_sys_sendmmsg+0x99/0x100 [ 1570.228723] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.229773] do_syscall_64+0x33/0x40 [ 1570.230535] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1570.231586] RIP: 0033:0x7f8064db1b19 [ 1570.232344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.236113] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1570.237685] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1570.239142] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1570.240598] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.242080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1570.243542] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 02:00:45 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 22) 02:00:45 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:00:45 executing program 2: r0 = clone3(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfffffffffffffffb) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000002c0)=0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clone3(&(0x7f0000001780)={0x1020800, &(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440), {0x3d}, &(0x7f0000004e40)=""/199, 0xc7, &(0x7f00000016c0)=""/180, &(0x7f0000000480)=[r3, r3, r0, r0, r3], 0x5}, 0x58) getresuid(&(0x7f0000000540), &(0x7f0000001800)=0x0, &(0x7f0000001840)) newfstatat(0xffffffffffffff9c, &(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) recvmmsg$unix(r1, &(0x7f0000004c00)=[{{&(0x7f0000001940), 0x6e, &(0x7f0000001b80)=[{&(0x7f00000019c0)=""/154, 0x9a}, {&(0x7f0000001a80)=""/154, 0x9a}, {&(0x7f0000001b40)=""/57, 0x39}], 0x3}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001bc0)=""/237, 0xed}, {&(0x7f0000001cc0)=""/86, 0x56}, {&(0x7f0000001d40)=""/130, 0x82}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x4, &(0x7f0000002e40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002f00), 0x6e, &(0x7f0000003280)=[{&(0x7f0000002f80)=""/22, 0x16}, {&(0x7f0000002fc0)=""/106, 0x6a}, {&(0x7f0000003040)=""/196, 0xc4}, {&(0x7f0000003140)=""/115, 0x73}, {&(0x7f00000031c0)=""/164, 0xa4}], 0x5, &(0x7f0000003300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x140}}, {{&(0x7f0000003440)=@abs, 0x6e, &(0x7f00000037c0)=[{&(0x7f00000034c0)=""/92, 0x5c}, {&(0x7f0000003540)=""/34, 0x22}, {&(0x7f0000003580)=""/111, 0x6f}, {&(0x7f0000003600)=""/159, 0x9f}, {&(0x7f00000036c0)=""/253, 0xfd}], 0x5, &(0x7f0000003840)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000003900)=@abs, 0x6e, &(0x7f0000004b80)=[{&(0x7f0000003980)=""/85, 0x55}, {&(0x7f0000003a00)=""/102, 0x66}, {&(0x7f0000003a80)=""/165, 0xa5}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/4, 0x4}], 0x5}}], 0x5, 0x32070, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="822f58187dbb8a417e0b40285ab41afc914a62389ee36d4e11181662e0f2d72e101c8da8fda8a31c0e611f1288ee84e4", 0x30}, {&(0x7f0000000100)="10efd7cf6c2e65f720544f1d96650062558dbb309af4afe59a0849ada12d2946c71835db5cb85eb84ef29d8feeae465c297b7a86ad87446dd2e1215ada374317d8d8c9f97ce0ccb482211983eb41e2f824e3949457492fdbc8a6b1ff95e97815287353638e2d26290e31c074f78105285e63075e1510b673f9a19d0e5e9f6b0472219ae1d3cf9ba394d9f2ff4feb9e6595111458a6eefcdf354aaa2b95689d46d69f0236f3f38b57bc79ffdec71340435dfcfb23739d0a2cab75208d0661f98d5e6148f3e9016174", 0xc8}, {&(0x7f0000000200)="39468dabb65a6592d4712226c5ddd5bf90701fcbcbd7d8413e0cc138460a63620ea9e8382e", 0x25}, {&(0x7f00000005c0)="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", 0x1000}], 0x4, &(0x7f0000004d40)=ANY=[@ANYBLOB="5c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x40040e0}, 0x0) sendmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}], 0x20}, 0x0) 02:00:45 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 20) [ 1570.318581] ieee802154 phy0 wpan0: encryption failed: -22 [ 1570.327458] FAULT_INJECTION: forcing a failure. [ 1570.327458] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1570.330284] CPU: 0 PID: 8071 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1570.331655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.333335] Call Trace: [ 1570.333883] dump_stack+0x107/0x167 [ 1570.334634] should_fail.cold+0x5/0xa [ 1570.335429] __alloc_pages_nodemask+0x182/0x680 [ 1570.336379] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1570.337432] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1570.338705] ? perf_trace_lock+0xac/0x490 [ 1570.339564] alloc_pages_vma+0xbb/0x410 [ 1570.340387] wp_page_copy+0xee7/0x1f00 [ 1570.341243] ? print_bad_pte+0x5a0/0x5a0 [ 1570.342071] ? lock_downgrade+0x6d0/0x6d0 [ 1570.342905] ? vm_normal_page+0x162/0x2e0 [ 1570.343755] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1570.344860] do_wp_page+0x27b/0x1390 [ 1570.345639] handle_mm_fault+0x1ce6/0x3520 [ 1570.346514] ? __schedule+0x850/0x1e90 [ 1570.347304] ? __pmd_alloc+0x5e0/0x5e0 [ 1570.348121] ? vmacache_find+0x55/0x2a0 [ 1570.348996] do_user_addr_fault+0x56e/0xc00 [ 1570.349906] exc_page_fault+0xa2/0x1a0 [ 1570.350799] asm_exc_page_fault+0x1e/0x30 [ 1570.351736] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1570.352866] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 b1 02 1f 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 92 02 1f 02 66 90 48 bb f9 ef ff ff ff 7f [ 1570.356976] RSP: 0018:ffff888049a6fcf0 EFLAGS: 00050293 [ 1570.358176] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020005038 [ 1570.359778] RDX: 0000000000040000 RSI: ffffffff830c9222 RDI: ffff88800b713ba0 [ 1570.361397] RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000 [ 1570.362998] R10: 0000000000000001 R11: 0000000000000001 R12: 000000000000000c [ 1570.364601] R13: 0000000020005000 R14: 0000000000000400 R15: 00000000000003ff [ 1570.366246] ? __sys_sendmmsg+0x1c2/0x470 [ 1570.367195] __sys_sendmmsg+0x1cf/0x470 [ 1570.368112] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1570.369107] ? lock_downgrade+0x6d0/0x6d0 [ 1570.370092] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.371192] ? wait_for_completion+0x270/0x270 [ 1570.372230] ? rcu_read_lock_any_held+0x75/0xa0 [ 1570.373288] ? vfs_write+0x354/0xa30 [ 1570.374142] ? fput_many+0x2f/0x1a0 [ 1570.374970] ? ksys_write+0x1a9/0x260 [ 1570.375862] __x64_sys_sendmmsg+0x99/0x100 [ 1570.376841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.378003] do_syscall_64+0x33/0x40 [ 1570.378849] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1570.380004] RIP: 0033:0x7f867efe2b19 [ 1570.380853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.384974] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1570.386690] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1570.388296] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1570.389912] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.391524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1570.393135] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1570.395040] hpet: Lost 3 RTC interrupts [ 1570.400388] ieee802154 phy0 wpan0: encryption failed: -22 [ 1570.405277] FAULT_INJECTION: forcing a failure. [ 1570.405277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1570.407876] CPU: 1 PID: 8073 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1570.409298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.410994] Call Trace: [ 1570.411543] dump_stack+0x107/0x167 [ 1570.412312] should_fail.cold+0x5/0xa [ 1570.413124] _copy_from_user+0x2e/0x1b0 [ 1570.413957] __copy_msghdr_from_user+0x91/0x4b0 [ 1570.414918] ? __ia32_sys_shutdown+0x80/0x80 [ 1570.415839] ? ieee802154_sock_release+0xb0/0xb0 [ 1570.416893] ? sock_sendmsg+0x55/0x190 [ 1570.417716] sendmsg_copy_msghdr+0xa1/0x160 [ 1570.418601] ? do_recvmmsg+0x6d0/0x6d0 [ 1570.419415] ? __lock_acquire+0x1657/0x5b00 [ 1570.420336] ___sys_sendmsg+0xc6/0x170 [ 1570.421152] ? sendmsg_copy_msghdr+0x160/0x160 [ 1570.422101] ? __lockdep_reset_lock+0x180/0x180 [ 1570.423062] ? trace_hardirqs_on+0x5b/0x180 [ 1570.423970] ? find_held_lock+0x2c/0x110 [ 1570.424828] ? __might_fault+0xd3/0x180 [ 1570.425643] ? lock_downgrade+0x6d0/0x6d0 [ 1570.426504] ? io_schedule_timeout+0x140/0x140 [ 1570.427497] __sys_sendmmsg+0x195/0x470 [ 1570.428322] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1570.429233] ? lock_downgrade+0x6d0/0x6d0 [ 1570.430132] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.431133] ? wait_for_completion+0x270/0x270 [ 1570.432137] ? rcu_read_lock_any_held+0x75/0xa0 [ 1570.433106] ? vfs_write+0x354/0xa30 [ 1570.433888] ? fput_many+0x2f/0x1a0 [ 1570.434643] ? ksys_write+0x1a9/0x260 [ 1570.435457] __x64_sys_sendmmsg+0x99/0x100 [ 1570.436355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.437454] do_syscall_64+0x33/0x40 [ 1570.438226] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1570.439279] RIP: 0033:0x7f8542659b19 [ 1570.440045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.443789] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1570.445368] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1570.446826] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1570.448325] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.449794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1570.451251] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:00:46 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) dup2(r1, 0xffffffffffffffff) r3 = syz_open_dev$vcsu(&(0x7f0000000180), 0x0, 0x434000) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000001c0)={0x3, 0x9, 0x100, 0x80, 0x2}) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x2, 0x3, 0x3f, 0x0, 0x7, 0x8000, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000200), 0x1}, 0x880a, 0x993, 0x10000, 0x9, 0x101, 0x0, 0x1, 0x0, 0x6fe3, 0x0, 0x9}, r0, 0x3, 0xffffffffffffffff, 0x3) r4 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x41f, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 02:00:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="03000000fd00000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="d67ea344eb897bc347659102b541f8f8d31c9053334c2f4500000000"]) chdir(0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat(r0, &(0x7f0000000080)='./file1\x00', 0x1, 0x180) [ 1570.481960] ieee802154 phy0 wpan0: encryption failed: -22 [ 1584.974354] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:07 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 5) socket$netlink(0x10, 0x3, 0x0) 02:01:07 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:07 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:07 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x14) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) bind$802154_raw(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0x2}}, 0x14) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:01:07 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 23) 02:01:07 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 21) 02:01:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:01:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000094a2f3ec9f464fe1f2f9cdf3ee1b11d6d9f9b1dda291b92504b13c25113fb4"], 0x68) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [0x9, 0x5, 0x0, 0x0, 0x8000]}, &(0x7f0000000140)=0x78) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e23, @loopback}, 0x6, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)='veth0_vlan\x00', 0x6, 0x0, 0x869d}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)="3f7623c0fd5713364c901d3cbce75250", 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}}, 0x0, 0x0, 0x4d, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) sendto$inet(r1, &(0x7f0000000240)="919526110e3638e9515d0c3b930b5dcdc5f8f1a810c4c48b59d4832d88fb55102193c97ade2bd9f5153ab2392bbbd1cd9e516fce0b89464eccdaa25d3ec6b47d02d6c8c75934bdf8534093e9cb480b77e0e70ca5d0d1edeeacb109717f14caba268af9e8194396f9592bdcc92415ede226e6f078cb4ddcf166edbe7b6138dbc667be30aceb6354cd11e08156f7097f8c1380ead08211cfff5aaadb2675d25ee71bd0f6e1f146a98874", 0xa9, 0x40, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000440)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}, 0xc) [ 1592.311562] ieee802154 phy0 wpan0: encryption failed: -22 [ 1592.322003] FAULT_INJECTION: forcing a failure. [ 1592.322003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1592.324831] CPU: 1 PID: 8095 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1592.326308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1592.327989] Call Trace: [ 1592.328627] dump_stack+0x107/0x167 [ 1592.329462] should_fail.cold+0x5/0xa [ 1592.330380] _copy_from_user+0x2e/0x1b0 [ 1592.331199] __copy_msghdr_from_user+0x91/0x4b0 [ 1592.332297] ? __ia32_sys_shutdown+0x80/0x80 [ 1592.333226] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1592.334324] ? perf_trace_lock+0xac/0x490 [ 1592.335172] sendmsg_copy_msghdr+0xa1/0x160 [ 1592.336034] ? do_recvmmsg+0x6d0/0x6d0 [ 1592.336823] ? handle_mm_fault+0xa05/0x3520 [ 1592.337702] ? find_held_lock+0x2c/0x110 [ 1592.338663] ___sys_sendmsg+0xc6/0x170 [ 1592.339449] ? sendmsg_copy_msghdr+0x160/0x160 [ 1592.340378] ? vmacache_find+0x55/0x2a0 [ 1592.341234] ? do_user_addr_fault+0x5b0/0xc00 [ 1592.342162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1592.343233] ? exc_page_fault+0xca/0x1a0 [ 1592.344054] ? trace_hardirqs_on+0x5b/0x180 [ 1592.344946] ? exc_page_fault+0xca/0x1a0 [ 1592.345772] ? asm_exc_page_fault+0x1e/0x30 [ 1592.346678] __sys_sendmmsg+0x195/0x470 [ 1592.347491] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1592.348377] ? lock_downgrade+0x6d0/0x6d0 [ 1592.349240] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1592.350235] ? wait_for_completion+0x270/0x270 [ 1592.351171] ? rcu_read_lock_any_held+0x75/0xa0 [ 1592.352113] ? vfs_write+0x354/0xa30 [ 1592.352880] ? fput_many+0x2f/0x1a0 [ 1592.353630] ? ksys_write+0x1a9/0x260 [ 1592.354511] __x64_sys_sendmmsg+0x99/0x100 [ 1592.355365] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1592.356406] do_syscall_64+0x33/0x40 [ 1592.357174] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1592.358214] RIP: 0033:0x7f867efe2b19 [ 1592.358970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1592.362689] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1592.364227] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1592.365688] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1592.367124] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.368564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1592.370078] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1592.400147] ieee802154 phy0 wpan0: encryption failed: -22 [ 1592.411328] ieee802154 phy0 wpan0: encryption failed: -22 [ 1592.417028] FAULT_INJECTION: forcing a failure. [ 1592.417028] name failslab, interval 1, probability 0, space 0, times 0 [ 1592.419820] CPU: 0 PID: 8107 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1592.421382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1592.423268] Call Trace: [ 1592.423886] dump_stack+0x107/0x167 [ 1592.424733] should_fail.cold+0x5/0xa [ 1592.425649] should_failslab+0x5/0x20 [ 1592.426528] __kmalloc_node_track_caller+0x74/0x3f0 [ 1592.427665] ? alloc_skb_with_frags+0x92/0x570 [ 1592.428731] __alloc_skb+0xb1/0x620 [ 1592.429598] alloc_skb_with_frags+0x92/0x570 [ 1592.430603] ? perf_trace_lock+0xac/0x490 [ 1592.431591] sock_alloc_send_pskb+0x741/0x8a0 [ 1592.432696] ? sk_reset_timer+0xc0/0xc0 [ 1592.433624] ? lock_downgrade+0x6d0/0x6d0 [ 1592.433901] FAULT_INJECTION: forcing a failure. [ 1592.433901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1592.434574] ? rwlock_bug.part.0+0x90/0x90 [ 1592.434620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1592.434647] ? __local_bh_enable_ip+0x9d/0x100 [ 1592.440120] raw_sendmsg+0x331/0x680 [ 1592.440985] ? dgram_connect+0x470/0x470 [ 1592.441914] ? __import_iovec+0x458/0x590 [ 1592.442886] ? ieee802154_sock_release+0xb0/0xb0 [ 1592.443990] sock_sendmsg+0x154/0x190 [ 1592.444872] ____sys_sendmsg+0x334/0x870 [ 1592.445840] ? kernel_sendmsg+0x50/0x50 [ 1592.446746] ? do_recvmmsg+0x6d0/0x6d0 [ 1592.447639] ? perf_trace_lock+0xac/0x490 [ 1592.448605] ? __lockdep_reset_lock+0x180/0x180 [ 1592.449674] ? perf_trace_lock+0xac/0x490 [ 1592.450638] ___sys_sendmsg+0xf3/0x170 [ 1592.451550] ? sendmsg_copy_msghdr+0x160/0x160 [ 1592.452607] ? lock_downgrade+0x6d0/0x6d0 [ 1592.453607] ? __fget_files+0x296/0x480 [ 1592.454545] ? __fget_light+0xea/0x290 [ 1592.455453] __sys_sendmmsg+0x195/0x470 [ 1592.456375] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1592.457379] ? lock_downgrade+0x6d0/0x6d0 [ 1592.458368] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1592.459480] ? wait_for_completion+0x270/0x270 [ 1592.460529] ? rcu_read_lock_any_held+0x75/0xa0 [ 1592.461603] ? vfs_write+0x354/0xa30 [ 1592.462460] ? fput_many+0x2f/0x1a0 [ 1592.463301] ? ksys_write+0x1a9/0x260 [ 1592.464201] __x64_sys_sendmmsg+0x99/0x100 [ 1592.465186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1592.466357] do_syscall_64+0x33/0x40 [ 1592.467208] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1592.468369] RIP: 0033:0x7f8064db1b19 [ 1592.469227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1592.473376] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1592.475100] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1592.476715] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1592.478343] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.479953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1592.481580] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1592.483258] CPU: 1 PID: 8106 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1592.483582] hpet: Lost 3 RTC interrupts [ 1592.484752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1592.484768] Call Trace: [ 1592.487985] dump_stack+0x107/0x167 [ 1592.488746] should_fail.cold+0x5/0xa [ 1592.489556] _copy_from_user+0x2e/0x1b0 [ 1592.490391] __copy_msghdr_from_user+0x91/0x4b0 [ 1592.491341] ? __ia32_sys_shutdown+0x80/0x80 [ 1592.492256] ? ieee802154_sock_release+0xb0/0xb0 [ 1592.493249] ? sock_sendmsg+0x55/0x190 [ 1592.494065] sendmsg_copy_msghdr+0xa1/0x160 [ 1592.494952] ? do_recvmmsg+0x6d0/0x6d0 [ 1592.495761] ? __lock_acquire+0x1657/0x5b00 [ 1592.496668] ___sys_sendmsg+0xc6/0x170 02:01:08 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1592.497477] ? sendmsg_copy_msghdr+0x160/0x160 [ 1592.498584] ? __lockdep_reset_lock+0x180/0x180 [ 1592.499534] ? trace_hardirqs_on+0x5b/0x180 [ 1592.500442] ? find_held_lock+0x2c/0x110 [ 1592.501300] ? __might_fault+0xd3/0x180 [ 1592.502114] ? lock_downgrade+0x6d0/0x6d0 [ 1592.502964] ? io_schedule_timeout+0x140/0x140 [ 1592.503930] __sys_sendmmsg+0x195/0x470 [ 1592.504755] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1592.505645] ? lock_downgrade+0x6d0/0x6d0 [ 1592.506527] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1592.507515] ? wait_for_completion+0x270/0x270 02:01:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x4, 0x1, 0x9, 0x100, 0x72, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @private2, 0x7800, 0x20, 0x8, 0x9}}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x3, 0x0}, @rand_addr=0x64010102, r2}, 0xc) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) [ 1592.508452] ? rcu_read_lock_any_held+0x75/0xa0 [ 1592.509485] ? vfs_write+0x354/0xa30 [ 1592.510320] ? fput_many+0x2f/0x1a0 [ 1592.511072] ? ksys_write+0x1a9/0x260 [ 1592.511873] __x64_sys_sendmmsg+0x99/0x100 [ 1592.512738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1592.513800] do_syscall_64+0x33/0x40 [ 1592.514558] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1592.515596] RIP: 0033:0x7f8542659b19 [ 1592.516351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1592.520092] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1592.521640] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1592.523086] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1592.524529] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.526075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1592.527520] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:01:08 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 24) 02:01:08 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1592.650462] ieee802154 phy0 wpan0: encryption failed: -22 [ 1592.660127] FAULT_INJECTION: forcing a failure. [ 1592.660127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1592.662720] CPU: 1 PID: 8116 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1592.664128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1592.665938] Call Trace: [ 1592.666567] dump_stack+0x107/0x167 [ 1592.667350] should_fail.cold+0x5/0xa [ 1592.668166] _copy_from_user+0x2e/0x1b0 [ 1592.669015] __copy_msghdr_from_user+0x91/0x4b0 [ 1592.669994] ? __ia32_sys_shutdown+0x80/0x80 [ 1592.670918] ? ieee802154_sock_release+0xb0/0xb0 [ 1592.671937] ? sock_sendmsg+0x55/0x190 [ 1592.672756] sendmsg_copy_msghdr+0xa1/0x160 [ 1592.673673] ? do_recvmmsg+0x6d0/0x6d0 [ 1592.674504] ? __lock_acquire+0x1657/0x5b00 [ 1592.675487] ___sys_sendmsg+0xc6/0x170 [ 1592.676310] ? sendmsg_copy_msghdr+0x160/0x160 [ 1592.677301] ? vmacache_find+0x55/0x2a0 [ 1592.678179] ? __lockdep_reset_lock+0x180/0x180 [ 1592.679173] ? find_held_lock+0x2c/0x110 [ 1592.680058] ? __might_fault+0xd3/0x180 [ 1592.680913] ? lock_downgrade+0x6d0/0x6d0 [ 1592.681841] ? asm_exc_page_fault+0x1e/0x30 [ 1592.682843] __sys_sendmmsg+0x195/0x470 [ 1592.683702] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1592.684632] ? lock_downgrade+0x6d0/0x6d0 [ 1592.685592] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1592.686620] ? wait_for_completion+0x270/0x270 [ 1592.687573] ? rcu_read_lock_any_held+0x75/0xa0 [ 1592.688528] ? vfs_write+0x354/0xa30 [ 1592.689321] ? fput_many+0x2f/0x1a0 [ 1592.690086] ? ksys_write+0x1a9/0x260 [ 1592.690898] __x64_sys_sendmmsg+0x99/0x100 [ 1592.691783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1592.692868] do_syscall_64+0x33/0x40 [ 1592.693684] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1592.694786] RIP: 0033:0x7f867efe2b19 [ 1592.695568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1592.699512] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1592.701121] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1592.702638] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1592.704125] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.705625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1592.707141] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:01:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0x6, 0xffffffff) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000140), &(0x7f00000000c0)=0x4) 02:01:08 executing program 4: munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffa, 0x1}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000200)={@multicast1, @loopback, 0x0, 0x2, [@remote, @dev={0xac, 0x14, 0x14, 0x43}]}, 0x18) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$HIDIOCGDEVINFO(0xffffffffffffffff, 0x801c4803, &(0x7f0000000240)=""/4096) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) fork() mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) fcntl$setstatus(r2, 0x4, 0x40000) 02:01:08 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:08 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1606.068866] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:30 executing program 4: getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0xffffffffffffff69}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)=0xcfa) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)) ftruncate(r0, 0x101) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) write$P9_RREAD(r2, &(0x7f0000000140)={0x87, 0x75, 0x1, {0x7c, "11a908327810ce654924e11ed25b2df284f2dc2aeb481c2aa5c9b4bbe6ea7e57211d0636204fc1dd93cb2d20fbcdb6b372268bb94dcd41e94d0130e7f27a4da68111f3a96474ddee94919ffb4dfd52fe00e98b6f9f1bd5fb2bfd3b4faf5ab2f5e8113ce704430f85010e560532c3673bd9a3f3316ee5d94fe22e94f7"}}, 0x87) 02:01:30 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:30 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$SHM_LOCK(0x0, 0xb) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 02:01:30 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 25) 02:01:30 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 22) 02:01:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000280)=0x14) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000140)={0x7e, {{0x2, 0x4e22, @private=0xa010100}}, {{0x2, 0x4e20, @remote}}}, 0x108) 02:01:30 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:30 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 6) socket$netlink(0x10, 0x3, 0x0) [ 1615.012239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1615.024866] FAULT_INJECTION: forcing a failure. [ 1615.024866] name failslab, interval 1, probability 0, space 0, times 0 [ 1615.027323] CPU: 1 PID: 8155 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1615.028740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1615.030459] Call Trace: [ 1615.031001] FAULT_INJECTION: forcing a failure. [ 1615.031001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1615.031041] dump_stack+0x107/0x167 [ 1615.034144] should_fail.cold+0x5/0xa [ 1615.034925] ? create_object.isra.0+0x3a/0xa20 [ 1615.035860] should_failslab+0x5/0x20 [ 1615.036645] kmem_cache_alloc+0x5b/0x360 [ 1615.037496] create_object.isra.0+0x3a/0xa20 [ 1615.038396] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1615.039438] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 1615.040462] ? alloc_skb_with_frags+0x92/0x570 [ 1615.041416] __alloc_skb+0xb1/0x620 [ 1615.042235] alloc_skb_with_frags+0x92/0x570 [ 1615.043129] ? perf_trace_lock+0xac/0x490 [ 1615.043985] sock_alloc_send_pskb+0x741/0x8a0 [ 1615.044916] ? sk_reset_timer+0xc0/0xc0 [ 1615.045738] ? lock_downgrade+0x6d0/0x6d0 [ 1615.046600] ? rwlock_bug.part.0+0x90/0x90 [ 1615.047484] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1615.048547] ? __local_bh_enable_ip+0x9d/0x100 [ 1615.049507] raw_sendmsg+0x331/0x680 [ 1615.050266] ? dgram_connect+0x470/0x470 [ 1615.051091] ? __import_iovec+0x458/0x590 [ 1615.051941] ? ieee802154_sock_release+0xb0/0xb0 [ 1615.052907] sock_sendmsg+0x154/0x190 [ 1615.053698] ____sys_sendmsg+0x334/0x870 [ 1615.054535] ? kernel_sendmsg+0x50/0x50 [ 1615.055339] ? do_recvmmsg+0x6d0/0x6d0 [ 1615.056129] ? perf_trace_lock+0xac/0x490 [ 1615.056980] ? __lockdep_reset_lock+0x180/0x180 [ 1615.058025] ? perf_trace_lock+0xac/0x490 [ 1615.058880] ___sys_sendmsg+0xf3/0x170 [ 1615.059672] ? sendmsg_copy_msghdr+0x160/0x160 [ 1615.060635] ? lock_downgrade+0x6d0/0x6d0 [ 1615.061503] ? lock_downgrade+0x6d0/0x6d0 [ 1615.062352] ? __fget_files+0x296/0x480 [ 1615.063171] ? __fget_light+0xea/0x290 [ 1615.063977] __sys_sendmmsg+0x195/0x470 [ 1615.064795] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1615.065682] ? lock_downgrade+0x6d0/0x6d0 [ 1615.066549] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1615.067533] ? wait_for_completion+0x270/0x270 [ 1615.068466] ? rcu_read_lock_any_held+0x75/0xa0 [ 1615.069438] ? vfs_write+0x354/0xa30 [ 1615.070204] ? fput_many+0x2f/0x1a0 [ 1615.070944] ? ksys_write+0x1a9/0x260 [ 1615.071738] __x64_sys_sendmmsg+0x99/0x100 [ 1615.072598] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1615.073733] do_syscall_64+0x33/0x40 [ 1615.074492] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1615.075531] RIP: 0033:0x7f8064db1b19 [ 1615.076291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1615.080036] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1615.081596] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1615.083042] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1615.084494] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1615.085952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1615.087404] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1615.088946] CPU: 0 PID: 8150 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1615.089069] ieee802154 phy0 wpan0: encryption failed: -22 [ 1615.090375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1615.090383] Call Trace: [ 1615.090416] dump_stack+0x107/0x167 [ 1615.090448] should_fail.cold+0x5/0xa [ 1615.095268] _copy_from_user+0x2e/0x1b0 [ 1615.096153] __copy_msghdr_from_user+0x91/0x4b0 [ 1615.097152] ieee802154 phy0 wpan0: encryption failed: -22 [ 1615.097192] ? __ia32_sys_shutdown+0x80/0x80 [ 1615.099244] ? ieee802154_sock_release+0xb0/0xb0 [ 1615.100226] ? sock_sendmsg+0x55/0x190 [ 1615.101047] sendmsg_copy_msghdr+0xa1/0x160 [ 1615.101948] ? do_recvmmsg+0x6d0/0x6d0 [ 1615.102767] ? __lock_acquire+0x1657/0x5b00 [ 1615.103689] ___sys_sendmsg+0xc6/0x170 [ 1615.104525] ? sendmsg_copy_msghdr+0x160/0x160 [ 1615.105476] ? vmacache_find+0x55/0x2a0 [ 1615.106304] ? __lockdep_reset_lock+0x180/0x180 [ 1615.107286] ? find_held_lock+0x2c/0x110 [ 1615.108142] ? __might_fault+0xd3/0x180 [ 1615.108964] ? lock_downgrade+0x6d0/0x6d0 [ 1615.109840] ? asm_exc_page_fault+0x1e/0x30 [ 1615.110772] __sys_sendmmsg+0x195/0x470 [ 1615.111604] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1615.112497] ? lock_downgrade+0x6d0/0x6d0 [ 1615.113400] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1615.114401] ? wait_for_completion+0x270/0x270 [ 1615.115348] ? rcu_read_lock_any_held+0x75/0xa0 [ 1615.116302] ? vfs_write+0x354/0xa30 [ 1615.117081] ? fput_many+0x2f/0x1a0 [ 1615.117856] ? ksys_write+0x1a9/0x260 [ 1615.118665] __x64_sys_sendmmsg+0x99/0x100 [ 1615.119548] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1615.120607] do_syscall_64+0x33/0x40 [ 1615.121388] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1615.122442] RIP: 0033:0x7f867efe2b19 [ 1615.123207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1615.126964] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1615.128529] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1615.130016] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1615.131474] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1615.132941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1615.134409] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1615.136069] hpet: Lost 2 RTC interrupts [ 1615.143963] FAULT_INJECTION: forcing a failure. [ 1615.143963] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1615.146849] CPU: 0 PID: 8152 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1615.148360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1615.150067] Call Trace: [ 1615.150619] dump_stack+0x107/0x167 [ 1615.151411] should_fail.cold+0x5/0xa [ 1615.152218] __alloc_pages_nodemask+0x182/0x680 [ 1615.153191] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1615.154250] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1615.155521] ? perf_trace_lock+0xac/0x490 [ 1615.156396] alloc_pages_vma+0xbb/0x410 [ 1615.157239] wp_page_copy+0xee7/0x1f00 [ 1615.158080] ? print_bad_pte+0x5a0/0x5a0 [ 1615.158917] ? lock_downgrade+0x6d0/0x6d0 [ 1615.159763] ? vm_normal_page+0x162/0x2e0 [ 1615.160633] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1615.161747] do_wp_page+0x27b/0x1390 [ 1615.162538] handle_mm_fault+0x1ce6/0x3520 [ 1615.163425] ? __lock_acquire+0x1657/0x5b00 [ 1615.164331] ? __pmd_alloc+0x5e0/0x5e0 [ 1615.165163] ? vmacache_find+0x55/0x2a0 [ 1615.166031] do_user_addr_fault+0x56e/0xc00 [ 1615.166956] exc_page_fault+0xa2/0x1a0 [ 1615.167773] asm_exc_page_fault+0x1e/0x30 [ 1615.168629] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1615.169662] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 b1 02 1f 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 92 02 1f 02 66 90 48 bb f9 ef ff ff ff 7f [ 1615.173426] RSP: 0018:ffff8880497afcf0 EFLAGS: 00050293 [ 1615.174528] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020005038 [ 1615.175987] RDX: 0000000000040000 RSI: ffffffff830c9222 RDI: ffff88801de808a0 [ 1615.177466] RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000 [ 1615.178925] R10: 0000000000000001 R11: 0000000000000001 R12: 000000000000000c [ 1615.180391] R13: 0000000020005000 R14: 0000000000000400 R15: 00000000000003ff [ 1615.181899] ? __sys_sendmmsg+0x1c2/0x470 [ 1615.182767] __sys_sendmmsg+0x1cf/0x470 [ 1615.183600] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1615.184490] ? lock_downgrade+0x6d0/0x6d0 [ 1615.185400] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1615.186402] ? wait_for_completion+0x270/0x270 [ 1615.187349] ? rcu_read_lock_any_held+0x75/0xa0 [ 1615.188301] ? vfs_write+0x354/0xa30 [ 1615.189086] ? fput_many+0x2f/0x1a0 [ 1615.189860] ? ksys_write+0x1a9/0x260 [ 1615.190675] __x64_sys_sendmmsg+0x99/0x100 [ 1615.191552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1615.192615] do_syscall_64+0x33/0x40 [ 1615.193395] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1615.194447] RIP: 0033:0x7f8542659b19 [ 1615.195214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1615.198978] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1615.200541] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1615.202008] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1615.203491] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1615.204956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1615.206424] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1615.208135] hpet: Lost 3 RTC interrupts 02:01:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0xba, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e0011"], 0x1c}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000000c0)={'wlan0\x00', {0x2, 0x0, @dev}}) 02:01:30 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:30 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x2120, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffbffffd, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="ec034a0800000000001700080000000008007809060b2a3a0802", 0x1a, 0xb800}, {0x0, 0x0, 0xfffffffffffbff50}], 0x9000, &(0x7f00000001c0)=ANY=[@ANYBLOB='utf8,iocharset=macic,cruft']) ftruncate(0xffffffffffffffff, 0x8) sched_getscheduler(r2) 02:01:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0xff, 0x81, 0x9, 0x0, 0x9, 0xe0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x8052, 0x10000, 0x667, 0x2, 0x8, 0xccd0, 0x0, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) [ 1629.363031] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:01:54 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 7) socket$netlink(0x10, 0x3, 0x0) [ 1638.522945] ieee802154 phy0 wpan0: encryption failed: -22 [ 1638.528071] ieee802154 phy0 wpan0: encryption failed: -22 [ 1638.529656] FAULT_INJECTION: forcing a failure. [ 1638.529656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1638.532119] CPU: 0 PID: 8188 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1638.533677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.535367] Call Trace: [ 1638.535920] dump_stack+0x107/0x167 [ 1638.536678] should_fail.cold+0x5/0xa [ 1638.537481] _copy_from_user+0x2e/0x1b0 [ 1638.538322] __copy_msghdr_from_user+0x91/0x4b0 [ 1638.539282] ? __ia32_sys_shutdown+0x80/0x80 [ 1638.540200] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1638.541291] ? perf_trace_lock+0xac/0x490 [ 1638.542205] sendmsg_copy_msghdr+0xa1/0x160 [ 1638.543102] ? do_recvmmsg+0x6d0/0x6d0 [ 1638.543905] ? handle_mm_fault+0xa05/0x3520 [ 1638.544810] ? find_held_lock+0x2c/0x110 [ 1638.545696] ___sys_sendmsg+0xc6/0x170 [ 1638.546510] ? sendmsg_copy_msghdr+0x160/0x160 [ 1638.547451] ? vmacache_find+0x55/0x2a0 [ 1638.548307] ? do_user_addr_fault+0x5b0/0xc00 [ 1638.549241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1638.550340] ? exc_page_fault+0xca/0x1a0 [ 1638.551180] ? trace_hardirqs_on+0x5b/0x180 [ 1638.552072] ? exc_page_fault+0xca/0x1a0 [ 1638.552919] ? asm_exc_page_fault+0x1e/0x30 [ 1638.553859] __sys_sendmmsg+0x195/0x470 [ 1638.554692] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1638.555575] ? lock_downgrade+0x6d0/0x6d0 [ 1638.556472] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1638.557480] ? wait_for_completion+0x270/0x270 [ 1638.558449] ? rcu_read_lock_any_held+0x75/0xa0 [ 1638.559402] ? vfs_write+0x354/0xa30 [ 1638.560178] ? fput_many+0x2f/0x1a0 [ 1638.560930] ? ksys_write+0x1a9/0x260 [ 1638.561754] __x64_sys_sendmmsg+0x99/0x100 [ 1638.562628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1638.563679] do_syscall_64+0x33/0x40 [ 1638.564448] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1638.565499] RIP: 0033:0x7f8542659b19 [ 1638.566278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.570026] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1638.571583] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1638.573035] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1638.574513] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.575964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1638.577417] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1638.579211] hpet: Lost 2 RTC interrupts 02:01:54 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 26) 02:01:54 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 23) 02:01:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$cgroup_devices(r1, 0x0, 0x2, 0x0) sendmsg$nl_generic(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={0x0}, 0x1, 0x0, 0x0, 0x200048d0}, 0x40080) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$CDROMRESET(0xffffffffffffffff, 0x5312) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r6, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) mkdirat(r6, &(0x7f00000000c0)='./file1\x00', 0x0) r7 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r7, &(0x7f0000000200)=0x77aa, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 02:01:54 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:54 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x9, 0x46, 0x2, 0x7, 0x0, 0x7, 0x0, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40ca9, 0x9, 0x719d5df1, 0x2, 0x1, 0x6, 0x3, 0x0, 0x8, 0x0, 0x7f}, r1, 0x8, r2, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='notify_on_release\x00', 0x2, 0x0) dup2(r3, r0) 02:01:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) r1 = dup2(r0, r0) openat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @local}}) 02:01:54 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1638.587155] FAULT_INJECTION: forcing a failure. [ 1638.587155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1638.589724] CPU: 0 PID: 8184 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1638.591113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.592796] Call Trace: [ 1638.593344] dump_stack+0x107/0x167 [ 1638.594126] should_fail.cold+0x5/0xa [ 1638.594924] _copy_from_user+0x2e/0x1b0 [ 1638.595752] __copy_msghdr_from_user+0x91/0x4b0 [ 1638.596706] ? __ia32_sys_shutdown+0x80/0x80 [ 1638.597632] ? ieee802154_sock_release+0xb0/0xb0 [ 1638.598608] ? sock_sendmsg+0x55/0x190 [ 1638.599422] sendmsg_copy_msghdr+0xa1/0x160 [ 1638.600310] ? do_recvmmsg+0x6d0/0x6d0 [ 1638.601139] ? __lock_acquire+0x1657/0x5b00 [ 1638.602065] ___sys_sendmsg+0xc6/0x170 [ 1638.602861] ? sendmsg_copy_msghdr+0x160/0x160 [ 1638.603778] ? vmacache_find+0x55/0x2a0 [ 1638.604631] ? __lockdep_reset_lock+0x180/0x180 [ 1638.605611] ? find_held_lock+0x2c/0x110 [ 1638.606449] ? __might_fault+0xd3/0x180 [ 1638.607255] ? lock_downgrade+0x6d0/0x6d0 [ 1638.608101] ? asm_exc_page_fault+0x1e/0x30 [ 1638.609040] __sys_sendmmsg+0x195/0x470 [ 1638.609886] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1638.610778] ? lock_downgrade+0x6d0/0x6d0 [ 1638.611679] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1638.612681] ? irqentry_enter+0x26/0x60 [ 1638.613536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1638.614620] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1638.615733] ? trace_hardirqs_on+0x5b/0x180 [ 1638.616634] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1638.617800] __x64_sys_sendmmsg+0x99/0x100 [ 1638.618685] do_syscall_64+0x33/0x40 [ 1638.619455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1638.620504] RIP: 0033:0x7f867efe2b19 [ 1638.621272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.625009] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1638.626581] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1638.628025] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1638.629474] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.630934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1638.632388] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1638.634066] hpet: Lost 1 RTC interrupts [ 1638.649413] FAULT_INJECTION: forcing a failure. [ 1638.649413] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.652208] CPU: 0 PID: 8202 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1638.653626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.655320] Call Trace: [ 1638.655869] dump_stack+0x107/0x167 [ 1638.656630] should_fail.cold+0x5/0xa [ 1638.657418] ? __skb_ext_alloc+0x19/0x90 [ 1638.658265] should_failslab+0x5/0x20 [ 1638.659046] kmem_cache_alloc+0x5b/0x360 [ 1638.659899] __skb_ext_alloc+0x19/0x90 [ 1638.660697] skb_ext_add+0x508/0x670 [ 1638.661463] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1638.662568] __alloc_skb+0x3c1/0x620 [ 1638.663350] alloc_skb_with_frags+0x92/0x570 [ 1638.664249] ? perf_trace_lock+0xac/0x490 [ 1638.665129] sock_alloc_send_pskb+0x741/0x8a0 [ 1638.666108] ? sk_reset_timer+0xc0/0xc0 [ 1638.666957] ? lock_downgrade+0x6d0/0x6d0 [ 1638.667809] ? rwlock_bug.part.0+0x90/0x90 [ 1638.668693] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1638.669775] ? __local_bh_enable_ip+0x9d/0x100 [ 1638.670728] raw_sendmsg+0x331/0x680 [ 1638.671550] ? dgram_connect+0x470/0x470 [ 1638.672385] ? __import_iovec+0x458/0x590 [ 1638.673273] ? ieee802154_sock_release+0xb0/0xb0 [ 1638.674303] sock_sendmsg+0x154/0x190 [ 1638.675101] ____sys_sendmsg+0x334/0x870 [ 1638.675957] ? kernel_sendmsg+0x50/0x50 [ 1638.676773] ? do_recvmmsg+0x6d0/0x6d0 [ 1638.677600] ? perf_trace_lock+0xac/0x490 [ 1638.678473] ? __lockdep_reset_lock+0x180/0x180 [ 1638.679435] ? perf_trace_lock+0xac/0x490 [ 1638.680311] ___sys_sendmsg+0xf3/0x170 [ 1638.681128] ? sendmsg_copy_msghdr+0x160/0x160 [ 1638.682090] ? lock_downgrade+0x6d0/0x6d0 [ 1638.682992] ? __fget_files+0x296/0x480 [ 1638.683836] ? __fget_light+0xea/0x290 [ 1638.684653] __sys_sendmmsg+0x195/0x470 [ 1638.685481] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1638.686375] ? lock_downgrade+0x6d0/0x6d0 [ 1638.687266] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1638.688270] ? wait_for_completion+0x270/0x270 [ 1638.689211] ? rcu_read_lock_any_held+0x75/0xa0 [ 1638.690179] ? vfs_write+0x354/0xa30 [ 1638.690955] ? fput_many+0x2f/0x1a0 [ 1638.691706] ? ksys_write+0x1a9/0x260 [ 1638.692509] __x64_sys_sendmmsg+0x99/0x100 [ 1638.693377] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1638.694441] do_syscall_64+0x33/0x40 [ 1638.695209] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1638.696253] RIP: 0033:0x7f8064db1b19 [ 1638.697016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.700766] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 02:01:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) read(r0, &(0x7f0000000140)=""/209, 0xd1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'virt_wifi0\x00', {0x2, 0x0, @initdev}}) [ 1638.702318] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1638.703943] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1638.705424] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.706890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1638.708341] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1638.710124] hpet: Lost 2 RTC interrupts [ 1638.711319] ieee802154 phy0 wpan0: encryption failed: -22 02:01:54 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 24) 02:01:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000280), 0x2, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x20) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400", @ANYRES16=r1, @ANYBLOB="000000000000000000000800000046dff21750dbf97191b418faa076"], 0x14}}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x5ead}, {0xa, 0x4e24, 0x1000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, 0x1, [0x1, 0x100, 0x0, 0x20, 0xfffffffb, 0x6, 0x6, 0xfffffffc]}, 0x5c) [ 1638.850185] ieee802154 phy0 wpan0: encryption failed: -22 [ 1638.864408] FAULT_INJECTION: forcing a failure. [ 1638.864408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1638.867759] CPU: 1 PID: 8217 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1638.869159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.870950] Call Trace: [ 1638.871507] dump_stack+0x107/0x167 [ 1638.872263] should_fail.cold+0x5/0xa [ 1638.873060] _copy_from_user+0x2e/0x1b0 [ 1638.873912] __copy_msghdr_from_user+0x91/0x4b0 [ 1638.874872] ? __ia32_sys_shutdown+0x80/0x80 [ 1638.875792] ? ieee802154_sock_release+0xb0/0xb0 [ 1638.876767] ? sock_sendmsg+0x55/0x190 [ 1638.877595] sendmsg_copy_msghdr+0xa1/0x160 [ 1638.878473] ? do_recvmmsg+0x6d0/0x6d0 [ 1638.879275] ? __lock_acquire+0x1657/0x5b00 [ 1638.880186] ___sys_sendmsg+0xc6/0x170 [ 1638.880983] ? sendmsg_copy_msghdr+0x160/0x160 [ 1638.881911] ? vmacache_find+0x55/0x2a0 [ 1638.882731] ? __lockdep_reset_lock+0x180/0x180 [ 1638.883695] ? find_held_lock+0x2c/0x110 [ 1638.884535] ? __might_fault+0xd3/0x180 [ 1638.885343] ? lock_downgrade+0x6d0/0x6d0 [ 1638.886275] ? asm_exc_page_fault+0x1e/0x30 [ 1638.887196] __sys_sendmmsg+0x195/0x470 [ 1638.888020] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1638.888900] ? lock_downgrade+0x6d0/0x6d0 [ 1638.889794] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1638.890796] ? wait_for_completion+0x270/0x270 [ 1638.891732] ? rcu_read_lock_any_held+0x75/0xa0 [ 1638.892685] ? vfs_write+0x354/0xa30 [ 1638.893462] ? fput_many+0x2f/0x1a0 [ 1638.894218] ? ksys_write+0x1a9/0x260 [ 1638.895021] __x64_sys_sendmmsg+0x99/0x100 [ 1638.895884] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1638.896940] do_syscall_64+0x33/0x40 [ 1638.897719] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1638.898763] RIP: 0033:0x7f8542659b19 [ 1638.899517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.903307] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1638.904847] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1638.906321] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1638.907766] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.909199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1638.910638] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:01:54 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 27) 02:01:54 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000002c0)={0xedc, 0xfffffffffffff801, 0x3, 0xce6, 0x6, [{0x1, 0x1, 0x89b, '\x00', 0x2}, {0x7, 0x5, 0x2}, {0x0, 0x7, 0x59, '\x00', 0x2800}, {0x1, 0x7fff, 0x100, '\x00', 0x200}, {0x3, 0x9, 0x3, '\x00', 0x481}, {0x5, 0x800, 0x6}]}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$SG_GET_LOW_DMA(r4, 0x227a, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 02:01:54 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) io_setup(0x5, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:01:54 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 8) socket$netlink(0x10, 0x3, 0x0) [ 1639.040877] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.049344] FAULT_INJECTION: forcing a failure. [ 1639.049344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.051873] CPU: 0 PID: 8226 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1639.053298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.054983] Call Trace: [ 1639.055533] dump_stack+0x107/0x167 [ 1639.056281] should_fail.cold+0x5/0xa [ 1639.057064] _copy_from_user+0x2e/0x1b0 [ 1639.057942] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.058901] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.059807] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.060769] ? sock_sendmsg+0x55/0x190 [ 1639.061601] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.062488] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.063311] ? __lock_acquire+0x1657/0x5b00 [ 1639.064233] ___sys_sendmsg+0xc6/0x170 [ 1639.065045] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.066008] ? vmacache_find+0x55/0x2a0 [ 1639.066838] ? __lockdep_reset_lock+0x180/0x180 [ 1639.067814] ? find_held_lock+0x2c/0x110 [ 1639.068666] ? __might_fault+0xd3/0x180 [ 1639.069484] ? lock_downgrade+0x6d0/0x6d0 [ 1639.070343] ? asm_exc_page_fault+0x1e/0x30 [ 1639.071266] __sys_sendmmsg+0x195/0x470 [ 1639.072105] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.072992] ? lock_downgrade+0x6d0/0x6d0 [ 1639.073906] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.074903] ? wait_for_completion+0x270/0x270 [ 1639.075845] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.076795] ? vfs_write+0x354/0xa30 [ 1639.077583] ? fput_many+0x2f/0x1a0 [ 1639.078335] ? ksys_write+0x1a9/0x260 [ 1639.079141] __x64_sys_sendmmsg+0x99/0x100 [ 1639.080010] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.081067] do_syscall_64+0x33/0x40 [ 1639.081858] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.082911] RIP: 0033:0x7f867efe2b19 [ 1639.083580] FAULT_INJECTION: forcing a failure. [ 1639.083580] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.083680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.083693] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.083724] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1639.092668] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.094140] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.095590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.097048] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1639.098566] CPU: 1 PID: 8234 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1639.098774] hpet: Lost 2 RTC interrupts [ 1639.100019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.100034] Call Trace: [ 1639.103083] dump_stack+0x107/0x167 [ 1639.103827] should_fail.cold+0x5/0xa [ 1639.104605] ? create_object.isra.0+0x3a/0xa20 [ 1639.105555] should_failslab+0x5/0x20 [ 1639.106347] kmem_cache_alloc+0x5b/0x360 [ 1639.106373] create_object.isra.0+0x3a/0xa20 [ 1639.106393] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 02:01:54 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 1639.106418] kmem_cache_alloc+0x159/0x360 [ 1639.106446] __skb_ext_alloc+0x19/0x90 [ 1639.106462] skb_ext_add+0x508/0x670 [ 1639.106482] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 1639.106508] __alloc_skb+0x3c1/0x620 [ 1639.106534] alloc_skb_with_frags+0x92/0x570 [ 1639.106553] ? perf_trace_lock+0xac/0x490 [ 1639.106587] sock_alloc_send_pskb+0x741/0x8a0 [ 1639.106623] ? sk_reset_timer+0xc0/0xc0 [ 1639.106641] ? lock_downgrade+0x6d0/0x6d0 [ 1639.106662] ? rwlock_bug.part.0+0x90/0x90 [ 1639.106690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.106708] ? __local_bh_enable_ip+0x9d/0x100 [ 1639.106733] raw_sendmsg+0x331/0x680 [ 1639.106751] ? dgram_connect+0x470/0x470 [ 1639.106771] ? __import_iovec+0x458/0x590 [ 1639.106798] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.106820] sock_sendmsg+0x154/0x190 [ 1639.106843] ____sys_sendmsg+0x334/0x870 02:01:54 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 25) [ 1639.106868] ? kernel_sendmsg+0x50/0x50 [ 1639.106883] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.106901] ? perf_trace_lock+0xac/0x490 [ 1639.106927] ? __lockdep_reset_lock+0x180/0x180 [ 1639.106944] ? perf_trace_lock+0xac/0x490 [ 1639.106968] ___sys_sendmsg+0xf3/0x170 [ 1639.106989] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.107015] ? lock_downgrade+0x6d0/0x6d0 [ 1639.107043] ? lock_downgrade+0x6d0/0x6d0 [ 1639.107069] ? __fget_files+0x296/0x480 [ 1639.107101] ? __fget_light+0xea/0x290 [ 1639.107128] __sys_sendmmsg+0x195/0x470 [ 1639.107153] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.107172] ? lock_downgrade+0x6d0/0x6d0 [ 1639.107213] ? __mutex_unlock_slowpath+0xe1/0x600 02:01:54 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 1639.107235] ? wait_for_completion+0x270/0x270 [ 1639.107259] ? rcu_read_lock_any_held+0x75/0xa0 02:01:54 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x137480, 0x20) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1639.107275] ? vfs_write+0x354/0xa30 [ 1639.107298] ? fput_many+0x2f/0x1a0 [ 1639.107318] ? ksys_write+0x1a9/0x260 [ 1639.107349] __x64_sys_sendmmsg+0x99/0x100 [ 1639.107370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.107389] do_syscall_64+0x33/0x40 [ 1639.107409] entry_SYSCALL_64_after_hwframe+0x61/0xc6 02:01:54 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 28) [ 1639.107422] RIP: 0033:0x7f8064db1b19 [ 1639.107441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.107452] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 02:01:54 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 9) socket$netlink(0x10, 0x3, 0x0) [ 1639.107473] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1639.107484] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.107495] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.107506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1639.107518] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1639.107764] ieee802154 phy0 wpan0: encryption failed: -22 02:01:54 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 1639.315001] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.315284] FAULT_INJECTION: forcing a failure. [ 1639.315284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.315305] CPU: 0 PID: 8242 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1639.315317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.315325] Call Trace: 02:01:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x4) r1 = openat$cgroup_pressure(r0, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xfffffffffffff9f3, 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) mkdirat(r2, &(0x7f0000000080)='./file1\x00', 0x70) bind$unix(r6, 0x0, 0x37) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2}) [ 1639.315355] dump_stack+0x107/0x167 02:01:55 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 26) [ 1639.315385] should_fail.cold+0x5/0xa [ 1639.315421] _copy_from_user+0x2e/0x1b0 [ 1639.315455] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.315479] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.315518] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.315545] ? sock_sendmsg+0x55/0x190 [ 1639.315584] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.315604] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.315639] ? __lock_acquire+0x1657/0x5b00 [ 1639.315699] ___sys_sendmsg+0xc6/0x170 [ 1639.315726] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.315743] ? vmacache_find+0x55/0x2a0 [ 1639.315774] ? __lockdep_reset_lock+0x180/0x180 [ 1639.315820] ? find_held_lock+0x2c/0x110 [ 1639.315856] ? __might_fault+0xd3/0x180 [ 1639.315879] ? lock_downgrade+0x6d0/0x6d0 [ 1639.315902] ? asm_exc_page_fault+0x1e/0x30 [ 1639.315968] __sys_sendmmsg+0x195/0x470 [ 1639.316004] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.316027] ? lock_downgrade+0x6d0/0x6d0 [ 1639.316092] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.316126] ? wait_for_completion+0x270/0x270 [ 1639.316157] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.316176] ? vfs_write+0x354/0xa30 [ 1639.316207] ? fput_many+0x2f/0x1a0 [ 1639.316233] ? ksys_write+0x1a9/0x260 [ 1639.316282] __x64_sys_sendmmsg+0x99/0x100 [ 1639.316306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.316328] do_syscall_64+0x33/0x40 [ 1639.316351] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.316366] RIP: 0033:0x7f8542659b19 [ 1639.316387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.316399] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.316424] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1639.316437] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.316449] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.316462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.316475] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1639.374035] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.374261] FAULT_INJECTION: forcing a failure. [ 1639.374261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.374280] CPU: 1 PID: 8250 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1639.374290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.374297] Call Trace: [ 1639.374328] dump_stack+0x107/0x167 [ 1639.374352] should_fail.cold+0x5/0xa [ 1639.374378] _copy_from_user+0x2e/0x1b0 [ 1639.374403] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.374423] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.374449] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.374471] ? sock_sendmsg+0x55/0x190 [ 1639.374496] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.374513] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.374538] ? __lock_acquire+0x1657/0x5b00 [ 1639.374571] ___sys_sendmsg+0xc6/0x170 [ 1639.374591] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.374606] ? vmacache_find+0x55/0x2a0 [ 1639.374629] ? __lockdep_reset_lock+0x180/0x180 [ 1639.374665] ? find_held_lock+0x2c/0x110 [ 1639.374690] ? __might_fault+0xd3/0x180 [ 1639.374709] ? lock_downgrade+0x6d0/0x6d0 [ 1639.374729] ? asm_exc_page_fault+0x1e/0x30 [ 1639.374768] __sys_sendmmsg+0x195/0x470 [ 1639.374792] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.374811] ? lock_downgrade+0x6d0/0x6d0 [ 1639.374849] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.374871] ? wait_for_completion+0x270/0x270 [ 1639.374893] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.374910] ? vfs_write+0x354/0xa30 [ 1639.374933] ? fput_many+0x2f/0x1a0 [ 1639.374952] ? ksys_write+0x1a9/0x260 [ 1639.374982] __x64_sys_sendmmsg+0x99/0x100 [ 1639.375003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.375021] do_syscall_64+0x33/0x40 [ 1639.375040] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.375053] RIP: 0033:0x7f867efe2b19 [ 1639.375071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.375081] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.375103] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1639.375114] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.375124] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.375135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.375146] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1639.426994] FAULT_INJECTION: forcing a failure. [ 1639.426994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.427021] CPU: 1 PID: 8252 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1639.427036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.427044] Call Trace: [ 1639.427076] dump_stack+0x107/0x167 [ 1639.427109] should_fail.cold+0x5/0xa [ 1639.427149] _copy_from_iter_full+0x1ff/0x940 [ 1639.427180] ? __check_object_size+0x319/0x440 [ 1639.427212] raw_sendmsg+0x46c/0x680 [ 1639.427230] ? dgram_connect+0x470/0x470 [ 1639.427248] ? __import_iovec+0x458/0x590 [ 1639.427274] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.427302] sock_sendmsg+0x154/0x190 02:01:55 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 10) socket$netlink(0x10, 0x3, 0x0) 02:01:55 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 29) [ 1639.427325] ____sys_sendmsg+0x334/0x870 [ 1639.427350] ? kernel_sendmsg+0x50/0x50 [ 1639.427364] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.427384] ? perf_trace_lock+0xac/0x490 [ 1639.427410] ? __lockdep_reset_lock+0x180/0x180 [ 1639.427427] ? perf_trace_lock+0xac/0x490 [ 1639.427451] ___sys_sendmsg+0xf3/0x170 [ 1639.427471] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.427497] ? lock_downgrade+0x6d0/0x6d0 [ 1639.427526] ? lock_downgrade+0x6d0/0x6d0 [ 1639.427551] ? __fget_files+0x296/0x480 [ 1639.427583] ? __fget_light+0xea/0x290 [ 1639.427610] __sys_sendmmsg+0x195/0x470 [ 1639.427635] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.427654] ? lock_downgrade+0x6d0/0x6d0 [ 1639.427693] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.427721] ? wait_for_completion+0x270/0x270 [ 1639.427742] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.427758] ? vfs_write+0x354/0xa30 [ 1639.427781] ? fput_many+0x2f/0x1a0 [ 1639.427801] ? ksys_write+0x1a9/0x260 [ 1639.427832] __x64_sys_sendmmsg+0x99/0x100 [ 1639.427852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.427870] do_syscall_64+0x33/0x40 [ 1639.427890] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.427903] RIP: 0033:0x7f8064db1b19 [ 1639.427921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.427931] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.427951] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1639.427962] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.427973] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.427983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1639.427994] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1639.536992] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.537269] FAULT_INJECTION: forcing a failure. [ 1639.537269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.537289] CPU: 0 PID: 8259 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1639.537301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.537308] Call Trace: [ 1639.537337] dump_stack+0x107/0x167 [ 1639.537366] should_fail.cold+0x5/0xa [ 1639.537401] _copy_from_user+0x2e/0x1b0 [ 1639.537433] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.537456] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.537493] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.537519] ? sock_sendmsg+0x55/0x190 [ 1639.537567] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.537587] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.537619] ? __lock_acquire+0x1657/0x5b00 [ 1639.537674] ___sys_sendmsg+0xc6/0x170 [ 1639.537699] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.537715] ? vmacache_find+0x55/0x2a0 [ 1639.537744] ? __lockdep_reset_lock+0x180/0x180 [ 1639.537788] ? find_held_lock+0x2c/0x110 [ 1639.537823] ? __might_fault+0xd3/0x180 [ 1639.537845] ? lock_downgrade+0x6d0/0x6d0 [ 1639.537866] ? asm_exc_page_fault+0x1e/0x30 [ 1639.537929] __sys_sendmmsg+0x195/0x470 [ 1639.537964] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.537986] ? lock_downgrade+0x6d0/0x6d0 [ 1639.538046] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.538075] ? wait_for_completion+0x270/0x270 [ 1639.538103] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.538121] ? vfs_write+0x354/0xa30 [ 1639.538150] ? fput_many+0x2f/0x1a0 [ 1639.538174] ? ksys_write+0x1a9/0x260 [ 1639.538220] __x64_sys_sendmmsg+0x99/0x100 [ 1639.538242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.538263] do_syscall_64+0x33/0x40 [ 1639.538285] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.538299] RIP: 0033:0x7f8542659b19 [ 1639.538318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.538330] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.538354] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1639.538366] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.538378] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.538390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.538402] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1639.737546] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.740403] FAULT_INJECTION: forcing a failure. [ 1639.740403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.744389] ieee802154 phy0 wpan0: encryption failed: -22 [ 1639.744916] CPU: 1 PID: 8266 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1639.744926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.744931] Call Trace: [ 1639.744956] dump_stack+0x107/0x167 [ 1639.744975] should_fail.cold+0x5/0xa [ 1639.744998] _copy_from_user+0x2e/0x1b0 [ 1639.745018] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.745034] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.745056] ? ieee802154_sock_release+0xb0/0xb0 [ 1639.745075] ? sock_sendmsg+0x55/0x190 [ 1639.745096] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.745110] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.745131] ? __lock_acquire+0x1657/0x5b00 [ 1639.745160] ___sys_sendmsg+0xc6/0x170 [ 1639.746222] FAULT_INJECTION: forcing a failure. [ 1639.746222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.746736] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.746750] ? vmacache_find+0x55/0x2a0 [ 1639.746774] ? __lockdep_reset_lock+0x180/0x180 [ 1639.746799] ? find_held_lock+0x2c/0x110 [ 1639.832009] ? __might_fault+0xd3/0x180 [ 1639.832833] ? lock_downgrade+0x6d0/0x6d0 [ 1639.833699] ? asm_exc_page_fault+0x1e/0x30 [ 1639.834608] __sys_sendmmsg+0x195/0x470 [ 1639.835432] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.836320] ? lock_downgrade+0x6d0/0x6d0 [ 1639.837197] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.838198] ? wait_for_completion+0x270/0x270 [ 1639.839233] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.840195] ? vfs_write+0x354/0xa30 [ 1639.840970] ? fput_many+0x2f/0x1a0 [ 1639.841742] ? ksys_write+0x1a9/0x260 [ 1639.842545] __x64_sys_sendmmsg+0x99/0x100 [ 1639.843431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.844502] do_syscall_64+0x33/0x40 [ 1639.845284] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.846358] RIP: 0033:0x7f867efe2b19 [ 1639.847160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.850991] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.852589] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1639.854094] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.855681] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.857180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.858694] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1639.860234] CPU: 0 PID: 8267 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1639.861742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.863550] Call Trace: [ 1639.864141] dump_stack+0x107/0x167 [ 1639.864950] should_fail.cold+0x5/0xa [ 1639.865824] _copy_from_user+0x2e/0x1b0 [ 1639.866716] __copy_msghdr_from_user+0x91/0x4b0 [ 1639.867738] ? __ia32_sys_shutdown+0x80/0x80 [ 1639.868721] ? perf_trace_lock+0xac/0x490 [ 1639.869643] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.870824] sendmsg_copy_msghdr+0xa1/0x160 [ 1639.871759] ? do_recvmmsg+0x6d0/0x6d0 [ 1639.872616] ? find_held_lock+0x2c/0x110 [ 1639.873544] ___sys_sendmsg+0xc6/0x170 [ 1639.874397] ? sendmsg_copy_msghdr+0x160/0x160 [ 1639.875394] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.876528] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1639.877497] ? trace_hardirqs_on+0x5b/0x180 [ 1639.878444] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1639.879418] ? finish_task_switch+0x126/0x5d0 [ 1639.880387] ? finish_task_switch+0xef/0x5d0 [ 1639.881352] ? __switch_to+0x572/0xff0 [ 1639.882215] ? __switch_to_asm+0x3a/0x60 [ 1639.883094] ? __switch_to_asm+0x34/0x60 [ 1639.884000] ? __schedule+0x850/0x1e90 [ 1639.884867] ? io_schedule_timeout+0x140/0x140 [ 1639.885919] __sys_sendmmsg+0x195/0x470 [ 1639.886790] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1639.887721] ? lock_downgrade+0x6d0/0x6d0 [ 1639.888650] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.889726] ? wait_for_completion+0x270/0x270 [ 1639.890712] ? rcu_read_lock_any_held+0x75/0xa0 [ 1639.891707] ? vfs_write+0x354/0xa30 [ 1639.892520] ? fput_many+0x2f/0x1a0 [ 1639.893313] ? ksys_write+0x1a9/0x260 [ 1639.894181] __x64_sys_sendmmsg+0x99/0x100 [ 1639.895096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.896201] do_syscall_64+0x33/0x40 [ 1639.897007] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1639.898130] RIP: 0033:0x7f8064db1b19 [ 1639.898934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.902876] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1639.904518] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1639.906061] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1639.907584] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.909100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.910619] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 [ 1639.912378] hpet: Lost 2 RTC interrupts [ 1654.792003] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:02:19 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c082, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:19 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 30) 02:02:19 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 11) socket$netlink(0x10, 0x3, 0x0) 02:02:19 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:19 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2}) dup(r0) close_range(r1, 0xffffffffffffffff, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'netdevsim0\x00', @local}) r2 = syz_open_dev$vcsa(0x0, 0xe11, 0x4000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000240)={'wg2\x00'}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10010, r2, 0x96c02000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 02:02:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2083c6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff) dup2(r2, r3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000140), 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r4) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x0, r4}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101000, 0x182) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) 02:02:19 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 27) 02:02:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) r3 = signalfd4(r2, &(0x7f00000000c0)={[0x1]}, 0x8, 0x80000) dup3(r3, r0, 0x80000) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(r4) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x29, 0x0, 0x15, 0x7, 0x2, 0x2, 0x0, 0xf2, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='net/vlan/vlan0\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000011c0)={0x0, 0x6, 0x8, 0x8000}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) ftruncate(0xffffffffffffffff, 0x5) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) read(r4, &(0x7f0000000180)=""/4096, 0x1000) [ 1664.283540] ieee802154 phy0 wpan0: encryption failed: -22 [ 1664.291523] ieee802154 phy0 wpan0: encryption failed: -22 [ 1664.298603] ieee802154 phy0 wpan0: encryption failed: -22 [ 1664.301374] FAULT_INJECTION: forcing a failure. [ 1664.301374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1664.303821] CPU: 1 PID: 8280 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1664.305221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.306913] Call Trace: [ 1664.307466] dump_stack+0x107/0x167 [ 1664.308281] should_fail.cold+0x5/0xa [ 1664.309076] _copy_from_user+0x2e/0x1b0 [ 1664.309929] __copy_msghdr_from_user+0x91/0x4b0 [ 1664.310911] ? __ia32_sys_shutdown+0x80/0x80 [ 1664.311862] ? ieee802154_sock_release+0xb0/0xb0 [ 1664.312891] ? sock_sendmsg+0x55/0x190 [ 1664.313743] sendmsg_copy_msghdr+0xa1/0x160 [ 1664.314669] ? do_recvmmsg+0x6d0/0x6d0 [ 1664.315531] ? __lock_acquire+0x1657/0x5b00 [ 1664.316467] ___sys_sendmsg+0xc6/0x170 [ 1664.317311] ? sendmsg_copy_msghdr+0x160/0x160 [ 1664.318252] ? vmacache_find+0x55/0x2a0 [ 1664.319072] ? __lockdep_reset_lock+0x180/0x180 [ 1664.320056] ? find_held_lock+0x2c/0x110 [ 1664.320901] ? __might_fault+0xd3/0x180 [ 1664.321719] ? lock_downgrade+0x6d0/0x6d0 [ 1664.322585] ? asm_exc_page_fault+0x1e/0x30 [ 1664.323569] __sys_sendmmsg+0x195/0x470 [ 1664.324402] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1664.325284] ? lock_downgrade+0x6d0/0x6d0 [ 1664.326218] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1664.327210] ? wait_for_completion+0x270/0x270 [ 1664.328151] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.329092] ? vfs_write+0x354/0xa30 [ 1664.329881] ? fput_many+0x2f/0x1a0 [ 1664.330633] ? ksys_write+0x1a9/0x260 [ 1664.331436] __x64_sys_sendmmsg+0x99/0x100 [ 1664.332301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.333349] do_syscall_64+0x33/0x40 [ 1664.334122] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1664.335163] RIP: 0033:0x7f8542659b19 [ 1664.335922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.339766] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1664.341318] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1664.342781] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1664.344230] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.345673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.347126] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1664.348921] FAULT_INJECTION: forcing a failure. [ 1664.348921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1664.351413] CPU: 0 PID: 8284 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1664.352823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.354527] Call Trace: [ 1664.355103] dump_stack+0x107/0x167 [ 1664.355871] should_fail.cold+0x5/0xa [ 1664.356682] _copy_from_user+0x2e/0x1b0 [ 1664.357522] __copy_msghdr_from_user+0x91/0x4b0 [ 1664.358513] ? __ia32_sys_shutdown+0x80/0x80 [ 1664.359462] ? ieee802154_sock_release+0xb0/0xb0 [ 1664.360473] ? sock_sendmsg+0x55/0x190 [ 1664.361310] sendmsg_copy_msghdr+0xa1/0x160 [ 1664.362226] ? do_recvmmsg+0x6d0/0x6d0 [ 1664.363054] ? __lock_acquire+0x1657/0x5b00 [ 1664.363996] ___sys_sendmsg+0xc6/0x170 [ 1664.364822] ? sendmsg_copy_msghdr+0x160/0x160 [ 1664.365791] ? __lockdep_reset_lock+0x180/0x180 [ 1664.366769] ? trace_hardirqs_on+0x5b/0x180 [ 1664.367694] ? find_held_lock+0x2c/0x110 [ 1664.368555] ? __might_fault+0xd3/0x180 [ 1664.369383] ? lock_downgrade+0x6d0/0x6d0 [ 1664.370271] ? io_schedule_timeout+0x140/0x140 [ 1664.371262] __sys_sendmmsg+0x195/0x470 [ 1664.372112] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1664.373006] ? lock_downgrade+0x6d0/0x6d0 [ 1664.373916] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1664.374929] ? wait_for_completion+0x270/0x270 [ 1664.375900] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.376883] ? vfs_write+0x354/0xa30 [ 1664.377683] ? fput_many+0x2f/0x1a0 [ 1664.378615] ? ksys_write+0x1a9/0x260 [ 1664.379449] __x64_sys_sendmmsg+0x99/0x100 [ 1664.380509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.381578] do_syscall_64+0x33/0x40 [ 1664.382382] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1664.383449] RIP: 0033:0x7f867efe2b19 [ 1664.384227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.388748] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1664.390353] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1664.391831] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1664.393326] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.394795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.396266] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1664.397972] hpet: Lost 2 RTC interrupts [ 1664.411939] FAULT_INJECTION: forcing a failure. [ 1664.411939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1664.414390] CPU: 1 PID: 8286 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1664.415779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.417520] Call Trace: [ 1664.418081] dump_stack+0x107/0x167 [ 1664.418823] should_fail.cold+0x5/0xa [ 1664.419599] _copy_from_user+0x2e/0x1b0 [ 1664.420426] __copy_msghdr_from_user+0x91/0x4b0 [ 1664.421368] ? __ia32_sys_shutdown+0x80/0x80 [ 1664.422275] ? ieee802154_sock_release+0xb0/0xb0 [ 1664.423238] ? sock_sendmsg+0x55/0x190 [ 1664.424032] sendmsg_copy_msghdr+0xa1/0x160 [ 1664.424907] ? do_recvmmsg+0x6d0/0x6d0 [ 1664.425702] ? __lock_acquire+0x1657/0x5b00 [ 1664.426610] ___sys_sendmsg+0xc6/0x170 [ 1664.427398] ? sendmsg_copy_msghdr+0x160/0x160 [ 1664.428334] ? __lockdep_reset_lock+0x180/0x180 [ 1664.429276] ? trace_hardirqs_on+0x5b/0x180 [ 1664.430169] ? find_held_lock+0x2c/0x110 [ 1664.431026] ? __might_fault+0xd3/0x180 [ 1664.431840] ? lock_downgrade+0x6d0/0x6d0 [ 1664.432685] ? io_schedule_timeout+0x140/0x140 [ 1664.433731] __sys_sendmmsg+0x195/0x470 [ 1664.434572] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1664.435448] ? lock_downgrade+0x6d0/0x6d0 [ 1664.436312] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1664.437289] ? wait_for_completion+0x270/0x270 [ 1664.438230] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.439169] ? vfs_write+0x354/0xa30 [ 1664.439928] ? fput_many+0x2f/0x1a0 [ 1664.440663] ? ksys_write+0x1a9/0x260 [ 1664.441448] __x64_sys_sendmmsg+0x99/0x100 [ 1664.442318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.443357] do_syscall_64+0x33/0x40 [ 1664.444117] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1664.445157] RIP: 0033:0x7f8064db1b19 [ 1664.445946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.449772] RSP: 002b:00007f8062327188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1664.451318] RAX: ffffffffffffffda RBX: 00007f8064ec4f60 RCX: 00007f8064db1b19 [ 1664.452760] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1664.454204] RBP: 00007f80623271d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.455643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.457102] R13: 00007ffdc3dfbb4f R14: 00007f8062327300 R15: 0000000000022000 02:02:20 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9}, {&(0x7f0000011500), 0x0, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(0x0, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x105142, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003c40)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) openat(r0, &(0x7f00000002c0)='./file1\x00', 0x101000, 0x98) write$tcp_mem(r1, 0x0, 0x0) pwrite64(r1, &(0x7f0000000200)=';', 0x1, 0x0) ftruncate(r0, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) r2 = epoll_create(0x7ffd) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f00000000c0)='./file1\x00', 0x1a34c0, 0x0) writev(r3, &(0x7f0000000300)=[{&(0x7f0000000280)='\x00', 0x1}, {&(0x7f00000002c0)}], 0x1000015e) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4}) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffffff, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) syz_usb_connect$printer(0x6, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="120102030109021b00010100000209040000000701005d0b0000020000000000086aa36d5ba0ae8fbfac97f7154cd2e1520c9411b2fea2f6208275f5ae0b9d3944726b7f018183bf36b8bb9cf6e6813f7ed8e1ca877b09b093c3551bd478d8f687272443a2396c12ad4adcee36692a7d0b5dc9ea8a47861681c095"], 0x0) 02:02:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendto$inet(r1, &(0x7f0000000140)="b2a8fc258a97c1e07294e1b8b5e931dc017e5d6f03a626c724d038adff6da82904e52eed29a8fb7c66a14e7a45c1c50fbb75de6bf3c8f259f5e6c8adb5d5cf7694ef3336fda9b22a80", 0x49, 0x840, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) 02:02:20 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:20 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 31) 02:02:20 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 28) [ 1664.696070] ieee802154 phy0 wpan0: encryption failed: -22 [ 1664.701136] FAULT_INJECTION: forcing a failure. [ 1664.701136] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1664.703768] CPU: 0 PID: 8309 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1664.705193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.706919] Call Trace: [ 1664.707488] dump_stack+0x107/0x167 [ 1664.708261] should_fail.cold+0x5/0xa [ 1664.709077] _copy_from_user+0x2e/0x1b0 [ 1664.709950] __copy_msghdr_from_user+0x91/0x4b0 [ 1664.710927] ? __ia32_sys_shutdown+0x80/0x80 [ 1664.711864] ? ieee802154_sock_release+0xb0/0xb0 [ 1664.712864] ? sock_sendmsg+0x55/0x190 [ 1664.713693] sendmsg_copy_msghdr+0xa1/0x160 [ 1664.714639] ? do_recvmmsg+0x6d0/0x6d0 [ 1664.715452] ? __lock_acquire+0x1657/0x5b00 [ 1664.716374] ___sys_sendmsg+0xc6/0x170 [ 1664.717189] ? sendmsg_copy_msghdr+0x160/0x160 [ 1664.718145] ? vmacache_find+0x55/0x2a0 [ 1664.718986] ? __lockdep_reset_lock+0x180/0x180 [ 1664.719984] ? find_held_lock+0x2c/0x110 [ 1664.720854] ? __might_fault+0xd3/0x180 [ 1664.721689] ? lock_downgrade+0x6d0/0x6d0 [ 1664.722562] ? asm_exc_page_fault+0x1e/0x30 [ 1664.723500] __sys_sendmmsg+0x195/0x470 [ 1664.724356] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1664.725258] ? lock_downgrade+0x6d0/0x6d0 [ 1664.726167] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1664.727173] ? wait_for_completion+0x270/0x270 [ 1664.728125] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.729087] ? vfs_write+0x354/0xa30 [ 1664.729884] ? fput_many+0x2f/0x1a0 [ 1664.730651] ? ksys_write+0x1a9/0x260 [ 1664.731471] __x64_sys_sendmmsg+0x99/0x100 [ 1664.732355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.733426] do_syscall_64+0x33/0x40 [ 1664.734210] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1664.735283] RIP: 0033:0x7f867efe2b19 [ 1664.736074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.739821] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1664.741386] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1664.742864] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1664.744319] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.745769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.747230] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1664.748882] hpet: Lost 2 RTC interrupts [ 1664.755327] ieee802154 phy0 wpan0: encryption failed: -22 [ 1664.757017] FAULT_INJECTION: forcing a failure. [ 1664.757017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1664.759424] CPU: 0 PID: 8311 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1664.760816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1664.762564] Call Trace: [ 1664.763113] dump_stack+0x107/0x167 [ 1664.763871] should_fail.cold+0x5/0xa [ 1664.764664] _copy_from_user+0x2e/0x1b0 [ 1664.765501] __copy_msghdr_from_user+0x91/0x4b0 [ 1664.766464] ? __ia32_sys_shutdown+0x80/0x80 [ 1664.767389] ? ieee802154_sock_release+0xb0/0xb0 [ 1664.768365] ? sock_sendmsg+0x55/0x190 [ 1664.769179] sendmsg_copy_msghdr+0xa1/0x160 [ 1664.770090] ? do_recvmmsg+0x6d0/0x6d0 [ 1664.770897] ? __lock_acquire+0x1657/0x5b00 [ 1664.771817] ___sys_sendmsg+0xc6/0x170 [ 1664.772627] ? sendmsg_copy_msghdr+0x160/0x160 [ 1664.773562] ? vmacache_find+0x55/0x2a0 [ 1664.774394] ? __lockdep_reset_lock+0x180/0x180 [ 1664.775376] ? find_held_lock+0x2c/0x110 [ 1664.776217] ? __might_fault+0xd3/0x180 [ 1664.777053] ? lock_downgrade+0x6d0/0x6d0 [ 1664.777916] ? asm_exc_page_fault+0x1e/0x30 [ 1664.778844] __sys_sendmmsg+0x195/0x470 [ 1664.779667] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1664.780551] ? lock_downgrade+0x6d0/0x6d0 [ 1664.781436] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1664.782441] ? wait_for_completion+0x270/0x270 [ 1664.783387] ? rcu_read_lock_any_held+0x75/0xa0 [ 1664.784336] ? vfs_write+0x354/0xa30 [ 1664.785119] ? fput_many+0x2f/0x1a0 [ 1664.785892] ? ksys_write+0x1a9/0x260 [ 1664.786699] __x64_sys_sendmmsg+0x99/0x100 [ 1664.787558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1664.788602] do_syscall_64+0x33/0x40 [ 1664.789359] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1664.790406] RIP: 0033:0x7f8542659b19 [ 1664.791160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1664.794850] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1664.796384] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1664.797821] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1664.799272] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1664.800715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1664.802158] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1664.803797] hpet: Lost 2 RTC interrupts [ 1678.875955] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:02:42 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000001480)={0x6, &(0x7f00000013c0)=[{0x7, 0x1000, &(0x7f00000001c0)="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", 0x1, 0x1}, {0x4, 0x0, &(0x7f0000000000), 0x0, 0x1}, {0xc, 0xcb, &(0x7f00000011c0)="6b1796aff09de7d29ffc5a7377da109baa112c6dd3bfc8b9e8de2748d92d561cd9c34a077292d2d3ef02a867f401ee7a88fba48dc408f90b55452c51a1a2c32febf291ff3676aec6622a30152322cc608e6bebe8aef6e495769a944993511aa4a8aca502eaf6c6875285e9e6a605e63dc5497dbf519c39237e883b8f11484188dd8f71578df1fda99299d771901dab4e95a3e6e4ccab22a80070564461461036d9e7eabd4a8ae58e7c4b248b4fa27510ae02d68c46245485f0963d5d938a82d770158a2fefa6da7900d781", 0x1}, {0x1, 0x1d, &(0x7f00000000c0)="8ae4210c20df6913c62e505f1d9818a70e6e6d16a4e09e27bd3800d99b", 0x1, 0x1}, {0x8, 0x72, &(0x7f00000012c0)="122e21d42a1003de4c01a14a35ba74a986ff032e01c64faf8949a3a0d395684b784b903b1a2317e718d5f3cab350dffbf50125187ecd26106eca7ecb090699c78f1b1742c51647038c64ff50f4debb16af415dd4df7be90505830d658b6b40a8cfeb158393663b6c5808340429d93272cbf9", 0x1, 0x1}, {0x1, 0x69, &(0x7f0000001340)="89695731f8055a2fe9a3dc12a5483ea9bc117fc66d9b6c0f4dd7435dfd7c9f19516b17a4e41eaa5cef3a5dbc13ab1894ff19b162f477600e64b6b4e24aa894c88cc8b845d8f9ebb10dadc8b431d56682342bc6e960adf8effc55823a5fb5ed736b6579ca2e3afd30f6", 0x1, 0x1}]}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000001540)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x81, 0x1, 0x20, 0x20, 0x0, 0x6, 0x10018, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x76, 0x20}, 0x80280, 0x3f, 0x1, 0x8, 0xfffffffffffffff8, 0xb1, 0x1, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r1, 0x2cd88742ede356ee) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2, 0x50, 0x6, 0x1, 0x0, 0x7ff, 0x80, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0xfff, 0x7fffffff}, 0x20, 0x0, 0x8, 0x3, 0x7fff, 0x7ff, 0xb76, 0x0, 0x1, 0x0, 0x35}, 0x0, 0xc, 0xffffffffffffffff, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) 02:02:42 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 29) 02:02:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 12) socket$netlink(0x10, 0x3, 0x0) 02:02:42 executing program 6: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:42 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 32) 02:02:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) dup2(r3, r1) readv(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r4, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f00000000c0)) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 02:02:42 executing program 2: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) r1 = accept(r0, &(0x7f0000000040)=@nl=@unspec, &(0x7f00000000c0)=0x80) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000100)) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x4, 0x3ff, 0xe3ad}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) pwrite64(r2, &(0x7f0000000280), 0x0, 0x2) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x3f7, 0x903, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x20) [ 1687.447154] ieee802154 phy0 wpan0: encryption failed: -22 [ 1687.456536] ieee802154 phy0 wpan0: encryption failed: -22 [ 1687.458140] FAULT_INJECTION: forcing a failure. [ 1687.458140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1687.458180] CPU: 1 PID: 8324 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1687.458208] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1687.463773] Call Trace: [ 1687.463803] dump_stack+0x107/0x167 [ 1687.463833] should_fail.cold+0x5/0xa [ 1687.463869] _copy_from_user+0x2e/0x1b0 [ 1687.463902] __copy_msghdr_from_user+0x91/0x4b0 [ 1687.463927] ? __ia32_sys_shutdown+0x80/0x80 [ 1687.463964] ? ieee802154_sock_release+0xb0/0xb0 [ 1687.463991] ? sock_sendmsg+0x55/0x190 [ 1687.464029] sendmsg_copy_msghdr+0xa1/0x160 [ 1687.464050] ? do_recvmmsg+0x6d0/0x6d0 [ 1687.464082] ? __lock_acquire+0x1657/0x5b00 [ 1687.464134] ___sys_sendmsg+0xc6/0x170 [ 1687.464160] ? sendmsg_copy_msghdr+0x160/0x160 [ 1687.464177] ? vmacache_find+0x55/0x2a0 [ 1687.464207] ? __lockdep_reset_lock+0x180/0x180 [ 1687.464252] ? find_held_lock+0x2c/0x110 [ 1687.464288] ? __might_fault+0xd3/0x180 [ 1687.464311] ? lock_downgrade+0x6d0/0x6d0 [ 1687.464333] ? asm_exc_page_fault+0x1e/0x30 [ 1687.464397] __sys_sendmmsg+0x195/0x470 [ 1687.464432] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1687.464455] ? lock_downgrade+0x6d0/0x6d0 [ 1687.464516] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1687.464546] ? wait_for_completion+0x270/0x270 [ 1687.464576] ? rcu_read_lock_any_held+0x75/0xa0 [ 1687.464594] ? vfs_write+0x354/0xa30 [ 1687.464624] ? fput_many+0x2f/0x1a0 [ 1687.464649] ? ksys_write+0x1a9/0x260 [ 1687.464696] __x64_sys_sendmmsg+0x99/0x100 [ 1687.464720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1687.464742] do_syscall_64+0x33/0x40 [ 1687.464765] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1687.464779] RIP: 0033:0x7f8542659b19 [ 1687.464800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.464813] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1687.464837] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1687.464850] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1687.464863] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.464876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.464901] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1687.471510] FAULT_INJECTION: forcing a failure. [ 1687.471510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1687.515590] CPU: 1 PID: 8326 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1687.516993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1687.518699] Call Trace: [ 1687.519247] dump_stack+0x107/0x167 [ 1687.520003] should_fail.cold+0x5/0xa [ 1687.520793] _copy_from_user+0x2e/0x1b0 [ 1687.521616] __copy_msghdr_from_user+0x91/0x4b0 [ 1687.522592] ? __ia32_sys_shutdown+0x80/0x80 [ 1687.523509] ? ieee802154_sock_release+0xb0/0xb0 [ 1687.524484] ? sock_sendmsg+0x55/0x190 [ 1687.525296] sendmsg_copy_msghdr+0xa1/0x160 [ 1687.526210] ? do_recvmmsg+0x6d0/0x6d0 [ 1687.527055] ? __lock_acquire+0x1657/0x5b00 [ 1687.528026] ___sys_sendmsg+0xc6/0x170 [ 1687.528850] ? sendmsg_copy_msghdr+0x160/0x160 [ 1687.529783] ? vmacache_find+0x55/0x2a0 [ 1687.530652] ? __lockdep_reset_lock+0x180/0x180 [ 1687.530683] ? find_held_lock+0x2c/0x110 [ 1687.530710] ? __might_fault+0xd3/0x180 [ 1687.530730] ? lock_downgrade+0x6d0/0x6d0 [ 1687.530750] ? asm_exc_page_fault+0x1e/0x30 [ 1687.530791] __sys_sendmmsg+0x195/0x470 [ 1687.530817] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1687.530837] ? lock_downgrade+0x6d0/0x6d0 [ 1687.530877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1687.530900] ? wait_for_completion+0x270/0x270 [ 1687.530923] ? rcu_read_lock_any_held+0x75/0xa0 [ 1687.530940] ? vfs_write+0x354/0xa30 [ 1687.530964] ? fput_many+0x2f/0x1a0 [ 1687.530985] ? ksys_write+0x1a9/0x260 [ 1687.531017] __x64_sys_sendmmsg+0x99/0x100 [ 1687.531038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1687.531057] do_syscall_64+0x33/0x40 [ 1687.531078] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1687.531091] RIP: 0033:0x7f867efe2b19 [ 1687.531112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:02:43 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1687.531123] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1687.531145] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1687.531157] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1687.531169] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 02:02:43 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 30) 02:02:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1687.531181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.531193] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:02:43 executing program 6: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:02:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) [ 1687.690081] ieee802154 phy0 wpan0: encryption failed: -22 [ 1687.700459] ieee802154 phy0 wpan0: encryption failed: -22 [ 1687.709191] FAULT_INJECTION: forcing a failure. [ 1687.709191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1687.712764] CPU: 1 PID: 8350 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1687.714221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1687.715988] Call Trace: [ 1687.716540] dump_stack+0x107/0x167 [ 1687.717296] should_fail.cold+0x5/0xa [ 1687.718089] _copy_from_user+0x2e/0x1b0 [ 1687.718943] __copy_msghdr_from_user+0x91/0x4b0 [ 1687.719898] ? __ia32_sys_shutdown+0x80/0x80 [ 1687.720819] ? ieee802154_sock_release+0xb0/0xb0 [ 1687.721807] ? sock_sendmsg+0x55/0x190 [ 1687.722636] sendmsg_copy_msghdr+0xa1/0x160 [ 1687.723527] ? do_recvmmsg+0x6d0/0x6d0 [ 1687.724337] ? __lock_acquire+0x1657/0x5b00 [ 1687.725267] ___sys_sendmsg+0xc6/0x170 [ 1687.726087] ? sendmsg_copy_msghdr+0x160/0x160 [ 1687.727035] ? vmacache_find+0x55/0x2a0 [ 1687.727872] ? __lockdep_reset_lock+0x180/0x180 [ 1687.728866] ? find_held_lock+0x2c/0x110 [ 1687.729733] ? __might_fault+0xd3/0x180 [ 1687.730657] ? lock_downgrade+0x6d0/0x6d0 [ 1687.731528] ? asm_exc_page_fault+0x1e/0x30 [ 1687.732466] __sys_sendmmsg+0x195/0x470 [ 1687.733332] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1687.734241] ? lock_downgrade+0x6d0/0x6d0 [ 1687.735175] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1687.736182] ? wait_for_completion+0x270/0x270 [ 1687.737124] ? rcu_read_lock_any_held+0x75/0xa0 [ 1687.738072] ? vfs_write+0x354/0xa30 [ 1687.738867] ? fput_many+0x2f/0x1a0 [ 1687.739619] ? ksys_write+0x1a9/0x260 [ 1687.740426] __x64_sys_sendmmsg+0x99/0x100 [ 1687.741295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1687.742358] do_syscall_64+0x33/0x40 [ 1687.743123] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1687.744172] RIP: 0033:0x7f8542659b19 [ 1687.744936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.748756] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1687.750314] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1687.751763] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1687.753243] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.754711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.756155] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1704.671805] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:03:09 executing program 6: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x2) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xfffffffffffffff9) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x200000}], 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x301040, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040), 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000100)={0x8, 0x0, &(0x7f00000000c0)=[r2, r1, r0, r4, r0, r0, r5]}, 0x7) 02:03:09 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:03:09 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2100, 0xfffffffffffffffd, 0x0, 0x9, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0xfc, 0x2, 0x6, 0x0, 0xca8000000, 0xa89, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x4, @perf_config_ext={0x101, 0xffffffff}, 0x10200, 0xe6, 0x1, 0x0, 0x401, 0x8, 0x9, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xd, r0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 02:03:09 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 31) 02:03:09 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 33) 02:03:09 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, 0x12, 0x101, 0x0, 0x0, {}, [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4}]}, @nested={0x4}, @nested={0xc, 0x2e, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}]}, 0x2c}}, 0x0) [ 1714.123002] ieee802154 phy0 wpan0: encryption failed: -22 [ 1714.147145] ieee802154 phy0 wpan0: encryption failed: -22 [ 1714.155049] FAULT_INJECTION: forcing a failure. [ 1714.155049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1714.157702] CPU: 1 PID: 8369 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1714.159150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1714.160916] Call Trace: [ 1714.161493] dump_stack+0x107/0x167 [ 1714.162253] should_fail.cold+0x5/0xa [ 1714.163109] _copy_from_user+0x2e/0x1b0 [ 1714.164107] __copy_msghdr_from_user+0x91/0x4b0 [ 1714.165071] ? __ia32_sys_shutdown+0x80/0x80 [ 1714.165999] ? ieee802154_sock_release+0xb0/0xb0 [ 1714.167030] ? sock_sendmsg+0x55/0x190 [ 1714.167985] sendmsg_copy_msghdr+0xa1/0x160 [ 1714.168885] ? do_recvmmsg+0x6d0/0x6d0 [ 1714.169714] ? __lock_acquire+0x1657/0x5b00 [ 1714.170656] ___sys_sendmsg+0xc6/0x170 [ 1714.171517] ? sendmsg_copy_msghdr+0x160/0x160 [ 1714.172466] ? vmacache_find+0x55/0x2a0 [ 1714.173314] ? __lockdep_reset_lock+0x180/0x180 [ 1714.174303] ? find_held_lock+0x2c/0x110 [ 1714.175190] ? __might_fault+0xd3/0x180 [ 1714.176053] ? lock_downgrade+0x6d0/0x6d0 [ 1714.176918] ? asm_exc_page_fault+0x1e/0x30 [ 1714.177859] __sys_sendmmsg+0x195/0x470 [ 1714.178728] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1714.179667] ? lock_downgrade+0x6d0/0x6d0 [ 1714.180339] ieee802154 phy0 wpan0: encryption failed: -22 [ 1714.180598] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1714.180632] ? wait_for_completion+0x270/0x270 [ 1714.183920] ? rcu_read_lock_any_held+0x75/0xa0 [ 1714.184891] ? vfs_write+0x354/0xa30 [ 1714.185676] ? fput_many+0x2f/0x1a0 [ 1714.186446] ? ksys_write+0x1a9/0x260 [ 1714.187306] __x64_sys_sendmmsg+0x99/0x100 [ 1714.188210] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1714.189245] do_syscall_64+0x33/0x40 [ 1714.189315] FAULT_INJECTION: forcing a failure. [ 1714.189315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1714.190039] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1714.190055] RIP: 0033:0x7f8542659b19 [ 1714.190081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1714.190094] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1714.190127] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1714.201609] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1714.203058] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1714.204493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1714.205928] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1714.207534] CPU: 0 PID: 8377 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1714.209025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1714.210731] Call Trace: [ 1714.211276] dump_stack+0x107/0x167 [ 1714.212039] should_fail.cold+0x5/0xa [ 1714.212850] _copy_from_user+0x2e/0x1b0 [ 1714.213687] __copy_msghdr_from_user+0x91/0x4b0 [ 1714.214711] ? __ia32_sys_shutdown+0x80/0x80 [ 1714.215641] ? ieee802154_sock_release+0xb0/0xb0 [ 1714.216624] ? sock_sendmsg+0x55/0x190 [ 1714.217456] sendmsg_copy_msghdr+0xa1/0x160 [ 1714.218330] ? do_recvmmsg+0x6d0/0x6d0 [ 1714.219168] ? __lock_acquire+0x1657/0x5b00 [ 1714.220066] ___sys_sendmsg+0xc6/0x170 [ 1714.220884] ? sendmsg_copy_msghdr+0x160/0x160 [ 1714.221793] ? vmacache_find+0x55/0x2a0 [ 1714.222653] ? __lockdep_reset_lock+0x180/0x180 [ 1714.223606] ? find_held_lock+0x2c/0x110 [ 1714.224455] ? __might_fault+0xd3/0x180 [ 1714.225259] ? lock_downgrade+0x6d0/0x6d0 [ 1714.226125] ? asm_exc_page_fault+0x1e/0x30 [ 1714.227044] __sys_sendmmsg+0x195/0x470 [ 1714.227880] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1714.228750] ? lock_downgrade+0x6d0/0x6d0 [ 1714.229646] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1714.230625] ? wait_for_completion+0x270/0x270 [ 1714.231570] ? rcu_read_lock_any_held+0x75/0xa0 [ 1714.232495] ? vfs_write+0x354/0xa30 [ 1714.233259] ? fput_many+0x2f/0x1a0 [ 1714.234020] ? ksys_write+0x1a9/0x260 [ 1714.234851] __x64_sys_sendmmsg+0x99/0x100 [ 1714.235699] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1714.236763] do_syscall_64+0x33/0x40 [ 1714.237511] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1714.238558] RIP: 0033:0x7f867efe2b19 [ 1714.239325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1714.243131] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1714.244674] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1714.246156] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1714.247639] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1714.249127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1714.250622] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1714.252331] hpet: Lost 2 RTC interrupts [ 1714.255790] netlink: 'syz-executor.4': attribute type 46 has an invalid length. [ 1714.263653] netlink: 'syz-executor.4': attribute type 46 has an invalid length. 02:03:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1714.299174] ieee802154 phy0 wpan0: encryption failed: -22 02:03:09 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) fstat(r2, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 02:03:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c273dce6036a7243ccb68420912981461719e1b598699b308fc937d993e020f305923a75aa45b04172053729accb240ce2f39521f97b146014ab4969cbd8e6d0b6526eeb4e6d53afb94dd0d85eedb3a3680adf798189eb53919b5f194c1abdb009af5d7a4c43f8607ee87d30e13dabfb52f9e9ee668eddb34d506456e63514716f3542c777ee464c1752a43846f22da2d43e9353dc4bd7152abcc0b230b27a9aa10a9062aa4da88303969d0bb421494d9b968e23a198b2387843c05e4fb3315421d8ecc6340cfce2ae4fe8bf654b4d3009c4ea1dc189ea610936634fb937bea56d58650cbb07ad733d751d7a29aa6717", 0xf0}], 0x1) 02:03:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x2) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xfffffffffffffff9) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x200000}], 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x301040, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040), 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000100)={0x8, 0x0, &(0x7f00000000c0)=[r2, r1, r0, r4, r0, r0, r5]}, 0x7) 02:03:10 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1714.545439] ieee802154 phy0 wpan0: encryption failed: -22 [ 1714.578353] ieee802154 phy0 wpan0: encryption failed: -22 [ 1729.131104] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:03:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:03:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c273dce6036a7243ccb68420912981461719e1b598699b308fc937d993e020f305923a75aa45b04172053729accb240ce2f39521f97b146014ab4969cbd8e6d0b6526eeb4e6d53afb94dd0d85eedb3a3680adf798189eb53919b5f194c1abdb009af5d7a4c43f8607ee87d30e13dabfb52f9e9ee668eddb34d506456e63514716f3542c777ee464c1752a43846f22da2d43e9353dc4bd7152abcc0b230b27a9aa10a9062aa4da88303969d0bb421494d9b968e23a198b2387843c05e4fb3315421d8ecc6340cfce2ae4fe8bf654b4d3009c4ea1dc189ea610936634fb937bea56d58650cbb07ad733d751d7a29aa6717", 0xf0}], 0x1) 02:03:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 32) 02:03:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)=',-@,\x00') r1 = socket$inet(0x2, 0xa, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 02:03:33 executing program 2: ioctl$sock_proto_private(0xffffffffffffffff, 0x89e6, &(0x7f0000000000)="dc8fd7d7da64650fe216c07b452a23ade6be9bd146e41ac4e3c028f015ba39963fd42fd1c136c2d9bc57c061ea6be321133bb887a189603913ac3a7acc75529bd177147bb5946d7f6d8b31c6af2d261865f2abe0421b4fdde18ef465ae47b1") ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x2808}, 0x0, 0x0, 0xffffffffffffffff, 0x3) pread64(r0, &(0x7f00000000c0)=""/236, 0xec, 0x6) [ 1737.500884] ieee802154 phy0 wpan0: encryption failed: -22 02:03:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 34) 02:03:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 1737.517844] ieee802154 phy0 wpan0: encryption failed: -22 [ 1737.519509] FAULT_INJECTION: forcing a failure. [ 1737.519509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1737.522058] CPU: 0 PID: 8406 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1737.523489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1737.524188] ieee802154 phy0 wpan0: encryption failed: -22 [ 1737.525178] Call Trace: [ 1737.525209] dump_stack+0x107/0x167 [ 1737.525245] should_fail.cold+0x5/0xa [ 1737.528455] _copy_from_user+0x2e/0x1b0 [ 1737.529280] __copy_msghdr_from_user+0x91/0x4b0 [ 1737.530233] ? __ia32_sys_shutdown+0x80/0x80 [ 1737.531175] ? ieee802154_sock_release+0xb0/0xb0 [ 1737.531435] FAULT_INJECTION: forcing a failure. [ 1737.531435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1737.532147] ? sock_sendmsg+0x55/0x190 [ 1737.532189] sendmsg_copy_msghdr+0xa1/0x160 [ 1737.536110] ? do_recvmmsg+0x6d0/0x6d0 [ 1737.536922] ? __lock_acquire+0x1657/0x5b00 [ 1737.537837] ___sys_sendmsg+0xc6/0x170 [ 1737.538646] ? sendmsg_copy_msghdr+0x160/0x160 [ 1737.539584] ? vmacache_find+0x55/0x2a0 [ 1737.540414] ? __lockdep_reset_lock+0x180/0x180 [ 1737.541385] ? find_held_lock+0x2c/0x110 [ 1737.542260] ? __might_fault+0xd3/0x180 [ 1737.543091] ? lock_downgrade+0x6d0/0x6d0 [ 1737.543951] ? asm_exc_page_fault+0x1e/0x30 [ 1737.544886] __sys_sendmmsg+0x195/0x470 [ 1737.545727] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1737.546606] ? lock_downgrade+0x6d0/0x6d0 [ 1737.547497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1737.548577] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1737.549714] ? ksys_write+0x1a4/0x260 [ 1737.550500] ? ksys_write+0x1a9/0x260 [ 1737.551329] __x64_sys_sendmmsg+0x99/0x100 [ 1737.552186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1737.553244] do_syscall_64+0x33/0x40 [ 1737.553992] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1737.555056] RIP: 0033:0x7f8542659b19 [ 1737.555816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1737.559577] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1737.561123] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1737.562572] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1737.564013] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1737.565453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1737.566918] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1737.568395] CPU: 1 PID: 8419 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1737.568648] hpet: Lost 2 RTC interrupts [ 1737.569883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1737.569898] Call Trace: [ 1737.573141] dump_stack+0x107/0x167 [ 1737.573877] should_fail.cold+0x5/0xa [ 1737.574673] _copy_from_user+0x2e/0x1b0 [ 1737.575491] __copy_msghdr_from_user+0x91/0x4b0 [ 1737.576454] ? __ia32_sys_shutdown+0x80/0x80 [ 1737.577335] ? ieee802154_sock_release+0xb0/0xb0 [ 1737.578313] ? sock_sendmsg+0x55/0x190 [ 1737.579104] sendmsg_copy_msghdr+0xa1/0x160 [ 1737.579990] ? do_recvmmsg+0x6d0/0x6d0 [ 1737.580782] ? __lock_acquire+0x1657/0x5b00 [ 1737.581680] ___sys_sendmsg+0xc6/0x170 [ 1737.582466] ? sendmsg_copy_msghdr+0x160/0x160 [ 1737.583400] ? vmacache_find+0x55/0x2a0 [ 1737.584198] ? __lockdep_reset_lock+0x180/0x180 [ 1737.585137] ? find_held_lock+0x2c/0x110 [ 1737.585966] ? __might_fault+0xd3/0x180 [ 1737.586778] ? lock_downgrade+0x6d0/0x6d0 [ 1737.587640] ? asm_exc_page_fault+0x1e/0x30 [ 1737.588545] __sys_sendmmsg+0x195/0x470 [ 1737.589345] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1737.590319] ? lock_downgrade+0x6d0/0x6d0 [ 1737.591196] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1737.592171] ? wait_for_completion+0x270/0x270 [ 1737.593097] ? rcu_read_lock_any_held+0x75/0xa0 [ 1737.594047] ? vfs_write+0x354/0xa30 [ 1737.594817] ? fput_many+0x2f/0x1a0 [ 1737.595577] ? ksys_write+0x1a9/0x260 [ 1737.596353] __x64_sys_sendmmsg+0x99/0x100 [ 1737.597207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1737.598253] do_syscall_64+0x33/0x40 [ 1737.599032] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1737.600057] RIP: 0033:0x7f867efe2b19 [ 1737.600817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1737.604531] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1737.606169] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1737.607631] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1737.609144] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1737.610608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1737.612072] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1737.677853] ieee802154 phy0 wpan0: encryption failed: -22 02:03:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:03:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}}, 0x0, 0x4000000, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x513000, 0x4) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:03:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 35) 02:03:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c273dce6036a7243ccb68420912981461719e1b598699b308fc937d993e020f305923a75aa45b04172053729accb240ce2f39521f97b146014ab4969cbd8e6d0b6526eeb4e6d53afb94dd0d85eedb3a3680adf798189eb53919b5f194c1abdb009af5d7a4c43f8607ee87d30e13dabfb52f9e9ee668eddb34d506456e63514716f3542c777ee464c1752a43846f22da2d43e9353dc4bd7152abcc0b230b27a9aa10a9062aa4da88303969d0bb421494d9b968e23a198b2387843c05e4fb3315421d8ecc6340cfce2ae4fe8bf654b4d3009c4ea1dc189ea610936634fb937bea56d58650cbb07ad733d751d7a29aa6717", 0xf0}], 0x1) 02:03:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 33) 02:03:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:03:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = syz_io_uring_setup(0x2abd, &(0x7f0000000000)={0x0, 0x8595, 0x2, 0x0, 0x20b}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) dup3(r1, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r3, 0x4, 0x2000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) fork() r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/199, 0x128}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) sendto$inet(r5, &(0x7f00000003c0)="e5f95908ef543b62fab8ca824444f0e837ce9ce1f6e38402cd3b26c4d572b7597c20638441abe49730ca694d3ca68a8e2d450af1f7f7f31e08352be9af2fa695c945dc67ce1d4011e8ff8115797dbafaa213b22c8492f6ed72fcabc65bf21326e6e18fa0b7d69ed66a22e5452e06245714aa3e7fa6a08235232bcb2f38c81a6d266389e72abb6baeb79f4bb771679cafe22e1d30e47bc3995c3e7ba20b3a8aa511db61a226fc4343eba905e4d79857c07ccb1fe02b0e60d75bd079bd71fefafe837c33e39fd25532d21f66659d61586d71d5577e81b28c7116f602e7", 0xdc, 0x90, &(0x7f0000000240)={0x2, 0x4e24, @private=0xa010101}, 0x10) 02:03:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1) [ 1737.899944] ieee802154 phy0 wpan0: encryption failed: -22 [ 1737.902918] ieee802154 phy0 wpan0: encryption failed: -22 [ 1737.910081] FAULT_INJECTION: forcing a failure. [ 1737.910081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1737.912605] CPU: 1 PID: 8440 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1737.914009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1737.915720] Call Trace: [ 1737.916275] dump_stack+0x107/0x167 [ 1737.917029] should_fail.cold+0x5/0xa [ 1737.917836] _copy_from_user+0x2e/0x1b0 [ 1737.918763] __copy_msghdr_from_user+0x91/0x4b0 [ 1737.919756] ? __ia32_sys_shutdown+0x80/0x80 [ 1737.920680] ? ieee802154_sock_release+0xb0/0xb0 [ 1737.921656] ? sock_sendmsg+0x55/0x190 [ 1737.922476] sendmsg_copy_msghdr+0xa1/0x160 [ 1737.923375] ? do_recvmmsg+0x6d0/0x6d0 [ 1737.924183] ? __lock_acquire+0x1657/0x5b00 [ 1737.925104] ___sys_sendmsg+0xc6/0x170 [ 1737.925912] ? sendmsg_copy_msghdr+0x160/0x160 [ 1737.926860] ? vmacache_find+0x55/0x2a0 [ 1737.927693] ? __lockdep_reset_lock+0x180/0x180 [ 1737.928675] ? find_held_lock+0x2c/0x110 [ 1737.929529] ? __might_fault+0xd3/0x180 [ 1737.930355] ? lock_downgrade+0x6d0/0x6d0 [ 1737.931232] ? asm_exc_page_fault+0x1e/0x30 [ 1737.932162] __sys_sendmmsg+0x195/0x470 [ 1737.932989] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1737.933956] ? lock_downgrade+0x6d0/0x6d0 [ 1737.934857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1737.935852] ? wait_for_completion+0x270/0x270 [ 1737.936788] ? rcu_read_lock_any_held+0x75/0xa0 [ 1737.937728] ? vfs_write+0x354/0xa30 [ 1737.938505] ? fput_many+0x2f/0x1a0 [ 1737.939276] ? ksys_write+0x1a9/0x260 [ 1737.940085] __x64_sys_sendmmsg+0x99/0x100 [ 1737.940955] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1737.942005] do_syscall_64+0x33/0x40 [ 1737.942768] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1737.943820] RIP: 0033:0x7f8542659b19 [ 1737.944584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1737.948314] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1737.950090] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1737.951852] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1737.953583] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1737.955316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1737.957049] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1737.987157] ieee802154 phy0 wpan0: encryption failed: -22 [ 1738.007065] FAULT_INJECTION: forcing a failure. [ 1738.007065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1738.008910] ieee802154 phy0 wpan0: encryption failed: -22 [ 1738.009482] CPU: 0 PID: 8446 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1738.011980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.013652] Call Trace: [ 1738.014201] dump_stack+0x107/0x167 [ 1738.014976] should_fail.cold+0x5/0xa [ 1738.015771] _copy_from_user+0x2e/0x1b0 [ 1738.016597] __copy_msghdr_from_user+0x91/0x4b0 [ 1738.017546] ? __ia32_sys_shutdown+0x80/0x80 [ 1738.018456] ? ieee802154_sock_release+0xb0/0xb0 [ 1738.019544] ? sock_sendmsg+0x55/0x190 [ 1738.020509] sendmsg_copy_msghdr+0xa1/0x160 [ 1738.021544] ? do_recvmmsg+0x6d0/0x6d0 [ 1738.022516] ? __lock_acquire+0x1657/0x5b00 [ 1738.023598] ___sys_sendmsg+0xc6/0x170 [ 1738.024542] ? sendmsg_copy_msghdr+0x160/0x160 [ 1738.025663] ? __lockdep_reset_lock+0x180/0x180 [ 1738.026634] ? trace_hardirqs_on+0x5b/0x180 [ 1738.027547] ? find_held_lock+0x2c/0x110 [ 1738.028381] ? __might_fault+0xd3/0x180 [ 1738.029190] ? lock_downgrade+0x6d0/0x6d0 [ 1738.030035] ? io_schedule_timeout+0x140/0x140 [ 1738.031009] __sys_sendmmsg+0x195/0x470 [ 1738.031828] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1738.032703] ? lock_downgrade+0x6d0/0x6d0 [ 1738.033577] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1738.034564] ? wait_for_completion+0x270/0x270 [ 1738.035637] ? rcu_read_lock_any_held+0x75/0xa0 [ 1738.036743] ? vfs_write+0x354/0xa30 [ 1738.037640] ? fput_many+0x2f/0x1a0 [ 1738.038512] ? ksys_write+0x1a9/0x260 [ 1738.039464] __x64_sys_sendmmsg+0x99/0x100 [ 1738.040471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.041708] do_syscall_64+0x33/0x40 [ 1738.042610] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.043840] RIP: 0033:0x7f867efe2b19 [ 1738.044741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.049117] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1738.050923] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1738.052582] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1738.054257] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.055940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.057610] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1738.059620] hpet: Lost 3 RTC interrupts [ 1751.970023] kmemleak: 39 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:03:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c00000012000105000000000000000000007f00"/56, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x4c}}, 0x0) 02:03:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:58 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 34) 02:03:58 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 36) [ 1762.498924] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1762.505923] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1762.515043] ieee802154 phy0 wpan0: encryption failed: -22 02:03:58 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:03:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c273dce6036a7243ccb68420912981461719e1b598699b308fc937d993e020f305923a75aa45b04172053729accb240ce2f39521f97b146014ab4969cbd8e6d0b6526eeb4e6d53afb94dd0d85eedb3a3680adf798189eb53919b5f194c1abdb009af5d7a4c43f8607ee87d30e13dabfb52f9e9ee668eddb34d506456e63514716f3542c777ee464c1752a43846f22da2d43e9353dc4bd7152abcc0b230b27a9aa10a9062aa4da88303969d0bb421494d9b968e23a198b2387843c05e4fb3315421d8ecc6340cfce2ae4fe8bf654b4d3009c4ea1dc189ea610936634fb937bea56d58650cbb07ad733d751d7a29aa6717", 0xf0}], 0x1) 02:03:58 executing program 5: accept4(0xffffffffffffffff, &(0x7f0000000140)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000000)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:03:58 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1762.532500] FAULT_INJECTION: forcing a failure. [ 1762.532500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.535074] CPU: 0 PID: 8471 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1762.536526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.538259] Call Trace: [ 1762.538622] ieee802154 phy0 wpan0: encryption failed: -22 [ 1762.538810] dump_stack+0x107/0x167 [ 1762.538843] should_fail.cold+0x5/0xa [ 1762.538880] _copy_from_user+0x2e/0x1b0 [ 1762.542388] __copy_msghdr_from_user+0x91/0x4b0 [ 1762.543370] ? __ia32_sys_shutdown+0x80/0x80 [ 1762.544336] ? ieee802154_sock_release+0xb0/0xb0 [ 1762.545317] ? sock_sendmsg+0x55/0x190 [ 1762.546145] sendmsg_copy_msghdr+0xa1/0x160 [ 1762.547045] ? do_recvmmsg+0x6d0/0x6d0 [ 1762.547883] ? __lock_acquire+0x1657/0x5b00 [ 1762.548811] ___sys_sendmsg+0xc6/0x170 [ 1762.549636] ? sendmsg_copy_msghdr+0x160/0x160 [ 1762.550578] ? vmacache_find+0x55/0x2a0 [ 1762.551426] ? __lockdep_reset_lock+0x180/0x180 [ 1762.552402] ? find_held_lock+0x2c/0x110 [ 1762.553256] ? __might_fault+0xd3/0x180 [ 1762.554073] ? lock_downgrade+0x6d0/0x6d0 [ 1762.554935] ? asm_exc_page_fault+0x1e/0x30 [ 1762.555883] __sys_sendmmsg+0x195/0x470 [ 1762.556725] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1762.557616] ? lock_downgrade+0x6d0/0x6d0 [ 1762.558513] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.559536] ? wait_for_completion+0x270/0x270 [ 1762.560477] ? rcu_read_lock_any_held+0x75/0xa0 [ 1762.561434] ? vfs_write+0x354/0xa30 [ 1762.562213] ? fput_many+0x2f/0x1a0 [ 1762.562972] ? ksys_write+0x1a9/0x260 [ 1762.563809] __x64_sys_sendmmsg+0x99/0x100 [ 1762.564680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1762.565729] do_syscall_64+0x33/0x40 [ 1762.566501] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1762.567580] RIP: 0033:0x7f867efe2b19 [ 1762.568353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.572126] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1762.573685] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1762.575130] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1762.576602] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.578048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.579507] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1762.581246] hpet: Lost 2 RTC interrupts 02:03:58 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc00c2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) utime(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={0x48c000a6, 0x300000000}) setresuid(0xffffffffffffffff, r1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) [ 1762.600709] ieee802154 phy0 wpan0: encryption failed: -22 [ 1762.608049] FAULT_INJECTION: forcing a failure. [ 1762.608049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.610490] CPU: 0 PID: 8478 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1762.611929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.613636] Call Trace: [ 1762.614196] dump_stack+0x107/0x167 [ 1762.614964] should_fail.cold+0x5/0xa [ 1762.615799] _copy_from_user+0x2e/0x1b0 [ 1762.616642] __copy_msghdr_from_user+0x91/0x4b0 [ 1762.617615] ? __ia32_sys_shutdown+0x80/0x80 [ 1762.618540] ? ieee802154_sock_release+0xb0/0xb0 [ 1762.619550] ? sock_sendmsg+0x55/0x190 [ 1762.620386] sendmsg_copy_msghdr+0xa1/0x160 [ 1762.621286] ? do_recvmmsg+0x6d0/0x6d0 [ 1762.622140] ? __lock_acquire+0x1657/0x5b00 [ 1762.623062] ___sys_sendmsg+0xc6/0x170 [ 1762.623911] ? sendmsg_copy_msghdr+0x160/0x160 [ 1762.624853] ? vmacache_find+0x55/0x2a0 [ 1762.625568] ieee802154 phy0 wpan0: encryption failed: -22 [ 1762.625678] ? __lockdep_reset_lock+0x180/0x180 [ 1762.625728] ? find_held_lock+0x2c/0x110 [ 1762.628645] ? __might_fault+0xd3/0x180 [ 1762.629481] ? lock_downgrade+0x6d0/0x6d0 [ 1762.630341] ? asm_exc_page_fault+0x1e/0x30 [ 1762.631270] __sys_sendmmsg+0x195/0x470 [ 1762.632104] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1762.633044] ? lock_downgrade+0x6d0/0x6d0 [ 1762.633932] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.634934] ? wait_for_completion+0x270/0x270 [ 1762.635898] ? rcu_read_lock_any_held+0x75/0xa0 [ 1762.636862] ? vfs_write+0x354/0xa30 [ 1762.637664] ? fput_many+0x2f/0x1a0 [ 1762.638426] ? ksys_write+0x1a9/0x260 [ 1762.639247] __x64_sys_sendmmsg+0x99/0x100 [ 1762.640153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1762.641216] do_syscall_64+0x33/0x40 [ 1762.642007] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1762.643061] RIP: 0033:0x7f8542659b19 [ 1762.643849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.647641] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1762.649217] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1762.650682] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1762.652151] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.653618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.655077] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1762.656872] hpet: Lost 2 RTC interrupts 02:03:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x2}, 0x40002, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000000)={0x0, 0x9, [0x80000000, 0x80, 0x2, 0x1, 0x4, 0x3ff]}) 02:03:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:03:58 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:03:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000000)={0x8, 'veth1_macvtap\x00', {'syzkaller0\x00'}, 0x100}) sendmsg$AUDIT_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x10}, 0x10}}, 0x0) 02:03:58 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 37) 02:03:58 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 35) 02:03:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1762.908064] ieee802154 phy0 wpan0: encryption failed: -22 [ 1762.925150] FAULT_INJECTION: forcing a failure. [ 1762.925150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.927615] CPU: 1 PID: 8504 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1762.929016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.930777] Call Trace: [ 1762.931381] dump_stack+0x107/0x167 [ 1762.932183] should_fail.cold+0x5/0xa [ 1762.933023] _copy_from_user+0x2e/0x1b0 [ 1762.933896] __copy_msghdr_from_user+0x91/0x4b0 [ 1762.934978] ? __ia32_sys_shutdown+0x80/0x80 [ 1762.935916] ? ieee802154_sock_release+0xb0/0xb0 [ 1762.936901] ? sock_sendmsg+0x55/0x190 [ 1762.937729] sendmsg_copy_msghdr+0xa1/0x160 [ 1762.938611] ? do_recvmmsg+0x6d0/0x6d0 [ 1762.939444] ? __lock_acquire+0x1657/0x5b00 [ 1762.940370] ___sys_sendmsg+0xc6/0x170 [ 1762.941182] ? sendmsg_copy_msghdr+0x160/0x160 [ 1762.942114] ? vmacache_find+0x55/0x2a0 [ 1762.942942] ? __lockdep_reset_lock+0x180/0x180 [ 1762.943937] ? find_held_lock+0x2c/0x110 [ 1762.944793] ? __might_fault+0xd3/0x180 [ 1762.945615] ? lock_downgrade+0x6d0/0x6d0 [ 1762.946496] ? asm_exc_page_fault+0x1e/0x30 [ 1762.947446] __sys_sendmmsg+0x195/0x470 [ 1762.948279] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1762.949172] ? lock_downgrade+0x6d0/0x6d0 [ 1762.950200] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.951210] ? wait_for_completion+0x270/0x270 [ 1762.952182] ? rcu_read_lock_any_held+0x75/0xa0 [ 1762.953162] ? vfs_write+0x354/0xa30 [ 1762.953958] ? fput_many+0x2f/0x1a0 [ 1762.954710] ? ksys_write+0x1a9/0x260 [ 1762.955569] __x64_sys_sendmmsg+0x99/0x100 [ 1762.956463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1762.957563] do_syscall_64+0x33/0x40 [ 1762.958357] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1762.959424] RIP: 0033:0x7f8542659b19 [ 1762.960206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.964045] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1762.965693] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1762.967178] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1762.968642] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.970108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.971567] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1762.975386] ieee802154 phy0 wpan0: encryption failed: -22 [ 1763.009343] FAULT_INJECTION: forcing a failure. [ 1763.009343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1763.011795] CPU: 0 PID: 8505 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1763.013277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1763.015009] Call Trace: [ 1763.015602] dump_stack+0x107/0x167 [ 1763.016399] should_fail.cold+0x5/0xa [ 1763.017208] _copy_from_user+0x2e/0x1b0 [ 1763.018031] __copy_msghdr_from_user+0x91/0x4b0 [ 1763.018997] ? __ia32_sys_shutdown+0x80/0x80 [ 1763.019930] ? ieee802154_sock_release+0xb0/0xb0 [ 1763.020910] ? sock_sendmsg+0x55/0x190 [ 1763.021723] sendmsg_copy_msghdr+0xa1/0x160 [ 1763.022612] ? do_recvmmsg+0x6d0/0x6d0 [ 1763.023445] ? __lock_acquire+0x1657/0x5b00 [ 1763.024357] ___sys_sendmsg+0xc6/0x170 [ 1763.025161] ? sendmsg_copy_msghdr+0x160/0x160 [ 1763.026107] ? vmacache_find+0x55/0x2a0 [ 1763.026917] ? __lockdep_reset_lock+0x180/0x180 [ 1763.027911] ? find_held_lock+0x2c/0x110 [ 1763.028765] ? __might_fault+0xd3/0x180 [ 1763.029579] ? lock_downgrade+0x6d0/0x6d0 [ 1763.030432] ? asm_exc_page_fault+0x1e/0x30 [ 1763.031393] __sys_sendmmsg+0x195/0x470 [ 1763.032205] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1763.033112] ? lock_downgrade+0x6d0/0x6d0 [ 1763.034020] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1763.035043] ? wait_for_completion+0x270/0x270 [ 1763.035998] ? rcu_read_lock_any_held+0x75/0xa0 [ 1763.036941] ? vfs_write+0x354/0xa30 [ 1763.037726] ? fput_many+0x2f/0x1a0 [ 1763.038485] ? ksys_write+0x1a9/0x260 [ 1763.039305] __x64_sys_sendmmsg+0x99/0x100 [ 1763.040180] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.041248] do_syscall_64+0x33/0x40 [ 1763.042013] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1763.043080] RIP: 0033:0x7f867efe2b19 [ 1763.043874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.047736] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1763.049276] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1763.050747] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1763.052253] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1763.053753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1763.055253] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1763.057043] hpet: Lost 2 RTC interrupts [ 1778.131390] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:04:24 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 38) 02:04:24 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:04:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x46842, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r3, &(0x7f0000000100), &(0x7f0000000180)=0xc) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='\'+#*]\xfd\'\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffff9c) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f00000002c0)={0x5, 0x76}) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x5, r0, &(0x7f0000000100)="17b8b0916cea5cdf5b1f411c7d0174076b", 0x11, 0x1, 0x0, 0x2, r3}]) io_submit(r1, 0x4, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0xd, 0x0, 0x0, r0, 0x0, 0xffffffc8}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:04:24 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x25, 0x7, 0x1, 0x7f, 0x0, 0x1, 0x11400, 0x18, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_config_ext={0x7, 0x8001}, 0x118, 0x3, 0x6, 0x6, 0x0, 0x7, 0x8d, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0xc, r0, 0x0) 02:04:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:04:24 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:24 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 36) [ 1788.609560] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.619325] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.623195] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.631034] FAULT_INJECTION: forcing a failure. [ 1788.631034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1788.633483] CPU: 0 PID: 8524 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1788.634098] FAULT_INJECTION: forcing a failure. [ 1788.634098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1788.634881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.634890] Call Trace: [ 1788.634920] dump_stack+0x107/0x167 [ 1788.634954] should_fail.cold+0x5/0xa [ 1788.641069] _copy_from_user+0x2e/0x1b0 [ 1788.641903] __copy_msghdr_from_user+0x91/0x4b0 [ 1788.642869] ? __ia32_sys_shutdown+0x80/0x80 [ 1788.643800] ? ieee802154_sock_release+0xb0/0xb0 [ 1788.644779] ? sock_sendmsg+0x55/0x190 [ 1788.645591] sendmsg_copy_msghdr+0xa1/0x160 [ 1788.646478] ? do_recvmmsg+0x6d0/0x6d0 [ 1788.647292] ? __lock_acquire+0x1657/0x5b00 [ 1788.648233] ___sys_sendmsg+0xc6/0x170 [ 1788.649039] ? sendmsg_copy_msghdr+0x160/0x160 [ 1788.649970] ? vmacache_find+0x55/0x2a0 [ 1788.650798] ? __lockdep_reset_lock+0x180/0x180 [ 1788.651784] ? find_held_lock+0x2c/0x110 [ 1788.652633] ? __might_fault+0xd3/0x180 [ 1788.653452] ? lock_downgrade+0x6d0/0x6d0 [ 1788.654303] ? asm_exc_page_fault+0x1e/0x30 [ 1788.655233] __sys_sendmmsg+0x195/0x470 [ 1788.656073] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1788.656961] ? lock_downgrade+0x6d0/0x6d0 [ 1788.657857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1788.658856] ? wait_for_completion+0x270/0x270 [ 1788.659833] ? rcu_read_lock_any_held+0x75/0xa0 [ 1788.660785] ? vfs_write+0x354/0xa30 [ 1788.661562] ? fput_many+0x2f/0x1a0 [ 1788.662318] ? ksys_write+0x1a9/0x260 [ 1788.663128] __x64_sys_sendmmsg+0x99/0x100 [ 1788.664014] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.665073] do_syscall_64+0x33/0x40 [ 1788.665842] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1788.666898] RIP: 0033:0x7f8542659b19 [ 1788.667675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.671430] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1788.673012] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1788.674473] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1788.675943] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.677403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.678863] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1788.680405] CPU: 1 PID: 8522 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1788.680676] hpet: Lost 2 RTC interrupts [ 1788.682044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.682059] Call Trace: [ 1788.685380] dump_stack+0x107/0x167 [ 1788.686214] should_fail.cold+0x5/0xa [ 1788.687082] _copy_from_user+0x2e/0x1b0 [ 1788.687994] __copy_msghdr_from_user+0x91/0x4b0 [ 1788.689041] ? __ia32_sys_shutdown+0x80/0x80 [ 1788.690051] ? ieee802154_sock_release+0xb0/0xb0 [ 1788.691126] ? sock_sendmsg+0x55/0x190 [ 1788.692037] sendmsg_copy_msghdr+0xa1/0x160 [ 1788.693010] ? do_recvmmsg+0x6d0/0x6d0 [ 1788.693898] ? __lock_acquire+0x1657/0x5b00 [ 1788.694887] ___sys_sendmsg+0xc6/0x170 [ 1788.695779] ? sendmsg_copy_msghdr+0x160/0x160 [ 1788.696806] ? vmacache_find+0x55/0x2a0 [ 1788.697707] ? __lockdep_reset_lock+0x180/0x180 [ 1788.698764] ? find_held_lock+0x2c/0x110 [ 1788.699708] ? __might_fault+0xd3/0x180 [ 1788.700650] ? lock_downgrade+0x6d0/0x6d0 [ 1788.701585] ? asm_exc_page_fault+0x1e/0x30 [ 1788.702578] __sys_sendmmsg+0x195/0x470 [ 1788.703482] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1788.704459] ? lock_downgrade+0x6d0/0x6d0 [ 1788.705412] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1788.706501] ? wait_for_completion+0x270/0x270 [ 1788.707548] ? rcu_read_lock_any_held+0x75/0xa0 [ 1788.708598] ? vfs_write+0x354/0xa30 [ 1788.709440] ? fput_many+0x2f/0x1a0 [ 1788.710264] ? ksys_write+0x1a9/0x260 [ 1788.711136] __x64_sys_sendmmsg+0x99/0x100 [ 1788.712099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.713259] do_syscall_64+0x33/0x40 [ 1788.714106] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1788.715262] RIP: 0033:0x7f867efe2b19 [ 1788.716158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.720296] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1788.722003] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1788.723607] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1788.725209] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.726817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.728438] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1788.763827] ieee802154 phy0 wpan0: encryption failed: -22 02:04:24 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 37) 02:04:24 executing program 3: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x20d315) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x16c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x60}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_IE={0x12b, 0x2a, [@mesh_config={0x71, 0x7, {0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x6, 0x69}}, @perr={0x84, 0xd0, {0xff, 0xe, [@not_ext={{}, @device_b, 0x81, "", 0x8}, @not_ext={{}, @device_a, 0x19, "", 0x16}, @not_ext={{}, @device_b, 0x1, "", 0x18}, @ext={{}, @broadcast, 0x10001, @device_a, 0x33}, @not_ext={{}, @device_b, 0x0, "", 0xd}, @ext={{}, @broadcast, 0x0, @broadcast, 0x9}, @ext={{}, @device_b, 0x5, @device_b, 0x22}, @not_ext={{}, @device_b, 0x8, "", 0x19}, @not_ext={{}, @device_a, 0x2a4, "", 0x2e}, @ext={{}, @device_a, 0xde1c902e, @broadcast, 0x4}, @not_ext={{}, @device_a, 0x20, "", 0x19}, @not_ext={{}, @device_b, 0x0, "", 0x5}, @not_ext={{}, @device_b, 0x8, "", 0x2}, @not_ext={{}, @broadcast, 0x2, "", 0x5}]}}, @ibss={0x6, 0x2, 0x1f}, @preq={0x82, 0x46, @not_ext={{0x1, 0x0, 0x1}, 0x8d, 0xe1, 0x1, @device_b, 0x0, "", 0x5, 0x27a8, 0x4, [{{0x1, 0x0, 0x1}, @broadcast, 0x92}, {{0x0, 0x0, 0x1}, @broadcast, 0x7}, {{0x1, 0x0, 0x1}, @broadcast, 0x7c3}, {{0x1}, @device_b, 0xff}]}}]}, @NL80211_ATTR_IE={0xa, 0x2a, [@dsss={0x3, 0x1, 0x74}, @dsss={0x3, 0x1, 0x99}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8004000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, r0, 0x0) flistxattr(r0, &(0x7f0000000040)=""/5, 0x5) socket$packet(0x11, 0x0, 0x300) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x10001, 0x0) 02:04:24 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:24 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1788.882491] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.909043] FAULT_INJECTION: forcing a failure. [ 1788.909043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1788.911463] CPU: 0 PID: 8536 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1788.913255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.915267] Call Trace: [ 1788.915971] dump_stack+0x107/0x167 [ 1788.916875] should_fail.cold+0x5/0xa [ 1788.917923] _copy_from_user+0x2e/0x1b0 [ 1788.918949] __copy_msghdr_from_user+0x91/0x4b0 [ 1788.920102] ? __ia32_sys_shutdown+0x80/0x80 [ 1788.921192] ? ieee802154_sock_release+0xb0/0xb0 [ 1788.922520] ? sock_sendmsg+0x55/0x190 [ 1788.923552] sendmsg_copy_msghdr+0xa1/0x160 [ 1788.924498] ? do_recvmmsg+0x6d0/0x6d0 [ 1788.924840] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.925316] ? __lock_acquire+0x1657/0x5b00 [ 1788.927360] ___sys_sendmsg+0xc6/0x170 [ 1788.928219] ? sendmsg_copy_msghdr+0x160/0x160 [ 1788.929192] ? vmacache_find+0x55/0x2a0 [ 1788.930257] ? __lockdep_reset_lock+0x180/0x180 [ 1788.931327] ? find_held_lock+0x2c/0x110 [ 1788.932217] ? __might_fault+0xd3/0x180 [ 1788.933058] ? lock_downgrade+0x6d0/0x6d0 [ 1788.933921] ? asm_exc_page_fault+0x1e/0x30 [ 1788.934874] __sys_sendmmsg+0x195/0x470 [ 1788.935747] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1788.936656] ? lock_downgrade+0x6d0/0x6d0 [ 1788.937607] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1788.938880] ? wait_for_completion+0x270/0x270 [ 1788.940097] ? rcu_read_lock_any_held+0x75/0xa0 [ 1788.941320] ? vfs_write+0x354/0xa30 [ 1788.942325] ? fput_many+0x2f/0x1a0 [ 1788.943304] ? ksys_write+0x1a9/0x260 [ 1788.944367] __x64_sys_sendmmsg+0x99/0x100 [ 1788.945494] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.946855] do_syscall_64+0x33/0x40 [ 1788.947875] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1788.949208] RIP: 0033:0x7f8542659b19 [ 1788.950048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.954804] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1788.954935] ieee802154 phy0 wpan0: encryption failed: -22 [ 1788.956719] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1788.956734] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1788.956747] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.956758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.956771] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1788.957136] hpet: Lost 2 RTC interrupts [ 1803.707933] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:04:47 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 38) 02:04:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() [ 1812.446038] ieee802154 phy0 wpan0: encryption failed: -22 02:04:47 executing program 3: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x1, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x0, @private=0xa010102, 0x4e23, 0x2, 'dh\x00', 0x2f, 0x1}, 0x2c) r3 = geteuid() r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001e00210e00000000000000c6f2cdfe4c8f4faee07dde860b6422dc19f790d0a0363281f12a41566f1de92901005c59f17167cd949683c378171ced59"], 0x14}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x12000200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=@flushsa={0x248, 0x1c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x3c}, [@replay_thresh={0x8, 0xb, 0x1ff}, @algo_auth={0x12d, 0x1, {{'sha224\x00'}, 0x728, "18b61bb7799262b8db40d9f50cd57000c0f3ed2b5674c75b7e7fd0a92c74d841b8d6255e29f94fad4c73b94b930392ad3ee0dd6cb00b891384bceca1aa4493a99010d78f08a56ab4d881a04d19485e39e3b0ebc233e5821af014e635d53c16398512fe2872237ab50588e6650038d986a3d405ff76f3042b01e4d945b442e77436a34fef23af7ab3ece27ba73de7e2cb92b00a87a114203d152ed9486e652a82ffb5ec3a8647205dfd9421211dbff6f2c8c2b08fa50cccec9efbf8e528b7c323b26e9e2553f3230085244e71e583c3018093e9819c76a6839a13b512efd7589210f5011af1"}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x200}, @coaddr={0x14, 0xe, @in=@loopback}, @mark={0xc, 0x15, {0x35075d, 0x3}}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd25, 0x1}}, @tmpl={0xc4, 0x5, [{{@in=@local, 0x4d5, 0x3c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x34}, 0x0, 0x0, 0x3, 0x7, 0x8, 0xeb6, 0x200}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0x32}, 0xa, @in=@empty, 0x3504, 0x0, 0x0, 0x5, 0x2ad8f7d9, 0x3f, 0x2}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d3, 0x6c}, 0xa, @in6=@mcast2, 0x3507, 0x1, 0x3, 0x0, 0x8, 0x6, 0x6}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40044}, 0xc0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x80002, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, 'dh\x00'}}, {@version_u}, {@cache_loose}], [{@euid_gt={'euid>', 0xee01}}, {@fowner_gt={'fowner>', r3}}]}}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 02:04:48 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 39) 02:04:48 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:04:48 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:04:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1812.482107] FAULT_INJECTION: forcing a failure. [ 1812.482107] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1812.483606] ieee802154 phy0 wpan0: encryption failed: -22 [ 1812.484723] CPU: 1 PID: 8555 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1812.487152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1812.488864] Call Trace: [ 1812.489420] dump_stack+0x107/0x167 [ 1812.490187] should_fail.cold+0x5/0xa [ 1812.490987] _copy_from_user+0x2e/0x1b0 [ 1812.491840] __copy_msghdr_from_user+0x91/0x4b0 [ 1812.492812] ? __ia32_sys_shutdown+0x80/0x80 [ 1812.493195] FAULT_INJECTION: forcing a failure. [ 1812.493195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1812.493726] ? ieee802154_sock_release+0xb0/0xb0 [ 1812.493755] ? sock_sendmsg+0x55/0x190 [ 1812.498113] sendmsg_copy_msghdr+0xa1/0x160 [ 1812.499007] ? do_recvmmsg+0x6d0/0x6d0 [ 1812.499810] ? __lock_acquire+0x1657/0x5b00 [ 1812.500765] ___sys_sendmsg+0xc6/0x170 [ 1812.501582] ? sendmsg_copy_msghdr+0x160/0x160 [ 1812.502529] ? vmacache_find+0x55/0x2a0 [ 1812.503363] ? __lockdep_reset_lock+0x180/0x180 [ 1812.504357] ? find_held_lock+0x2c/0x110 [ 1812.505210] ? __might_fault+0xd3/0x180 [ 1812.506034] ? lock_downgrade+0x6d0/0x6d0 [ 1812.506882] ? asm_exc_page_fault+0x1e/0x30 [ 1812.507833] __sys_sendmmsg+0x195/0x470 [ 1812.508657] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1812.509552] ? lock_downgrade+0x6d0/0x6d0 [ 1812.510436] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1812.511442] ? wait_for_completion+0x270/0x270 [ 1812.512403] ? rcu_read_lock_any_held+0x75/0xa0 [ 1812.513468] ? vfs_write+0x354/0xa30 [ 1812.514244] ? fput_many+0x2f/0x1a0 [ 1812.515006] ? ksys_write+0x1a9/0x260 [ 1812.515810] __x64_sys_sendmmsg+0x99/0x100 [ 1812.516703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1812.517754] do_syscall_64+0x33/0x40 [ 1812.518533] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1812.519600] RIP: 0033:0x7f8542659b19 [ 1812.520383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1812.524168] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1812.525744] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1812.527210] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1812.528770] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1812.530229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1812.531700] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1812.533257] CPU: 0 PID: 8561 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1812.534774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1812.536582] Call Trace: [ 1812.537181] dump_stack+0x107/0x167 [ 1812.537993] should_fail.cold+0x5/0xa [ 1812.538848] _copy_from_user+0x2e/0x1b0 [ 1812.539731] __copy_msghdr_from_user+0x91/0x4b0 [ 1812.540759] ? __ia32_sys_shutdown+0x80/0x80 [ 1812.541746] ? ieee802154_sock_release+0xb0/0xb0 [ 1812.542795] ? sock_sendmsg+0x55/0x190 [ 1812.543664] sendmsg_copy_msghdr+0xa1/0x160 [ 1812.544663] ? do_recvmmsg+0x6d0/0x6d0 [ 1812.545524] ? __lock_acquire+0x1657/0x5b00 [ 1812.546503] ___sys_sendmsg+0xc6/0x170 [ 1812.547358] ? sendmsg_copy_msghdr+0x160/0x160 [ 1812.548360] ? vmacache_find+0x55/0x2a0 [ 1812.549238] ? __lockdep_reset_lock+0x180/0x180 [ 1812.550277] ? find_held_lock+0x2c/0x110 [ 1812.551182] ? __might_fault+0xd3/0x180 [ 1812.552065] ? lock_downgrade+0x6d0/0x6d0 [ 1812.553006] ? asm_exc_page_fault+0x1e/0x30 [ 1812.553993] __sys_sendmmsg+0x195/0x470 [ 1812.554896] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1812.555852] ? lock_downgrade+0x6d0/0x6d0 [ 1812.556822] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1812.557890] ? wait_for_completion+0x270/0x270 [ 1812.558920] ? rcu_read_lock_any_held+0x75/0xa0 [ 1812.559951] ? vfs_write+0x354/0xa30 [ 1812.560786] ? fput_many+0x2f/0x1a0 [ 1812.561596] ? ksys_write+0x1a9/0x260 [ 1812.562455] __x64_sys_sendmmsg+0x99/0x100 [ 1812.563382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1812.564514] do_syscall_64+0x33/0x40 [ 1812.565326] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1812.566442] RIP: 0033:0x7f867efe2b19 [ 1812.567255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1812.571251] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1812.572955] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1812.574548] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1812.576150] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1812.577738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1812.579327] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1812.581197] hpet: Lost 2 RTC interrupts 02:04:48 executing program 3: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1812.617330] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=30 sclass=netlink_audit_socket pid=8570 comm=syz-executor.5 [ 1812.627463] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=28 sclass=netlink_audit_socket pid=8563 comm=syz-executor.5 [ 1812.641364] ieee802154 phy0 wpan0: encryption failed: -22 02:04:48 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3dc67deca9294a1d4c8e0332274eaa325fa9739a1b6083f936f0aa6490ca40608d766bde36ccf25bc143e0b6fc82", @ANYRESHEX=r1]) 02:04:48 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1812.697633] ieee802154 phy0 wpan0: encryption failed: -22 [ 1812.733453] 9pnet: Insufficient options for proto=fd [ 1812.767138] 9pnet: Insufficient options for proto=fd [ 1827.465003] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:05:12 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:12 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 39) 02:05:12 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#!*'], 0xb8) close(r1) pwrite64(r1, &(0x7f0000000000)="1c45fa64f9fc3365db4709", 0xb, 0xfffffffffffffffe) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 02:05:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x4084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000180)=0x1) 02:05:12 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 40) 02:05:12 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:05:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1837.077349] ieee802154 phy0 wpan0: encryption failed: -22 [ 1837.083406] FAULT_INJECTION: forcing a failure. [ 1837.083406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1837.083482] ieee802154 phy0 wpan0: encryption failed: -22 [ 1837.085917] CPU: 1 PID: 8600 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1837.085935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.090290] Call Trace: [ 1837.090780] ieee802154 phy0 wpan0: encryption failed: -22 [ 1837.090885] dump_stack+0x107/0x167 [ 1837.092923] should_fail.cold+0x5/0xa [ 1837.093723] _copy_from_user+0x2e/0x1b0 [ 1837.094551] __copy_msghdr_from_user+0x91/0x4b0 [ 1837.095129] FAULT_INJECTION: forcing a failure. [ 1837.095129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1837.095522] ? __ia32_sys_shutdown+0x80/0x80 [ 1837.098776] ? ieee802154_sock_release+0xb0/0xb0 [ 1837.099769] ? sock_sendmsg+0x55/0x190 [ 1837.100573] sendmsg_copy_msghdr+0xa1/0x160 [ 1837.101459] ? do_recvmmsg+0x6d0/0x6d0 [ 1837.102267] ? __lock_acquire+0x1657/0x5b00 [ 1837.103171] ___sys_sendmsg+0xc6/0x170 [ 1837.103969] ? sendmsg_copy_msghdr+0x160/0x160 [ 1837.104923] ? vmacache_find+0x55/0x2a0 [ 1837.105744] ? __lockdep_reset_lock+0x180/0x180 [ 1837.106714] ? find_held_lock+0x2c/0x110 [ 1837.107618] ? __might_fault+0xd3/0x180 [ 1837.108440] ? lock_downgrade+0x6d0/0x6d0 [ 1837.109294] ? asm_exc_page_fault+0x1e/0x30 [ 1837.110212] __sys_sendmmsg+0x195/0x470 [ 1837.111029] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1837.111921] ? lock_downgrade+0x6d0/0x6d0 [ 1837.112800] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1837.113795] ? wait_for_completion+0x270/0x270 [ 1837.114745] ? rcu_read_lock_any_held+0x75/0xa0 [ 1837.115700] ? vfs_write+0x354/0xa30 [ 1837.116482] ? fput_many+0x2f/0x1a0 [ 1837.117231] ? ksys_write+0x1a9/0x260 [ 1837.118033] __x64_sys_sendmmsg+0x99/0x100 [ 1837.118916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.119975] do_syscall_64+0x33/0x40 [ 1837.120752] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.121810] RIP: 0033:0x7f867efe2b19 [ 1837.122649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.126457] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1837.128025] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1837.129488] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1837.130955] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1837.132425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1837.133890] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1837.135392] CPU: 0 PID: 8603 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1837.136847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.138602] Call Trace: [ 1837.139159] dump_stack+0x107/0x167 [ 1837.139926] should_fail.cold+0x5/0xa [ 1837.140749] _copy_from_user+0x2e/0x1b0 [ 1837.141589] __copy_msghdr_from_user+0x91/0x4b0 [ 1837.142552] ? __ia32_sys_shutdown+0x80/0x80 [ 1837.143476] ? ieee802154_sock_release+0xb0/0xb0 [ 1837.144476] ? sock_sendmsg+0x55/0x190 [ 1837.145295] sendmsg_copy_msghdr+0xa1/0x160 [ 1837.146203] ? do_recvmmsg+0x6d0/0x6d0 [ 1837.147018] ? __lock_acquire+0x1657/0x5b00 [ 1837.147933] ___sys_sendmsg+0xc6/0x170 [ 1837.148756] ? sendmsg_copy_msghdr+0x160/0x160 [ 1837.149694] ? vmacache_find+0x55/0x2a0 [ 1837.150529] ? __lockdep_reset_lock+0x180/0x180 [ 1837.151482] ? find_held_lock+0x2c/0x110 [ 1837.152328] ? __might_fault+0xd3/0x180 [ 1837.153140] ? lock_downgrade+0x6d0/0x6d0 [ 1837.153993] ? asm_exc_page_fault+0x1e/0x30 [ 1837.154925] __sys_sendmmsg+0x195/0x470 [ 1837.155762] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1837.156658] ? lock_downgrade+0x6d0/0x6d0 [ 1837.157546] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1837.158545] ? wait_for_completion+0x270/0x270 [ 1837.159512] ? rcu_read_lock_any_held+0x75/0xa0 [ 1837.160493] ? vfs_write+0x354/0xa30 [ 1837.161261] ? fput_many+0x2f/0x1a0 [ 1837.162016] ? ksys_write+0x1a9/0x260 [ 1837.162825] __x64_sys_sendmmsg+0x99/0x100 [ 1837.163693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.164758] do_syscall_64+0x33/0x40 [ 1837.165523] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.166570] RIP: 0033:0x7f8542659b19 [ 1837.167333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.171091] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1837.172667] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1837.174129] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1837.175588] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1837.177059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1837.178523] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1837.180233] hpet: Lost 2 RTC interrupts 02:05:12 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x80802, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x1, 0x2000}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x1, 0x7f, 0x8, 0x100}, {0x1, 0x1, 0x6, 0x1000}]}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x2}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendto$packet(r3, &(0x7f0000000180)="d4353902a8fc482a86ebe2be655816962b4803f6b31a03ac765684d74c6720cc79cdebd6010e4d21eaeb6f56fe05ea88e95f3d36a5881be495a515dbe0c0b616ce2693b7e4c54bd2d8c0fd5bb88d58ce11a50e1c860e578669a5d687b593e687cbaa4f03cc4a977eea81bd9e38b10b165c364d04b37942eb647ea2f677b5d5ba90987c7b071473b951cc72eee47a6939bd0b8b0a8b626c6b92de95560662fbb7a8cdea56bd47b2bdb9d89996bec8346d4eedd941f3b63a", 0xb7, 0x0, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) 02:05:12 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 41) 02:05:12 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1837.282731] ieee802154 phy0 wpan0: encryption failed: -22 02:05:12 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 40) [ 1837.360964] ieee802154 phy0 wpan0: encryption failed: -22 02:05:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1837.367119] FAULT_INJECTION: forcing a failure. [ 1837.367119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1837.369750] CPU: 0 PID: 8617 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1837.371158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.372895] Call Trace: [ 1837.373456] dump_stack+0x107/0x167 [ 1837.374215] should_fail.cold+0x5/0xa [ 1837.375021] _copy_from_user+0x2e/0x1b0 [ 1837.375851] __copy_msghdr_from_user+0x91/0x4b0 [ 1837.376851] ? __ia32_sys_shutdown+0x80/0x80 [ 1837.377772] ? ieee802154_sock_release+0xb0/0xb0 [ 1837.378773] ? sock_sendmsg+0x55/0x190 [ 1837.379589] sendmsg_copy_msghdr+0xa1/0x160 [ 1837.380489] ? do_recvmmsg+0x6d0/0x6d0 [ 1837.381305] ? __lock_acquire+0x1657/0x5b00 [ 1837.382229] ___sys_sendmsg+0xc6/0x170 [ 1837.383035] ? sendmsg_copy_msghdr+0x160/0x160 [ 1837.383972] ? vmacache_find+0x55/0x2a0 [ 1837.384816] ? __lockdep_reset_lock+0x180/0x180 [ 1837.385799] ? find_held_lock+0x2c/0x110 [ 1837.386653] ? __might_fault+0xd3/0x180 [ 1837.387479] ? lock_downgrade+0x6d0/0x6d0 [ 1837.388356] ? asm_exc_page_fault+0x1e/0x30 [ 1837.389298] __sys_sendmmsg+0x195/0x470 [ 1837.390135] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1837.391024] ? lock_downgrade+0x6d0/0x6d0 [ 1837.391926] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1837.392942] ? wait_for_completion+0x270/0x270 [ 1837.393889] ? rcu_read_lock_any_held+0x75/0xa0 [ 1837.394850] ? vfs_write+0x354/0xa30 [ 1837.395625] ? fput_many+0x2f/0x1a0 [ 1837.396409] ? ksys_write+0x1a9/0x260 [ 1837.397220] __x64_sys_sendmmsg+0x99/0x100 [ 1837.398093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.399154] do_syscall_64+0x33/0x40 [ 1837.399926] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.400984] RIP: 0033:0x7f867efe2b19 [ 1837.401753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.405518] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1837.407081] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1837.408561] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1837.410024] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1837.411485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1837.412952] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1837.414675] hpet: Lost 2 RTC interrupts 02:05:12 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0xb, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x1) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short}, 0xb) 02:05:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000140)={{r2}, 0x0, 0x10, @unused=[0xfffffffffffff6cc, 0x3, 0x0, 0x79], @subvolid=0x16}) 02:05:13 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1837.463490] ieee802154 phy0 wpan0: encryption failed: -22 02:05:13 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1837.475744] FAULT_INJECTION: forcing a failure. [ 1837.475744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1837.478253] CPU: 0 PID: 8623 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1837.479657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.481354] Call Trace: [ 1837.481915] dump_stack+0x107/0x167 [ 1837.482684] should_fail.cold+0x5/0xa [ 1837.483481] _copy_from_user+0x2e/0x1b0 [ 1837.484320] __copy_msghdr_from_user+0x91/0x4b0 [ 1837.485278] ? __ia32_sys_shutdown+0x80/0x80 [ 1837.486201] ? ieee802154_sock_release+0xb0/0xb0 [ 1837.487190] ? sock_sendmsg+0x55/0x190 [ 1837.488008] sendmsg_copy_msghdr+0xa1/0x160 [ 1837.488946] ? do_recvmmsg+0x6d0/0x6d0 [ 1837.489761] ? __lock_acquire+0x1657/0x5b00 [ 1837.490695] ___sys_sendmsg+0xc6/0x170 [ 1837.491513] ? sendmsg_copy_msghdr+0x160/0x160 [ 1837.492480] ? __lockdep_reset_lock+0x180/0x180 [ 1837.493439] ? trace_hardirqs_on+0x5b/0x180 [ 1837.494357] ? find_held_lock+0x2c/0x110 [ 1837.495217] ? __might_fault+0xd3/0x180 [ 1837.496040] ? lock_downgrade+0x6d0/0x6d0 [ 1837.496923] ? io_schedule_timeout+0x140/0x140 [ 1837.497903] __sys_sendmmsg+0x195/0x470 [ 1837.498741] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1837.499641] ? lock_downgrade+0x6d0/0x6d0 [ 1837.500544] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1837.501551] ? wait_for_completion+0x270/0x270 [ 1837.502500] ? rcu_read_lock_any_held+0x75/0xa0 [ 1837.503461] ? vfs_write+0x354/0xa30 [ 1837.504266] ? fput_many+0x2f/0x1a0 [ 1837.505026] ? ksys_write+0x1a9/0x260 [ 1837.505840] __x64_sys_sendmmsg+0x99/0x100 [ 1837.506727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.507796] do_syscall_64+0x33/0x40 [ 1837.508574] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.509634] RIP: 0033:0x7f8542659b19 [ 1837.510407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.514222] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1837.515797] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1837.517269] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1837.518737] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1837.520222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1837.521686] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1837.523380] hpet: Lost 2 RTC interrupts 02:05:13 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:13 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1837.540255] ieee802154 phy0 wpan0: encryption failed: -22 02:05:13 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) [ 1837.592520] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.651860] kmemleak: 35 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:05:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:05:38 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 42) 02:05:38 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 41) 02:05:38 executing program 5: syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f00000000c0)={0x14, &(0x7f0000000000)={0x40, 0x23, 0x3, {0x3, 0x6, "f6"}}, &(0x7f0000000140)={0x0, 0x3, 0xe1, @string={0xe1, 0x3, "27623e7934849287ca1b4c2e18de450f04fb6d373be7219817140d613931835fe00dd015f6ec9d6f61f7db16e2e83e4973e2ac5cc7546254ccf96a3a62bf0c5ebebe60fa7664c2471d9f47ef5ae52535c5ad1fb7df40c8894293c8fb534081490bbebf555cbe91332b4c772bd5826bd9db04424200fad3d50bf5898973f50062796107a1d5d216d61cb603f3919c7532f80a0c9ddb8cb34d655b3ef77b966b6002d376bcdadc70dc83f9d6bbfac5edcca34699921ed515f7019990d48fefc48a3a41d0c73fad094d24dc5b26aa6be34498954aa2390bac79d8bce99eb1e8b4"}}}, &(0x7f0000000540)={0x44, &(0x7f0000000240)={0x20, 0x17, 0xfe, "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"}, &(0x7f0000000380)={0x0, 0xa, 0x1, 0x3f}, &(0x7f00000003c0)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000400)={0x20, 0x81, 0x2, "f3cb"}, &(0x7f0000000440)={0x20, 0x82, 0x3, 'Q\"['}, &(0x7f0000000480)={0x20, 0x83, 0x1, "9c"}, &(0x7f00000004c0)={0x20, 0x84, 0x2, "1d11"}, &(0x7f0000000500)={0x20, 0x85, 0x3, "92eb81"}}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:05:38 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:38 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:05:38 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x44, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:05:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4662, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = fork() setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r2, 0x9, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000040)=r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r3, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0xcf, 0x9, 0x8, 0x0, 0x8000, 0x144, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x1000, 0x7}, 0x800, 0x5, 0x0, 0x3, 0x7, 0x0, 0x200, 0x0, 0x38c2cd8b}, r2, 0xa, r3, 0xa) r4 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) io_uring_enter(r4, 0x388b, 0xab2b, 0x1, &(0x7f0000000100)={[0xffff]}, 0x8) syz_io_uring_submit(r1, r5, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) [ 1862.562475] ieee802154 phy0 wpan0: encryption failed: -22 [ 1862.569290] FAULT_INJECTION: forcing a failure. [ 1862.569290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1862.569712] ieee802154 phy0 wpan0: encryption failed: -22 [ 1862.571746] CPU: 0 PID: 8648 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1862.574173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1862.575837] Call Trace: [ 1862.576422] dump_stack+0x107/0x167 [ 1862.577209] should_fail.cold+0x5/0xa [ 1862.578009] _copy_from_user+0x2e/0x1b0 [ 1862.578848] __copy_msghdr_from_user+0x91/0x4b0 [ 1862.579799] ? __ia32_sys_shutdown+0x80/0x80 [ 1862.580719] ? ieee802154_sock_release+0xb0/0xb0 [ 1862.581683] ? sock_sendmsg+0x55/0x190 [ 1862.582495] sendmsg_copy_msghdr+0xa1/0x160 [ 1862.583369] ? do_recvmmsg+0x6d0/0x6d0 [ 1862.584169] ? __lock_acquire+0x1657/0x5b00 [ 1862.585098] ___sys_sendmsg+0xc6/0x170 [ 1862.585894] ? sendmsg_copy_msghdr+0x160/0x160 [ 1862.586813] ? vmacache_find+0x55/0x2a0 [ 1862.587627] ? __lockdep_reset_lock+0x180/0x180 [ 1862.588611] ? find_held_lock+0x2c/0x110 [ 1862.589449] ? __might_fault+0xd3/0x180 [ 1862.590260] ? lock_downgrade+0x6d0/0x6d0 [ 1862.591106] ? asm_exc_page_fault+0x1e/0x30 [ 1862.592025] __sys_sendmmsg+0x195/0x470 [ 1862.592867] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1862.593742] ? lock_downgrade+0x6d0/0x6d0 [ 1862.594617] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1862.595595] ? wait_for_completion+0x270/0x270 [ 1862.596535] ? rcu_read_lock_any_held+0x75/0xa0 [ 1862.597487] ? vfs_write+0x354/0xa30 [ 1862.598275] ? fput_many+0x2f/0x1a0 [ 1862.599035] ? ksys_write+0x1a9/0x260 [ 1862.599851] __x64_sys_sendmmsg+0x99/0x100 [ 1862.600736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.601804] do_syscall_64+0x33/0x40 [ 1862.602564] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1862.603616] RIP: 0033:0x7f867efe2b19 [ 1862.604374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1862.608101] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1862.609661] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1862.611102] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1862.612555] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1862.614024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1862.615466] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1862.617192] hpet: Lost 2 RTC interrupts 02:05:38 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1862.623846] ieee802154 phy0 wpan0: encryption failed: -22 [ 1862.634283] FAULT_INJECTION: forcing a failure. [ 1862.634283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1862.636763] CPU: 1 PID: 8659 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1862.638164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1862.639906] Call Trace: [ 1862.640465] dump_stack+0x107/0x167 [ 1862.641226] should_fail.cold+0x5/0xa [ 1862.642036] _copy_from_user+0x2e/0x1b0 [ 1862.642860] __copy_msghdr_from_user+0x91/0x4b0 [ 1862.643814] ? __ia32_sys_shutdown+0x80/0x80 [ 1862.644747] ? ieee802154_sock_release+0xb0/0xb0 [ 1862.645722] ? sock_sendmsg+0x55/0x190 [ 1862.646538] sendmsg_copy_msghdr+0xa1/0x160 [ 1862.647425] ? do_recvmmsg+0x6d0/0x6d0 [ 1862.648233] ? __lock_acquire+0x1657/0x5b00 [ 1862.649166] ___sys_sendmsg+0xc6/0x170 [ 1862.649966] ? sendmsg_copy_msghdr+0x160/0x160 [ 1862.650081] ieee802154 phy0 wpan0: encryption failed: -22 [ 1862.650897] ? vmacache_find+0x55/0x2a0 [ 1862.650929] ? __lockdep_reset_lock+0x180/0x180 [ 1862.650976] ? find_held_lock+0x2c/0x110 [ 1862.654724] ? __might_fault+0xd3/0x180 [ 1862.655538] ? lock_downgrade+0x6d0/0x6d0 [ 1862.656387] ? asm_exc_page_fault+0x1e/0x30 [ 1862.657330] __sys_sendmmsg+0x195/0x470 [ 1862.658161] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1862.659045] ? lock_downgrade+0x6d0/0x6d0 [ 1862.659941] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1862.660939] ? wait_for_completion+0x270/0x270 [ 1862.661875] ? rcu_read_lock_any_held+0x75/0xa0 [ 1862.662818] ? vfs_write+0x354/0xa30 [ 1862.663596] ? fput_many+0x2f/0x1a0 [ 1862.664346] ? ksys_write+0x1a9/0x260 [ 1862.665166] __x64_sys_sendmmsg+0x99/0x100 [ 1862.666033] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.667096] do_syscall_64+0x33/0x40 [ 1862.667865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1862.668938] RIP: 0033:0x7f8542659b19 [ 1862.669700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1862.673499] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1862.675054] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1862.676522] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1862.677967] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1862.679422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1862.680873] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:05:38 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 43) [ 1862.731643] ieee802154 phy0 wpan0: encryption failed: -22 [ 1862.733607] FAULT_INJECTION: forcing a failure. [ 1862.733607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1862.736171] CPU: 0 PID: 8670 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1862.737577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1862.739283] Call Trace: [ 1862.739846] dump_stack+0x107/0x167 [ 1862.740631] should_fail.cold+0x5/0xa [ 1862.741428] _copy_from_user+0x2e/0x1b0 [ 1862.742265] __copy_msghdr_from_user+0x91/0x4b0 [ 1862.743222] ? __ia32_sys_shutdown+0x80/0x80 [ 1862.744148] ? ieee802154_sock_release+0xb0/0xb0 [ 1862.745124] ? sock_sendmsg+0x55/0x190 [ 1862.745946] sendmsg_copy_msghdr+0xa1/0x160 [ 1862.746829] ? do_recvmmsg+0x6d0/0x6d0 [ 1862.747640] ? __lock_acquire+0x1657/0x5b00 [ 1862.748596] ___sys_sendmsg+0xc6/0x170 [ 1862.749399] ? sendmsg_copy_msghdr+0x160/0x160 [ 1862.750329] ? vmacache_find+0x55/0x2a0 [ 1862.751149] ? __lockdep_reset_lock+0x180/0x180 [ 1862.752127] ? find_held_lock+0x2c/0x110 [ 1862.752996] ? __might_fault+0xd3/0x180 [ 1862.753808] ? lock_downgrade+0x6d0/0x6d0 [ 1862.754656] ? asm_exc_page_fault+0x1e/0x30 [ 1862.755590] __sys_sendmmsg+0x195/0x470 [ 1862.756421] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1862.757317] ? lock_downgrade+0x6d0/0x6d0 [ 1862.758215] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1862.759206] ? wait_for_completion+0x270/0x270 [ 1862.760157] ? rcu_read_lock_any_held+0x75/0xa0 [ 1862.761127] ? vfs_write+0x354/0xa30 [ 1862.761899] ? fput_many+0x2f/0x1a0 [ 1862.762658] ? ksys_write+0x1a9/0x260 [ 1862.763474] __x64_sys_sendmmsg+0x99/0x100 [ 1862.764356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.765441] do_syscall_64+0x33/0x40 [ 1862.766206] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1862.767267] RIP: 0033:0x7f867efe2b19 [ 1862.768030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1862.771742] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1862.773297] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1862.774738] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1862.776183] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1862.777622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1862.779062] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1862.780778] hpet: Lost 2 RTC interrupts [ 1878.704646] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:06:02 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/178, 0xb2, 0x5) 02:06:02 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 42) 02:06:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x48, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:06:02 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 44) 02:06:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffdffff}, {0x7, 0x3f, 0x6, 0x10000}, {0x0, 0x87, 0x7, 0x5}, {0x7, 0x20, 0x73, 0x2}, {0x2, 0x3, 0x6, 0xa}, {0x2, 0xb8, 0x2, 0x8000}]}) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x8000, 0x0) [ 1886.788306] ieee802154 phy0 wpan0: encryption failed: -22 [ 1886.789207] ieee802154 phy0 wpan0: encryption failed: -22 [ 1886.792556] FAULT_INJECTION: forcing a failure. [ 1886.792556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1886.793910] CPU: 0 PID: 8683 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1886.794640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1886.795570] Call Trace: [ 1886.795871] dump_stack+0x107/0x167 [ 1886.796277] should_fail.cold+0x5/0xa [ 1886.796706] _copy_from_user+0x2e/0x1b0 [ 1886.797152] __copy_msghdr_from_user+0x91/0x4b0 [ 1886.797667] ? __ia32_sys_shutdown+0x80/0x80 [ 1886.798156] ? ieee802154_sock_release+0xb0/0xb0 [ 1886.798681] ? sock_sendmsg+0x55/0x190 [ 1886.799114] sendmsg_copy_msghdr+0xa1/0x160 [ 1886.799579] ? do_recvmmsg+0x6d0/0x6d0 [ 1886.800013] ? __lock_acquire+0x1657/0x5b00 [ 1886.800498] ___sys_sendmsg+0xc6/0x170 [ 1886.800938] ? sendmsg_copy_msghdr+0x160/0x160 [ 1886.801437] ? vmacache_find+0x55/0x2a0 [ 1886.801873] ? __lockdep_reset_lock+0x180/0x180 [ 1886.802402] ? find_held_lock+0x2c/0x110 [ 1886.802621] ieee802154 phy0 wpan0: encryption failed: -22 [ 1886.802853] ? __might_fault+0xd3/0x180 [ 1886.802867] ? lock_downgrade+0x6d0/0x6d0 [ 1886.802880] ? asm_exc_page_fault+0x1e/0x30 [ 1886.802915] __sys_sendmmsg+0x195/0x470 [ 1886.805856] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1886.806327] ? lock_downgrade+0x6d0/0x6d0 [ 1886.806793] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1886.807315] ? wait_for_completion+0x270/0x270 [ 1886.807815] ? rcu_read_lock_any_held+0x75/0xa0 [ 1886.808320] ? vfs_write+0x354/0xa30 [ 1886.808734] ? fput_many+0x2f/0x1a0 [ 1886.809145] ? ksys_write+0x1a9/0x260 [ 1886.809577] __x64_sys_sendmmsg+0x99/0x100 [ 1886.810034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.810590] do_syscall_64+0x33/0x40 [ 1886.810995] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1886.811542] RIP: 0033:0x7f8542659b19 [ 1886.811948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1886.813931] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1886.814762] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1886.815521] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1886.816300] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.817073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1886.817838] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1886.818705] hpet: Lost 1 RTC interrupts [ 1886.820616] FAULT_INJECTION: forcing a failure. [ 1886.820616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1886.821920] CPU: 0 PID: 8687 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1886.822649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1886.823548] Call Trace: [ 1886.823843] dump_stack+0x107/0x167 [ 1886.824248] should_fail.cold+0x5/0xa [ 1886.824674] _copy_from_user+0x2e/0x1b0 [ 1886.825121] __copy_msghdr_from_user+0x91/0x4b0 [ 1886.825646] ? __ia32_sys_shutdown+0x80/0x80 [ 1886.826135] ? ieee802154_sock_release+0xb0/0xb0 [ 1886.826702] ? sock_sendmsg+0x55/0x190 [ 1886.827133] sendmsg_copy_msghdr+0xa1/0x160 [ 1886.827617] ? do_recvmmsg+0x6d0/0x6d0 [ 1886.828040] ? __lock_acquire+0x1657/0x5b00 [ 1886.828536] ___sys_sendmsg+0xc6/0x170 [ 1886.828976] ? sendmsg_copy_msghdr+0x160/0x160 [ 1886.829481] ? vmacache_find+0x55/0x2a0 [ 1886.829918] ? __lockdep_reset_lock+0x180/0x180 [ 1886.830457] ? find_held_lock+0x2c/0x110 [ 1886.830903] ? __might_fault+0xd3/0x180 [ 1886.831344] ? lock_downgrade+0x6d0/0x6d0 [ 1886.831800] ? asm_exc_page_fault+0x1e/0x30 [ 1886.832294] __sys_sendmmsg+0x195/0x470 [ 1886.832745] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1886.833221] ? lock_downgrade+0x6d0/0x6d0 [ 1886.833701] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1886.834242] ? wait_for_completion+0x270/0x270 [ 1886.834748] ? rcu_read_lock_any_held+0x75/0xa0 [ 1886.835255] ? vfs_write+0x354/0xa30 [ 1886.835665] ? fput_many+0x2f/0x1a0 [ 1886.836074] ? ksys_write+0x1a9/0x260 [ 1886.836510] __x64_sys_sendmmsg+0x99/0x100 [ 1886.836980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.837554] do_syscall_64+0x33/0x40 [ 1886.837974] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1886.838545] RIP: 0033:0x7f867efe2b19 [ 1886.838969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1886.840960] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1886.841772] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1886.842563] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1886.843341] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.844122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1886.844905] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1886.845773] hpet: Lost 1 RTC interrupts 02:06:02 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1886.900017] ieee802154 phy0 wpan0: encryption failed: -22 02:06:02 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 45) 02:06:02 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 43) 02:06:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x1c, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000880), 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00), 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x32}, @local}}}], 0x20}}], 0x1, 0x0) 02:06:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1886.956966] ieee802154 phy0 wpan0: encryption failed: -22 [ 1886.958315] ieee802154 phy0 wpan0: encryption failed: -22 [ 1886.971819] ieee802154 phy0 wpan0: encryption failed: -22 02:06:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r1 = fork() setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r1, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x400000000000007}, 0x0, 0x8, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) [ 1886.991028] FAULT_INJECTION: forcing a failure. [ 1886.991028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1886.993649] CPU: 1 PID: 8699 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1886.995129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1886.996935] Call Trace: [ 1886.997519] dump_stack+0x107/0x167 [ 1886.998361] should_fail.cold+0x5/0xa [ 1886.999194] _copy_from_user+0x2e/0x1b0 [ 1887.000060] __copy_msghdr_from_user+0x91/0x4b0 [ 1887.001086] ? __ia32_sys_shutdown+0x80/0x80 [ 1887.002045] ? ieee802154_sock_release+0xb0/0xb0 [ 1887.003082] ? sock_sendmsg+0x55/0x190 [ 1887.003931] sendmsg_copy_msghdr+0xa1/0x160 [ 1887.004889] ? do_recvmmsg+0x6d0/0x6d0 [ 1887.005740] ? __lock_acquire+0x1657/0x5b00 [ 1887.006707] ___sys_sendmsg+0xc6/0x170 [ 1887.007563] ? sendmsg_copy_msghdr+0x160/0x160 [ 1887.008566] ? vmacache_find+0x55/0x2a0 [ 1887.009462] ? __lockdep_reset_lock+0x180/0x180 [ 1887.010485] ? find_held_lock+0x2c/0x110 [ 1887.011383] ? __might_fault+0xd3/0x180 [ 1887.012244] ? lock_downgrade+0x6d0/0x6d0 [ 1887.013175] ? asm_exc_page_fault+0x1e/0x30 [ 1887.014165] __sys_sendmmsg+0x195/0x470 [ 1887.015050] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1887.015982] ? lock_downgrade+0x6d0/0x6d0 [ 1887.016928] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1887.017975] ? wait_for_completion+0x270/0x270 [ 1887.018972] ? rcu_read_lock_any_held+0x75/0xa0 [ 1887.019976] ? vfs_write+0x354/0xa30 [ 1887.020791] ? fput_many+0x2f/0x1a0 [ 1887.021590] ? ksys_write+0x1a9/0x260 [ 1887.022428] __x64_sys_sendmmsg+0x99/0x100 [ 1887.023347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1887.024467] do_syscall_64+0x33/0x40 [ 1887.025310] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.026416] RIP: 0033:0x7f867efe2b19 [ 1887.027237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.031345] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1887.033041] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1887.034619] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1887.036196] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.037748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.039312] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1887.073048] ieee802154 phy0 wpan0: encryption failed: -22 [ 1887.079394] FAULT_INJECTION: forcing a failure. [ 1887.079394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.080814] CPU: 0 PID: 8717 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1887.081575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.082511] Call Trace: [ 1887.082830] dump_stack+0x107/0x167 [ 1887.083253] should_fail.cold+0x5/0xa [ 1887.083694] _copy_from_user+0x2e/0x1b0 [ 1887.084161] __copy_msghdr_from_user+0x91/0x4b0 [ 1887.084694] ? __ia32_sys_shutdown+0x80/0x80 [ 1887.085205] ? ieee802154_sock_release+0xb0/0xb0 [ 1887.085739] ? sock_sendmsg+0x55/0x190 [ 1887.086184] sendmsg_copy_msghdr+0xa1/0x160 [ 1887.086679] ? do_recvmmsg+0x6d0/0x6d0 [ 1887.087112] ? __lock_acquire+0x1657/0x5b00 [ 1887.087620] ___sys_sendmsg+0xc6/0x170 [ 1887.088049] ? sendmsg_copy_msghdr+0x160/0x160 [ 1887.088566] ? vmacache_find+0x55/0x2a0 [ 1887.089029] ? __lockdep_reset_lock+0x180/0x180 [ 1887.089566] ? find_held_lock+0x2c/0x110 [ 1887.090021] ? __might_fault+0xd3/0x180 [ 1887.090475] ? lock_downgrade+0x6d0/0x6d0 [ 1887.090927] ? asm_exc_page_fault+0x1e/0x30 [ 1887.091452] __sys_sendmmsg+0x195/0x470 [ 1887.091898] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1887.092408] ? lock_downgrade+0x6d0/0x6d0 [ 1887.092897] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1887.093448] ? wait_for_completion+0x270/0x270 [ 1887.093952] ? rcu_read_lock_any_held+0x75/0xa0 [ 1887.094476] ? vfs_write+0x354/0xa30 [ 1887.094906] ? fput_many+0x2f/0x1a0 [ 1887.095321] ? ksys_write+0x1a9/0x260 [ 1887.095767] __x64_sys_sendmmsg+0x99/0x100 [ 1887.096249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1887.096840] do_syscall_64+0x33/0x40 [ 1887.097268] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.097837] RIP: 0033:0x7f8542659b19 [ 1887.098265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.100325] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1887.101191] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1887.101991] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1887.102802] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.103613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.104412] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1903.669812] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:06:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 44) 02:06:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:06:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '#$+-.'}, {0x20, '\xa1$('}, {0x20, '}'}, {0x20, '+-^\x81$'}], 0xa, "9a8d334f99eecfafc01cb97163064a323cee798d3aead9b4bee33434a6d476786fa6a959baba6e831fbf4da27ad331c791174b0f6614c15d0a23529fb4db03bd3d7db000cf120f1d648612ff02194e4a364dddc3d01a6831c6e455634ac6ab595bedcae4faa285eb444d3805e631a7cc439075cb38f78d0a8048a9b0d0b051efc08de3c7cc1669bcda641fbd395e3922d9e29804059fc2912c89b29794f027dc0571ce862bb1f0c201c4d3f60a590f29a4209361a1632ac79c2454c69f8bcafd724ed936c3d6e971352cc32d572805e9824d628fa28291e21628c78dea52"}, 0xfb) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:06:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x1c, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000880), 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000780)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00), 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x32}, @local}}}], 0x20}}], 0x1, 0x0) 02:06:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 46) [ 1912.149204] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.155800] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.161929] FAULT_INJECTION: forcing a failure. [ 1912.161929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1912.164715] CPU: 1 PID: 8736 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1912.166120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.168142] Call Trace: [ 1912.168708] dump_stack+0x107/0x167 [ 1912.169622] should_fail.cold+0x5/0xa [ 1912.170443] _copy_from_user+0x2e/0x1b0 [ 1912.171437] __copy_msghdr_from_user+0x91/0x4b0 [ 1912.172398] ? __ia32_sys_shutdown+0x80/0x80 [ 1912.173509] ? ieee802154_sock_release+0xb0/0xb0 [ 1912.174477] ? sock_sendmsg+0x55/0x190 [ 1912.175443] sendmsg_copy_msghdr+0xa1/0x160 [ 1912.176315] ? do_recvmmsg+0x6d0/0x6d0 [ 1912.177288] ? __lock_acquire+0x1657/0x5b00 [ 1912.178207] ___sys_sendmsg+0xc6/0x170 [ 1912.179170] ? sendmsg_copy_msghdr+0x160/0x160 [ 1912.180104] ? vmacache_find+0x55/0x2a0 [ 1912.180996] ? __lockdep_reset_lock+0x180/0x180 [ 1912.181983] ? find_held_lock+0x2c/0x110 [ 1912.182828] ? __might_fault+0xd3/0x180 [ 1912.183636] ? lock_downgrade+0x6d0/0x6d0 [ 1912.184474] ? asm_exc_page_fault+0x1e/0x30 [ 1912.185408] __sys_sendmmsg+0x195/0x470 [ 1912.186273] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1912.187151] ? lock_downgrade+0x6d0/0x6d0 [ 1912.188025] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1912.189023] ? wait_for_completion+0x270/0x270 [ 1912.189979] ? rcu_read_lock_any_held+0x75/0xa0 [ 1912.190925] ? vfs_write+0x354/0xa30 [ 1912.191683] ? fput_many+0x2f/0x1a0 [ 1912.192424] ? ksys_write+0x1a9/0x260 [ 1912.193240] __x64_sys_sendmmsg+0x99/0x100 [ 1912.194107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1912.195139] do_syscall_64+0x33/0x40 [ 1912.195900] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.197031] RIP: 0033:0x7f8542659b19 [ 1912.197815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.201691] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1912.203234] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1912.204674] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1912.206122] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.207567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.209024] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1912.219721] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.240054] FAULT_INJECTION: forcing a failure. [ 1912.240054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1912.242582] CPU: 1 PID: 8746 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1912.243966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.245648] Call Trace: [ 1912.246281] dump_stack+0x107/0x167 [ 1912.247034] should_fail.cold+0x5/0xa [ 1912.247959] _copy_from_user+0x2e/0x1b0 [ 1912.248823] __copy_msghdr_from_user+0x91/0x4b0 [ 1912.249784] ? __ia32_sys_shutdown+0x80/0x80 [ 1912.250683] ? ieee802154_sock_release+0xb0/0xb0 [ 1912.251641] ? sock_sendmsg+0x55/0x190 [ 1912.252469] sendmsg_copy_msghdr+0xa1/0x160 [ 1912.253364] ? do_recvmmsg+0x6d0/0x6d0 [ 1912.254158] ? __lock_acquire+0x1657/0x5b00 [ 1912.255057] ___sys_sendmsg+0xc6/0x170 [ 1912.255868] ? sendmsg_copy_msghdr+0x160/0x160 [ 1912.256796] ? vmacache_find+0x55/0x2a0 [ 1912.257781] ? __lockdep_reset_lock+0x180/0x180 [ 1912.258751] ? find_held_lock+0x2c/0x110 [ 1912.259647] ? __might_fault+0xd3/0x180 [ 1912.260459] ? lock_downgrade+0x6d0/0x6d0 [ 1912.261303] ? asm_exc_page_fault+0x1e/0x30 [ 1912.262190] __sys_sendmmsg+0x195/0x470 [ 1912.262994] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1912.263887] ? lock_downgrade+0x6d0/0x6d0 [ 1912.264816] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1912.265826] ? wait_for_completion+0x270/0x270 [ 1912.266937] ? rcu_read_lock_any_held+0x75/0xa0 [ 1912.267873] ? vfs_write+0x354/0xa30 [ 1912.268780] ? fput_many+0x2f/0x1a0 [ 1912.269687] ? ksys_write+0x1a9/0x260 [ 1912.270493] __x64_sys_sendmmsg+0x99/0x100 [ 1912.271341] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1912.272369] do_syscall_64+0x33/0x40 [ 1912.273112] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.274150] RIP: 0033:0x7f867efe2b19 [ 1912.274906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.278612] RSP: 002b:00007f867c537188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1912.280197] RAX: ffffffffffffffda RBX: 00007f867f0f6020 RCX: 00007f867efe2b19 [ 1912.281648] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1912.283093] RBP: 00007f867c5371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.284516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.285949] R13: 00007fffb7ecc00f R14: 00007f867c537300 R15: 0000000000022000 [ 1912.348635] ieee802154 phy0 wpan0: encryption failed: -22 02:06:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="cc0100002300000229bd7000fcdbdf2500000000080016008000000008000c00030000000c0015005a073500010000000c001c00", @ANYRES32=0x0, @ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x4) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) connect$inet(r0, &(0x7f0000000380)={0x2, 0x4e21, @empty}, 0x10) 02:06:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 45) 02:06:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:06:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x3c) fcntl$setstatus(r0, 0x4, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x800) write(r2, &(0x7f0000000000)="e7", 0x1) splice(r1, 0x0, r0, 0x0, 0x33, 0x0) 02:06:28 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x68, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:28 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 47) [ 1912.516257] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.532706] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.535096] FAULT_INJECTION: forcing a failure. [ 1912.535096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1912.537562] CPU: 0 PID: 8762 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1912.538940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.540690] Call Trace: [ 1912.541271] dump_stack+0x107/0x167 [ 1912.542065] should_fail.cold+0x5/0xa [ 1912.542898] _copy_from_user+0x2e/0x1b0 [ 1912.543722] __copy_msghdr_from_user+0x91/0x4b0 [ 1912.544671] ? __ia32_sys_shutdown+0x80/0x80 [ 1912.545627] ? ieee802154_sock_release+0xb0/0xb0 [ 1912.546589] ? sock_sendmsg+0x55/0x190 [ 1912.547455] sendmsg_copy_msghdr+0xa1/0x160 [ 1912.548445] ? do_recvmmsg+0x6d0/0x6d0 [ 1912.549371] ? __lock_acquire+0x1657/0x5b00 [ 1912.550405] ___sys_sendmsg+0xc6/0x170 [ 1912.551312] ? sendmsg_copy_msghdr+0x160/0x160 [ 1912.552362] ? vmacache_find+0x55/0x2a0 [ 1912.553305] ? __lockdep_reset_lock+0x180/0x180 [ 1912.554401] ? find_held_lock+0x2c/0x110 [ 1912.555350] ? __might_fault+0xd3/0x180 [ 1912.556270] ? lock_downgrade+0x6d0/0x6d0 [ 1912.557236] ? asm_exc_page_fault+0x1e/0x30 [ 1912.558237] __sys_sendmmsg+0x195/0x470 [ 1912.559070] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1912.559956] ? lock_downgrade+0x6d0/0x6d0 [ 1912.560848] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1912.561844] ? wait_for_completion+0x270/0x270 [ 1912.562778] ? rcu_read_lock_any_held+0x75/0xa0 [ 1912.563723] ? vfs_write+0x354/0xa30 [ 1912.564494] ? fput_many+0x2f/0x1a0 [ 1912.565260] ? ksys_write+0x1a9/0x260 [ 1912.566070] __x64_sys_sendmmsg+0x99/0x100 [ 1912.566937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1912.567988] do_syscall_64+0x33/0x40 [ 1912.568752] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.569804] RIP: 0033:0x7f8542659b19 [ 1912.570567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.573609] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.574291] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1912.574317] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1912.574331] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1912.574344] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.574363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.582725] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1912.584396] hpet: Lost 2 RTC interrupts 02:06:28 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:06:28 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 1912.642600] ieee802154 phy0 wpan0: encryption failed: -22 [ 1912.666370] FAULT_INJECTION: forcing a failure. [ 1912.666370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1912.669176] CPU: 0 PID: 8769 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1912.670632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.672649] Call Trace: [ 1912.673338] dump_stack+0x107/0x167 [ 1912.674248] should_fail.cold+0x5/0xa [ 1912.675202] _copy_from_user+0x2e/0x1b0 [ 1912.676128] __copy_msghdr_from_user+0x91/0x4b0 [ 1912.677062] ? __ia32_sys_shutdown+0x80/0x80 [ 1912.677980] ? ieee802154_sock_release+0xb0/0xb0 [ 1912.678933] ? sock_sendmsg+0x55/0x190 [ 1912.679734] sendmsg_copy_msghdr+0xa1/0x160 [ 1912.680606] ? do_recvmmsg+0x6d0/0x6d0 [ 1912.681414] ? __lock_acquire+0x1657/0x5b00 [ 1912.682316] ___sys_sendmsg+0xc6/0x170 [ 1912.683109] ? sendmsg_copy_msghdr+0x160/0x160 [ 1912.684024] ? vmacache_find+0x55/0x2a0 [ 1912.684836] ? __lockdep_reset_lock+0x180/0x180 [ 1912.685835] ? find_held_lock+0x2c/0x110 [ 1912.686671] ? __might_fault+0xd3/0x180 [ 1912.687482] ? lock_downgrade+0x6d0/0x6d0 [ 1912.688320] ? asm_exc_page_fault+0x1e/0x30 [ 1912.689250] __sys_sendmmsg+0x195/0x470 [ 1912.690069] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1912.690945] ? lock_downgrade+0x6d0/0x6d0 [ 1912.691823] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1912.692797] ? wait_for_completion+0x270/0x270 [ 1912.693785] ? rcu_read_lock_any_held+0x75/0xa0 [ 1912.694782] ? vfs_write+0x354/0xa30 [ 1912.695591] ? fput_many+0x2f/0x1a0 [ 1912.696388] ? ksys_write+0x1a9/0x260 [ 1912.697264] __x64_sys_sendmmsg+0x99/0x100 [ 1912.698166] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1912.699283] do_syscall_64+0x33/0x40 [ 1912.700080] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.701173] RIP: 0033:0x7f867efe2b19 [ 1912.701966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.705723] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1912.707285] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1912.708717] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1912.710191] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.711645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.713100] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1912.714861] hpet: Lost 2 RTC interrupts [ 1926.860211] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1937.397451] ieee802154 phy0 wpan0: encryption failed: -22 02:06:52 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 48) 02:06:52 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x3, 0xff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x40}, 0x0) sendmmsg$inet(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="aaa4277fc47f51fd2ee031584f2c2efe22e34c9bf6752db719ce2b864ecd90b681ef238ff56964038a31c2a1ad32fdd7950e876d60b5b4a8885ef0fff90465b886d35c9f233d4233e5c3", 0x4a}, {&(0x7f00000000c0)="c7bc72d9e226a54b7f1ed5228004defccc87a6221806c47522ea0939d3", 0x1d}, {&(0x7f00000001c0)="41548be351ea7f71d04f717d147aa0518ae3b6242746587c874fcffcda29", 0x1e}], 0x3, &(0x7f0000000240)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @empty}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0x50}}, {{&(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000300)="74bc4b78d0d6b2692e83801f712374adc5377229ca06284bf5a945e570845ee75439fc3e697c97e3d002dd2c79e78afd163b6b4022c35cb7e69bc74b500c5e2c3ac23b880183e5200b99c8280e9c5064d98df6eb", 0x54}, {&(0x7f0000000380)="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", 0xfc}, {&(0x7f0000000480)="ef57d03f4382501594b2b2db12a8bdded3c0770a1764d7347503d2b18df22fb725eca0b94e571d6fc91932ad6b33213edd32d709d88c2df9b9e0239a2439b03f44f6845010971cc85da32bbcf1ddace840c358de185368bd31aa32d4ba7c8e439e", 0x61}, {&(0x7f0000000500)="b009e3dc8600f66108261fc6efeaa3f42c13d590e916db3e8b340ae2cf7be49471a122", 0x23}], 0x4, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x24}, @loopback}}}], 0x38}}, {{&(0x7f00000005c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000600)="821089fd5a3c7a033d28f4b9be51d7fe7706d93c2244bb03d9d8163cce366f5bae52e4dcb7cb96e600547347ba2908ce8afced1e882e3bfc0f3b31fb62126b50384ebc2278c724d9df46444e12c69f7c64450834fca8993d416007443475e6415680fa1306ed02c60ea68d716d386960ede1a5da1f6917eac2b2c5a56af201024b0a1c66bfa32b036f08124f67a44e28f4cb18211de9d18cc1c7ae15cb847a", 0x9f}, {&(0x7f00000006c0)="a6a947ff9728ec21577f9e0d0039dda40dcd4d079c5700ce02f11612cd3fc70a5e2be19f441bc034095d44fa23617350e0dbc3fccb0c0efa1d383020f4ebcb8634b0b3eda04eb890f69d5730320526909091a26bbaff602386d060567fc68a1431a4b3620a26785e", 0x68}], 0x2, &(0x7f0000000780)=[@ip_tos_int={{0x14}}], 0x18}}], 0x3, 0x4010) 02:06:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:06:52 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:52 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:06:52 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 46) 02:06:52 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701bcef005252050181505824016d", 0x33, 0xe000}], 0x0, &(0x7f0000012200)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = getegid() setresgid(0x0, 0xffffffffffffffff, r3) fchownat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, r3, 0x800) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) fallocate(r1, 0x2, 0x100000001, 0x1f) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 1937.432756] blktrace: Concurrent blktraces are not allowed on loop12 [ 1937.444988] ieee802154 phy0 wpan0: encryption failed: -22 [ 1937.450417] FAULT_INJECTION: forcing a failure. [ 1937.450417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1937.450896] ieee802154 phy0 wpan0: encryption failed: -22 [ 1937.452971] CPU: 1 PID: 8797 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1937.452985] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1937.452993] Call Trace: [ 1937.453022] dump_stack+0x107/0x167 [ 1937.453054] should_fail.cold+0x5/0xa [ 1937.459273] _copy_from_user+0x2e/0x1b0 [ 1937.460118] __copy_msghdr_from_user+0x91/0x4b0 [ 1937.461069] ? __ia32_sys_shutdown+0x80/0x80 [ 1937.462015] ? ieee802154_sock_release+0xb0/0xb0 [ 1937.462993] ? sock_sendmsg+0x55/0x190 [ 1937.463810] sendmsg_copy_msghdr+0xa1/0x160 [ 1937.464694] ? do_recvmmsg+0x6d0/0x6d0 [ 1937.465512] ? __lock_acquire+0x1657/0x5b00 [ 1937.466432] ___sys_sendmsg+0xc6/0x170 [ 1937.467240] ? sendmsg_copy_msghdr+0x160/0x160 [ 1937.468229] ? vmacache_find+0x55/0x2a0 [ 1937.469056] ? __lockdep_reset_lock+0x180/0x180 [ 1937.470050] ? find_held_lock+0x2c/0x110 [ 1937.470906] ? __might_fault+0xd3/0x180 [ 1937.471723] ? lock_downgrade+0x6d0/0x6d0 [ 1937.472576] ? asm_exc_page_fault+0x1e/0x30 [ 1937.473512] __sys_sendmmsg+0x195/0x470 [ 1937.474342] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1937.475227] ? lock_downgrade+0x6d0/0x6d0 [ 1937.476123] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1937.477134] ? wait_for_completion+0x270/0x270 [ 1937.478082] ? rcu_read_lock_any_held+0x75/0xa0 [ 1937.479028] ? vfs_write+0x354/0xa30 [ 1937.479806] ? fput_many+0x2f/0x1a0 [ 1937.480560] ? ksys_write+0x1a9/0x260 [ 1937.481371] __x64_sys_sendmmsg+0x99/0x100 [ 1937.482256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1937.483358] do_syscall_64+0x33/0x40 [ 1937.484128] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1937.485178] RIP: 0033:0x7f8542659b19 [ 1937.485952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1937.489710] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1937.491263] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1937.492730] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1937.494209] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1937.495665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1937.497117] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1937.509216] FAULT_INJECTION: forcing a failure. [ 1937.509216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1937.511613] CPU: 1 PID: 8795 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1937.513026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1937.514798] Call Trace: [ 1937.515346] dump_stack+0x107/0x167 [ 1937.516097] should_fail.cold+0x5/0xa [ 1937.516883] _copy_from_user+0x2e/0x1b0 [ 1937.517720] __copy_msghdr_from_user+0x91/0x4b0 [ 1937.518671] ? __ia32_sys_shutdown+0x80/0x80 [ 1937.519569] ? ieee802154_sock_release+0xb0/0xb0 [ 1937.520563] ? sock_sendmsg+0x55/0x190 [ 1937.521358] sendmsg_copy_msghdr+0xa1/0x160 [ 1937.522265] ? do_recvmmsg+0x6d0/0x6d0 [ 1937.523078] ? __lock_acquire+0x1657/0x5b00 [ 1937.523970] ___sys_sendmsg+0xc6/0x170 [ 1937.524772] ? sendmsg_copy_msghdr+0x160/0x160 [ 1937.525725] ? vmacache_find+0x55/0x2a0 [ 1937.526550] ? __lockdep_reset_lock+0x180/0x180 [ 1937.527515] ? find_held_lock+0x2c/0x110 [ 1937.528366] ? __might_fault+0xd3/0x180 [ 1937.529180] ? lock_downgrade+0x6d0/0x6d0 [ 1937.530032] ? asm_exc_page_fault+0x1e/0x30 [ 1937.531003] __sys_sendmmsg+0x195/0x470 [ 1937.531832] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1937.532712] ? lock_downgrade+0x6d0/0x6d0 [ 1937.533592] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1937.534573] ? wait_for_completion+0x270/0x270 [ 1937.535506] ? rcu_read_lock_any_held+0x75/0xa0 [ 1937.536460] ? vfs_write+0x354/0xa30 [ 1937.537230] ? fput_many+0x2f/0x1a0 [ 1937.537984] ? ksys_write+0x1a9/0x260 [ 1937.538778] __x64_sys_sendmmsg+0x99/0x100 [ 1937.539654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1937.540711] do_syscall_64+0x33/0x40 [ 1937.541501] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1937.542559] RIP: 0033:0x7f867efe2b19 [ 1937.543316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1937.547142] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1937.548722] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1937.550199] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1937.551661] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1937.553118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1937.554571] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:06:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2018}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0xa8d}}, './file0\x00'}) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10) r4 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x40100, 0x1, 0x18}, 0x18) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) [ 1937.567145] ieee802154 phy0 wpan0: encryption failed: -22 02:06:53 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:06:53 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1937.613518] blktrace: Concurrent blktraces are not allowed on loop12 02:06:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:06:53 executing program 5: ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:06:53 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:06:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x1b0cc1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) dup2(r1, r0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e04000000000000006e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c80"]) 02:06:53 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 47) 02:06:53 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 49) 02:06:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x74, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:06:53 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (fail_nth: 1) [ 1937.845578] blktrace: Concurrent blktraces are not allowed on loop12 02:06:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7ff, 0xa0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) [ 1937.855237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1937.869058] ieee802154 phy0 wpan0: encryption failed: -22 [ 1937.871386] ieee802154 phy0 wpan0: encryption failed: -22 [ 1937.876419] FAULT_INJECTION: forcing a failure. [ 1937.876419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1937.878845] CPU: 1 PID: 8830 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1937.879392] FAULT_INJECTION: forcing a failure. [ 1937.879392] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1937.880220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1937.880230] Call Trace: [ 1937.880263] dump_stack+0x107/0x167 [ 1937.880296] should_fail.cold+0x5/0xa [ 1937.880334] _copy_from_user+0x2e/0x1b0 [ 1937.887154] __copy_msghdr_from_user+0x91/0x4b0 [ 1937.888113] ? __ia32_sys_shutdown+0x80/0x80 [ 1937.889034] ? ieee802154_sock_release+0xb0/0xb0 [ 1937.890126] ? sock_sendmsg+0x55/0x190 [ 1937.890944] sendmsg_copy_msghdr+0xa1/0x160 [ 1937.891824] ? do_recvmmsg+0x6d0/0x6d0 [ 1937.892629] ? __lock_acquire+0x1657/0x5b00 [ 1937.893560] ___sys_sendmsg+0xc6/0x170 [ 1937.894372] ? sendmsg_copy_msghdr+0x160/0x160 [ 1937.895319] ? vmacache_find+0x55/0x2a0 [ 1937.896138] ? __lockdep_reset_lock+0x180/0x180 [ 1937.897103] ? find_held_lock+0x2c/0x110 [ 1937.897971] ? __might_fault+0xd3/0x180 [ 1937.898783] ? lock_downgrade+0x6d0/0x6d0 [ 1937.899637] ? asm_exc_page_fault+0x1e/0x30 [ 1937.900557] __sys_sendmmsg+0x195/0x470 [ 1937.901396] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1937.902299] ? lock_downgrade+0x6d0/0x6d0 [ 1937.903181] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1937.904201] ? wait_for_completion+0x270/0x270 [ 1937.905165] ? rcu_read_lock_any_held+0x75/0xa0 [ 1937.906126] ? vfs_write+0x354/0xa30 [ 1937.906897] ? fput_many+0x2f/0x1a0 [ 1937.907644] ? ksys_write+0x1a9/0x260 [ 1937.908447] __x64_sys_sendmmsg+0x99/0x100 [ 1937.909312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1937.910383] do_syscall_64+0x33/0x40 [ 1937.911148] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1937.912187] RIP: 0033:0x7f8542659b19 [ 1937.912951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1937.916648] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1937.918198] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1937.919636] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1937.921165] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1937.922614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1937.924055] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1937.925563] CPU: 0 PID: 8831 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1937.926970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1937.928654] Call Trace: [ 1937.929204] dump_stack+0x107/0x167 [ 1937.929974] should_fail.cold+0x5/0xa [ 1937.930773] _copy_from_user+0x2e/0x1b0 [ 1937.931601] __copy_msghdr_from_user+0x91/0x4b0 [ 1937.932567] ? __ia32_sys_shutdown+0x80/0x80 [ 1937.933498] ? ieee802154_sock_release+0xb0/0xb0 [ 1937.934470] ? sock_sendmsg+0x55/0x190 [ 1937.935282] sendmsg_copy_msghdr+0xa1/0x160 [ 1937.936161] ? do_recvmmsg+0x6d0/0x6d0 [ 1937.937001] ? __lock_acquire+0x1657/0x5b00 [ 1937.937931] ___sys_sendmsg+0xc6/0x170 [ 1937.938739] ? sendmsg_copy_msghdr+0x160/0x160 [ 1937.939672] ? vmacache_find+0x55/0x2a0 [ 1937.940499] ? __lockdep_reset_lock+0x180/0x180 [ 1937.941488] ? find_held_lock+0x2c/0x110 [ 1937.942340] ? __might_fault+0xd3/0x180 [ 1937.943161] ? lock_downgrade+0x6d0/0x6d0 [ 1937.944009] ? asm_exc_page_fault+0x1e/0x30 [ 1937.944939] __sys_sendmmsg+0x195/0x470 [ 1937.945781] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1937.946669] ? lock_downgrade+0x6d0/0x6d0 [ 1937.947556] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1937.948553] ? wait_for_completion+0x270/0x270 [ 1937.949517] ? rcu_read_lock_any_held+0x75/0xa0 [ 1937.950486] ? vfs_write+0x354/0xa30 [ 1937.951251] ? fput_many+0x2f/0x1a0 [ 1937.952009] ? ksys_write+0x1a9/0x260 [ 1937.952814] __x64_sys_sendmmsg+0x99/0x100 [ 1937.953696] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1937.954751] do_syscall_64+0x33/0x40 [ 1937.955527] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1937.956576] RIP: 0033:0x7f867efe2b19 [ 1937.957342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1937.961114] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1937.962682] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1937.964151] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1937.965616] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1937.967072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1937.968534] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1937.970238] hpet: Lost 2 RTC interrupts [ 1938.022417] FAULT_INJECTION: forcing a failure. [ 1938.022417] name failslab, interval 1, probability 0, space 0, times 0 [ 1938.025107] CPU: 1 PID: 8828 Comm: syz-executor.6 Not tainted 5.10.161 #1 [ 1938.026544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1938.028205] Call Trace: [ 1938.028765] dump_stack+0x107/0x167 [ 1938.029542] should_fail.cold+0x5/0xa [ 1938.030408] ? tracepoint_probe_unregister+0x1ca/0xd00 [ 1938.031507] should_failslab+0x5/0x20 [ 1938.032264] __kmalloc+0x72/0x3f0 [ 1938.033007] ? blk_add_trace_bio_queue+0x30/0x30 [ 1938.033986] tracepoint_probe_unregister+0x1ca/0xd00 [ 1938.034173] ieee802154 phy0 wpan0: encryption failed: -22 [ 1938.035028] ? kfree+0xd7/0x390 [ 1938.035088] blk_unregister_tracepoints+0x98/0x180 [ 1938.037849] __blk_trace_remove+0x193/0x1c0 [ 1938.038756] blk_trace_ioctl+0x242/0x290 [ 1938.039586] ? blk_add_trace_bio_remap+0x560/0x560 [ 1938.040581] ? perf_trace_lock+0xac/0x490 [ 1938.041422] ? SOFTIRQ_verbose+0x10/0x10 [ 1938.042270] blkdev_common_ioctl+0xdd6/0x1870 [ 1938.043210] ? blk_ioctl_discard+0x2f0/0x2f0 [ 1938.044115] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1938.045282] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1938.046477] ? do_vfs_ioctl+0x283/0x10d0 [ 1938.047298] ? selinux_inode_getsecctx+0x90/0x90 [ 1938.048273] ? generic_block_fiemap+0x60/0x60 [ 1938.049189] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1938.050219] blkdev_ioctl+0x1dd/0x710 [ 1938.051034] ? blkdev_common_ioctl+0x1870/0x1870 [ 1938.052010] ? selinux_file_ioctl+0xb1/0x260 [ 1938.052916] block_ioctl+0xf9/0x140 [ 1938.053671] ? blkdev_read_iter+0x1c0/0x1c0 [ 1938.054554] __x64_sys_ioctl+0x19a/0x210 [ 1938.055401] do_syscall_64+0x33/0x40 [ 1938.056163] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1938.057198] RIP: 0033:0x7fb208cdbb19 [ 1938.057969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1938.061789] RSP: 002b:00007fb206251188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1938.063347] RAX: ffffffffffffffda RBX: 00007fb208deef60 RCX: 00007fb208cdbb19 [ 1938.065111] RDX: 0000000000000000 RSI: 0000000000001276 RDI: 0000000000000003 [ 1938.066889] RBP: 00007fb2062511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1938.068521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1938.069982] R13: 00007ffccd62b5ff R14: 00007fb206251300 R15: 0000000000022000 [ 1953.879068] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:07:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 50) 02:07:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:07:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (fail_nth: 2) 02:07:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 48) 02:07:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:07:27 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x1b0cc1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) dup2(r1, r0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e04000000000000006e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c80"]) 02:07:27 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10180, 0x113) 02:07:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7a, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1972.152268] ieee802154 phy0 wpan0: encryption failed: -22 [ 1972.157536] ieee802154 phy0 wpan0: encryption failed: -22 [ 1972.162485] ieee802154 phy0 wpan0: encryption failed: -22 [ 1972.168164] FAULT_INJECTION: forcing a failure. [ 1972.168164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1972.170780] CPU: 1 PID: 8849 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1972.172244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1972.173946] Call Trace: [ 1972.174500] dump_stack+0x107/0x167 [ 1972.175257] should_fail.cold+0x5/0xa [ 1972.176053] _copy_from_user+0x2e/0x1b0 [ 1972.176881] __copy_msghdr_from_user+0x91/0x4b0 [ 1972.177837] ? __ia32_sys_shutdown+0x80/0x80 [ 1972.178769] ? ieee802154_sock_release+0xb0/0xb0 [ 1972.179744] ? sock_sendmsg+0x55/0x190 [ 1972.180560] sendmsg_copy_msghdr+0xa1/0x160 [ 1972.181443] ? do_recvmmsg+0x6d0/0x6d0 [ 1972.182272] ? __lock_acquire+0x1657/0x5b00 [ 1972.183192] ___sys_sendmsg+0xc6/0x170 [ 1972.183996] ? sendmsg_copy_msghdr+0x160/0x160 [ 1972.184929] ? vmacache_find+0x55/0x2a0 [ 1972.185754] ? __lockdep_reset_lock+0x180/0x180 [ 1972.186741] ? find_held_lock+0x2c/0x110 [ 1972.187674] ? __might_fault+0xd3/0x180 [ 1972.188494] ? lock_downgrade+0x6d0/0x6d0 [ 1972.189344] ? asm_exc_page_fault+0x1e/0x30 [ 1972.190290] __sys_sendmmsg+0x195/0x470 [ 1972.191120] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1972.192005] ? lock_downgrade+0x6d0/0x6d0 [ 1972.192897] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1972.193897] ? wait_for_completion+0x270/0x270 [ 1972.194849] ? rcu_read_lock_any_held+0x75/0xa0 [ 1972.195797] ? vfs_write+0x354/0xa30 [ 1972.196569] ? fput_many+0x2f/0x1a0 [ 1972.197324] ? ksys_write+0x1a9/0x260 [ 1972.198143] __x64_sys_sendmmsg+0x99/0x100 [ 1972.199011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1972.200090] do_syscall_64+0x33/0x40 [ 1972.200859] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1972.201904] RIP: 0033:0x7f8542659b19 [ 1972.202788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1972.206575] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1972.208142] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1972.209610] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1972.211094] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1972.212545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1972.214022] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1972.225089] FAULT_INJECTION: forcing a failure. [ 1972.225089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1972.227490] CPU: 1 PID: 8853 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1972.228876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1972.230567] Call Trace: [ 1972.231112] dump_stack+0x107/0x167 [ 1972.231860] should_fail.cold+0x5/0xa [ 1972.232642] _copy_from_user+0x2e/0x1b0 [ 1972.233456] __copy_msghdr_from_user+0x91/0x4b0 [ 1972.234561] ? __ia32_sys_shutdown+0x80/0x80 [ 1972.235470] ? ieee802154_sock_release+0xb0/0xb0 [ 1972.236437] ? sock_sendmsg+0x55/0x190 [ 1972.237236] sendmsg_copy_msghdr+0xa1/0x160 [ 1972.238126] ? do_recvmmsg+0x6d0/0x6d0 [ 1972.238928] ? __lock_acquire+0x1657/0x5b00 [ 1972.239819] ___sys_sendmsg+0xc6/0x170 [ 1972.240614] ? sendmsg_copy_msghdr+0x160/0x160 [ 1972.241541] ? vmacache_find+0x55/0x2a0 [ 1972.242383] ? __lockdep_reset_lock+0x180/0x180 [ 1972.243339] ? find_held_lock+0x2c/0x110 [ 1972.244172] ? __might_fault+0xd3/0x180 [ 1972.244983] ? lock_downgrade+0x6d0/0x6d0 [ 1972.245825] ? asm_exc_page_fault+0x1e/0x30 [ 1972.246730] __sys_sendmmsg+0x195/0x470 [ 1972.247542] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1972.248415] ? lock_downgrade+0x6d0/0x6d0 [ 1972.249277] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1972.250383] ? wait_for_completion+0x270/0x270 [ 1972.251323] ? rcu_read_lock_any_held+0x75/0xa0 [ 1972.252359] ? vfs_write+0x354/0xa30 [ 1972.253131] ? fput_many+0x2f/0x1a0 [ 1972.253891] ? ksys_write+0x1a9/0x260 [ 1972.254716] __x64_sys_sendmmsg+0x99/0x100 [ 1972.255594] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1972.256659] do_syscall_64+0x33/0x40 [ 1972.257451] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1972.258531] RIP: 0033:0x7f867efe2b19 [ 1972.259310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1972.263107] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1972.264679] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1972.266284] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1972.267744] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1972.269222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1972.270725] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1972.300294] ieee802154 phy0 wpan0: encryption failed: -22 02:07:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1972.317859] FAULT_INJECTION: forcing a failure. [ 1972.317859] name failslab, interval 1, probability 0, space 0, times 0 [ 1972.320511] CPU: 1 PID: 8860 Comm: syz-executor.6 Not tainted 5.10.161 #1 [ 1972.321947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1972.323994] Call Trace: [ 1972.324684] dump_stack+0x107/0x167 [ 1972.325633] should_fail.cold+0x5/0xa [ 1972.326645] ? create_object.isra.0+0x3a/0xa20 [ 1972.327888] should_failslab+0x5/0x20 [ 1972.328694] kmem_cache_alloc+0x5b/0x360 [ 1972.329561] create_object.isra.0+0x3a/0xa20 [ 1972.330511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1972.331568] __kmalloc+0x16e/0x3f0 [ 1972.332317] ? blk_add_trace_bio_queue+0x30/0x30 [ 1972.333306] tracepoint_probe_unregister+0x1ca/0xd00 [ 1972.334380] ? kfree+0xd7/0x390 [ 1972.335081] blk_unregister_tracepoints+0x98/0x180 [ 1972.336099] __blk_trace_remove+0x193/0x1c0 [ 1972.336996] blk_trace_ioctl+0x242/0x290 [ 1972.337849] ? blk_add_trace_bio_remap+0x560/0x560 [ 1972.338906] ? perf_trace_lock+0xac/0x490 [ 1972.339776] ? SOFTIRQ_verbose+0x10/0x10 [ 1972.340641] blkdev_common_ioctl+0xdd6/0x1870 [ 1972.341582] ? blk_ioctl_discard+0x2f0/0x2f0 [ 1972.342530] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1972.343796] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1972.344866] ? do_vfs_ioctl+0x283/0x10d0 [ 1972.345732] ? selinux_inode_getsecctx+0x90/0x90 02:07:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1972.346755] ? generic_block_fiemap+0x60/0x60 [ 1972.347794] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1972.348826] blkdev_ioctl+0x1dd/0x710 [ 1972.349622] ? blkdev_common_ioctl+0x1870/0x1870 [ 1972.350628] ? selinux_file_ioctl+0xb1/0x260 [ 1972.351563] block_ioctl+0xf9/0x140 [ 1972.352319] ? blkdev_read_iter+0x1c0/0x1c0 [ 1972.353222] __x64_sys_ioctl+0x19a/0x210 [ 1972.354085] do_syscall_64+0x33/0x40 [ 1972.354862] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1972.355938] RIP: 0033:0x7fb208cdbb19 [ 1972.356718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1972.360578] RSP: 002b:00007fb206230188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1972.362183] RAX: ffffffffffffffda RBX: 00007fb208def020 RCX: 00007fb208cdbb19 [ 1972.363691] RDX: 0000000000000000 RSI: 0000000000001276 RDI: 0000000000000003 [ 1972.365369] RBP: 00007fb2062301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1972.366971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1972.368478] R13: 00007ffccd62b5ff R14: 00007fb206230300 R15: 0000000000022000 02:07:27 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:07:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x40, 0x5, 0x7, 0x0, 0x7, 0x14200, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffeff, 0x5}, 0x242, 0x20, 0x6, 0x6, 0x800, 0x7, 0xf7d, 0x0, 0x5, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:07:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:07:28 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 49) 02:07:28 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 51) 02:07:28 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1972.570592] ieee802154 phy0 wpan0: encryption failed: -22 [ 1972.574141] ieee802154 phy0 wpan0: encryption failed: -22 [ 1972.581258] FAULT_INJECTION: forcing a failure. [ 1972.581258] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1972.583814] CPU: 0 PID: 8880 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1972.585224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1972.586959] Call Trace: [ 1972.587521] dump_stack+0x107/0x167 [ 1972.588298] should_fail.cold+0x5/0xa [ 1972.589097] _copy_from_user+0x2e/0x1b0 [ 1972.589945] __copy_msghdr_from_user+0x91/0x4b0 [ 1972.590924] ? __ia32_sys_shutdown+0x80/0x80 [ 1972.591855] ? ieee802154_sock_release+0xb0/0xb0 [ 1972.592842] ? sock_sendmsg+0x55/0x190 [ 1972.593699] sendmsg_copy_msghdr+0xa1/0x160 [ 1972.594615] ? do_recvmmsg+0x6d0/0x6d0 [ 1972.595436] ? __lock_acquire+0x1657/0x5b00 [ 1972.596373] ___sys_sendmsg+0xc6/0x170 [ 1972.597194] ? sendmsg_copy_msghdr+0x160/0x160 [ 1972.598153] ? vmacache_find+0x55/0x2a0 [ 1972.598985] ? __lockdep_reset_lock+0x180/0x180 [ 1972.599976] ? find_held_lock+0x2c/0x110 [ 1972.600829] ? __might_fault+0xd3/0x180 [ 1972.601651] ? lock_downgrade+0x6d0/0x6d0 [ 1972.602516] ? asm_exc_page_fault+0x1e/0x30 [ 1972.603456] __sys_sendmmsg+0x195/0x470 [ 1972.604296] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1972.605186] ? lock_downgrade+0x6d0/0x6d0 [ 1972.606109] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1972.607124] ? wait_for_completion+0x270/0x270 [ 1972.608077] ? rcu_read_lock_any_held+0x75/0xa0 [ 1972.609036] ? vfs_write+0x354/0xa30 [ 1972.609819] ? fput_many+0x2f/0x1a0 [ 1972.610588] ? ksys_write+0x1a9/0x260 [ 1972.611400] __x64_sys_sendmmsg+0x99/0x100 [ 1972.612278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1972.613340] do_syscall_64+0x33/0x40 [ 1972.614137] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1972.615193] RIP: 0033:0x7f8542659b19 [ 1972.615968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1972.619747] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1972.621320] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1972.622798] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1972.624267] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1972.625729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1972.627218] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1972.628953] hpet: Lost 2 RTC interrupts [ 1972.631639] FAULT_INJECTION: forcing a failure. [ 1972.631639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1972.634795] CPU: 1 PID: 8879 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1972.636256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1972.637974] Call Trace: [ 1972.638531] dump_stack+0x107/0x167 [ 1972.639291] should_fail.cold+0x5/0xa [ 1972.640077] _copy_from_user+0x2e/0x1b0 [ 1972.640930] __copy_msghdr_from_user+0x91/0x4b0 [ 1972.641887] ? __ia32_sys_shutdown+0x80/0x80 [ 1972.642822] ? ieee802154_sock_release+0xb0/0xb0 [ 1972.643796] ? sock_sendmsg+0x55/0x190 [ 1972.644617] sendmsg_copy_msghdr+0xa1/0x160 [ 1972.645510] ? do_recvmmsg+0x6d0/0x6d0 [ 1972.646365] ? __lock_acquire+0x1657/0x5b00 [ 1972.647274] ___sys_sendmsg+0xc6/0x170 [ 1972.648065] ? sendmsg_copy_msghdr+0x160/0x160 [ 1972.649016] ? vmacache_find+0x55/0x2a0 [ 1972.649839] ? __lockdep_reset_lock+0x180/0x180 [ 1972.650835] ? find_held_lock+0x2c/0x110 [ 1972.651683] ? __might_fault+0xd3/0x180 [ 1972.652525] ? lock_downgrade+0x6d0/0x6d0 [ 1972.653394] ? asm_exc_page_fault+0x1e/0x30 [ 1972.654327] __sys_sendmmsg+0x195/0x470 [ 1972.655161] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1972.656149] ? lock_downgrade+0x6d0/0x6d0 [ 1972.657033] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1972.658051] ? wait_for_completion+0x270/0x270 [ 1972.658990] ? rcu_read_lock_any_held+0x75/0xa0 [ 1972.659954] ? vfs_write+0x354/0xa30 [ 1972.660734] ? fput_many+0x2f/0x1a0 [ 1972.661505] ? ksys_write+0x1a9/0x260 [ 1972.662316] __x64_sys_sendmmsg+0x99/0x100 [ 1972.663184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1972.664242] do_syscall_64+0x33/0x40 [ 1972.665001] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1972.666093] RIP: 0033:0x7f867efe2b19 [ 1972.666876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1972.670658] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1972.672316] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1972.673779] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1972.675276] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1972.676731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1972.678217] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1988.627966] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:07:53 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 52) 02:07:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:07:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r1, 0x4, 0x2000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = fork() setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r2, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r3, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0xca, 0x6, 0x7f, 0x0, 0x6, 0xa01, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xf31e, 0x1}, 0x8001, 0x7, 0x1, 0x8, 0x7, 0x5, 0x401, 0x0, 0x10000, 0x0, 0x6}, r2, 0x4, r3, 0x8) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0xe, "967a7475e159a250592d915af370"}, &(0x7f00000000c0)=0x32) 02:07:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:07:53 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (fail_nth: 3) 02:07:53 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:07:53 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 50) 02:07:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x12'}, @nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x2, 0x0, 0x0, @ipv6=@remote}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$NL80211_CMD_NOTIFY_RADAR(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80000001, 0x39}}}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}]}, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x40804) sendmsg$nl_generic(r0, &(0x7f0000000880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)={0x188, 0x1d, 0x20, 0x70bd26, 0x25dfdbfb, {0x13}, [@generic="d92f6e03e49355b71027cad3f3c1d6c9eaa909be3350a6f8e423385e226013a4050dd0e4fbd8bb0dc5e48a74f95fd2ea6ec2acdc4e8d1791a3e2317a36aab61fd49e94585808eca6eac6d0b54756731a8ff075d3ebb16e50f1746fb082d4ea53e236efb9ae8db4164474c6", @nested={0x107, 0x2b, 0x0, 0x1, [@generic="d5059586573cf43efce07f0f869f7f0a7ef860ed19bc17d93e27fa0134c11a44a960a9ef2e9eaefc8147e00686d739f3812b88ad7cf66a4c0ce0480e271f38ae29bdac0abc7debc11c9347903d22996662c6eee88756148c211c1b148976bed9742e144492ea89e7", @generic="1c6062a833ad89028916616cda80a382ec9bf8d5b819aac56d62089d283ec6de79b265ece68fab6c1dea4e8901826ed6b11eda3ad074c8acd550624a8d88aa780ded38207e706fadd9563baae1a6ef808b2972a3d6c2b274ae4eb21c05c309f7ce8313f12111d28e0c639bff0b65c38c3803c4533374217251b56f6001d6c8b8abd42a1e9e88cd20eecfc099ce3906", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @typed={0x4, 0x77}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x12}, 0x10) [ 1997.648052] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.649392] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.651999] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.654321] FAULT_INJECTION: forcing a failure. [ 1997.654321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1997.656913] CPU: 0 PID: 8894 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1997.658299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.659963] Call Trace: [ 1997.660498] dump_stack+0x107/0x167 [ 1997.661257] should_fail.cold+0x5/0xa [ 1997.662067] _copy_from_user+0x2e/0x1b0 [ 1997.662925] __copy_msghdr_from_user+0x91/0x4b0 [ 1997.663866] ? __ia32_sys_shutdown+0x80/0x80 [ 1997.664909] ? ieee802154_sock_release+0xb0/0xb0 [ 1997.665972] ? sock_sendmsg+0x55/0x190 [ 1997.666932] sendmsg_copy_msghdr+0xa1/0x160 [ 1997.667838] ? do_recvmmsg+0x6d0/0x6d0 [ 1997.668682] ? __lock_acquire+0x1657/0x5b00 [ 1997.669744] ___sys_sendmsg+0xc6/0x170 [ 1997.670707] ? sendmsg_copy_msghdr+0x160/0x160 [ 1997.671752] ? vmacache_find+0x55/0x2a0 [ 1997.672648] ? __lockdep_reset_lock+0x180/0x180 [ 1997.673687] ? find_held_lock+0x2c/0x110 [ 1997.674668] ? __might_fault+0xd3/0x180 [ 1997.675639] ? lock_downgrade+0x6d0/0x6d0 [ 1997.676628] ? asm_exc_page_fault+0x1e/0x30 [ 1997.677524] __sys_sendmmsg+0x195/0x470 [ 1997.678514] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1997.679392] ? lock_downgrade+0x6d0/0x6d0 [ 1997.680338] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1997.681517] ? wait_for_completion+0x270/0x270 [ 1997.682531] ? rcu_read_lock_any_held+0x75/0xa0 [ 1997.683557] ? vfs_write+0x354/0xa30 [ 1997.684449] ? fput_many+0x2f/0x1a0 [ 1997.685222] ? ksys_write+0x1a9/0x260 [ 1997.686067] __x64_sys_sendmmsg+0x99/0x100 [ 1997.686959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1997.688218] do_syscall_64+0x33/0x40 [ 1997.689010] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.689999] RIP: 0033:0x7f8542659b19 [ 1997.690757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.694638] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1997.696289] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1997.697805] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1997.699303] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.700844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1997.702337] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1997.704127] hpet: Lost 2 RTC interrupts [ 1997.717552] FAULT_INJECTION: forcing a failure. [ 1997.717552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1997.720395] CPU: 0 PID: 8898 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 1997.721796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.723495] Call Trace: [ 1997.724042] dump_stack+0x107/0x167 [ 1997.724794] should_fail.cold+0x5/0xa [ 1997.725586] _copy_from_user+0x2e/0x1b0 [ 1997.726425] __copy_msghdr_from_user+0x91/0x4b0 [ 1997.727379] ? __ia32_sys_shutdown+0x80/0x80 [ 1997.727951] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.728288] ? ieee802154_sock_release+0xb0/0xb0 [ 1997.730390] ? sock_sendmsg+0x55/0x190 [ 1997.731202] sendmsg_copy_msghdr+0xa1/0x160 [ 1997.732084] ? do_recvmmsg+0x6d0/0x6d0 [ 1997.732890] ? __lock_acquire+0x1657/0x5b00 [ 1997.733802] ___sys_sendmsg+0xc6/0x170 [ 1997.734649] ? sendmsg_copy_msghdr+0x160/0x160 [ 1997.735592] ? __lockdep_reset_lock+0x180/0x180 [ 1997.736543] ? trace_hardirqs_on+0x5b/0x180 [ 1997.737444] ? find_held_lock+0x2c/0x110 [ 1997.738298] ? __might_fault+0xd3/0x180 [ 1997.739121] ? lock_downgrade+0x6d0/0x6d0 [ 1997.739972] ? io_schedule_timeout+0x140/0x140 [ 1997.740941] __sys_sendmmsg+0x195/0x470 [ 1997.741768] ? __ia32_sys_sendmsg+0xb0/0xb0 02:07:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 1997.742674] ? lock_downgrade+0x6d0/0x6d0 [ 1997.743704] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1997.744704] ? wait_for_completion+0x270/0x270 [ 1997.745651] ? rcu_read_lock_any_held+0x75/0xa0 [ 1997.746618] ? vfs_write+0x354/0xa30 [ 1997.747402] ? fput_many+0x2f/0x1a0 [ 1997.748159] ? ksys_write+0x1a9/0x260 [ 1997.748974] __x64_sys_sendmmsg+0x99/0x100 [ 1997.749854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1997.750942] do_syscall_64+0x33/0x40 [ 1997.751725] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.752783] RIP: 0033:0x7f867efe2b19 [ 1997.753561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.757284] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1997.758856] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 1997.760329] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1997.761795] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.763288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1997.764749] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 1997.766522] hpet: Lost 2 RTC interrupts 02:07:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x500, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:07:53 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 51) [ 1997.892970] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.925863] ieee802154 phy0 wpan0: encryption failed: -22 [ 1997.938000] FAULT_INJECTION: forcing a failure. [ 1997.938000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1997.940467] CPU: 1 PID: 8918 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1997.941872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.943575] Call Trace: [ 1997.944137] dump_stack+0x107/0x167 [ 1997.944893] should_fail.cold+0x5/0xa [ 1997.945690] _copy_from_user+0x2e/0x1b0 [ 1997.946533] __copy_msghdr_from_user+0x91/0x4b0 [ 1997.947489] ? __ia32_sys_shutdown+0x80/0x80 [ 1997.948411] ? ieee802154_sock_release+0xb0/0xb0 [ 1997.949390] ? sock_sendmsg+0x55/0x190 [ 1997.950210] sendmsg_copy_msghdr+0xa1/0x160 [ 1997.951117] ? do_recvmmsg+0x6d0/0x6d0 [ 1997.951953] ? __lock_acquire+0x1657/0x5b00 [ 1997.952954] ___sys_sendmsg+0xc6/0x170 [ 1997.953761] ? sendmsg_copy_msghdr+0x160/0x160 [ 1997.954708] ? vmacache_find+0x55/0x2a0 [ 1997.955535] ? __lockdep_reset_lock+0x180/0x180 [ 1997.956515] ? find_held_lock+0x2c/0x110 [ 1997.957373] ? __might_fault+0xd3/0x180 [ 1997.958193] ? lock_downgrade+0x6d0/0x6d0 [ 1997.959065] ? asm_exc_page_fault+0x1e/0x30 [ 1997.959997] __sys_sendmmsg+0x195/0x470 [ 1997.960827] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1997.961712] ? lock_downgrade+0x6d0/0x6d0 [ 1997.962610] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1997.963605] ? wait_for_completion+0x270/0x270 [ 1997.964549] ? rcu_read_lock_any_held+0x75/0xa0 [ 1997.965500] ? vfs_write+0x354/0xa30 [ 1997.966293] ? fput_many+0x2f/0x1a0 [ 1997.967047] ? ksys_write+0x1a9/0x260 [ 1997.967854] __x64_sys_sendmmsg+0x99/0x100 [ 1997.968778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1997.969830] do_syscall_64+0x33/0x40 [ 1997.970605] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.971646] RIP: 0033:0x7f8542659b19 [ 1997.972408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.976137] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1997.977691] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 1997.979160] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 1997.980605] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.982049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1997.983504] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 1998.022013] ieee802154 phy0 wpan0: encryption failed: -22 [ 2013.383810] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:08:18 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x600, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:08:18 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 52) 02:08:18 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:08:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20440}, 0x18) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x3, 0x1, 0x6, 0xfff, 0x2, 0x6, 0x5, 0xb7, 0x40, 0x31b, 0x4, 0x20, 0x38, 0x2, 0x3, 0x4, 0x7}, [{0x4, 0x69a444f7, 0x6, 0x1, 0x9, 0x7fffffff, 0x2, 0x5}, {0x5, 0x2, 0x8, 0x0, 0x2, 0x6, 0xfffffffffffffff7, 0xffffffffffffffc0}], "8565b479c3528c191edae8965f8a96437a7283ef881e1c6f4c0da26b1897dfd46af05a4bc13d608aa49c447a9a4ed9ba597f968e7598624925bd367687c04e8881fb7059b2c78d2d00a58c272107b2186fdb4829b26570e12d704580cae307df29ad6683c1335131d6c3eb84afd45b81482772433c50073173a84f77bf4e5c76cf66ba8cf8811c23b0cfd3392d01a7a12ad6a7fd4908e7491a48cd4b31277efce7", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x651) 02:08:18 executing program 5: ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 02:08:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:08:18 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 53) 02:08:18 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2023.305031] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.312133] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.317021] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.339151] FAULT_INJECTION: forcing a failure. [ 2023.339151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2023.341692] CPU: 0 PID: 8926 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2023.343095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.345074] Call Trace: [ 2023.345728] dump_stack+0x107/0x167 [ 2023.346635] should_fail.cold+0x5/0xa [ 2023.347578] _copy_from_user+0x2e/0x1b0 [ 2023.348553] __copy_msghdr_from_user+0x91/0x4b0 [ 2023.349677] ? __ia32_sys_shutdown+0x80/0x80 [ 2023.350772] ? ieee802154_sock_release+0xb0/0xb0 [ 2023.351917] ? sock_sendmsg+0x55/0x190 [ 2023.352872] sendmsg_copy_msghdr+0xa1/0x160 [ 2023.353904] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.354875] ? __lock_acquire+0x1657/0x5b00 [ 2023.355918] ___sys_sendmsg+0xc6/0x170 [ 2023.356712] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.357630] ? vmacache_find+0x55/0x2a0 [ 2023.358440] ? __lockdep_reset_lock+0x180/0x180 [ 2023.359411] ? find_held_lock+0x2c/0x110 [ 2023.360248] ? __might_fault+0xd3/0x180 [ 2023.361059] ? lock_downgrade+0x6d0/0x6d0 [ 2023.361894] ? asm_exc_page_fault+0x1e/0x30 [ 2023.362016] blktrace: Concurrent blktraces are not allowed on loop6 [ 2023.362817] __sys_sendmmsg+0x195/0x470 [ 2023.364469] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2023.365353] ? lock_downgrade+0x6d0/0x6d0 [ 2023.366231] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2023.367224] ? wait_for_completion+0x270/0x270 [ 2023.368172] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.369104] ? vfs_write+0x354/0xa30 [ 2023.369870] ? fput_many+0x2f/0x1a0 [ 2023.370613] ? ksys_write+0x1a9/0x260 [ 2023.371415] __x64_sys_sendmmsg+0x99/0x100 [ 2023.372271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.373306] do_syscall_64+0x33/0x40 [ 2023.374068] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.375122] RIP: 0033:0x7f8542659b19 [ 2023.375884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.379595] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2023.381134] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2023.382571] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2023.384021] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.385457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.386930] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2023.388624] hpet: Lost 2 RTC interrupts [ 2023.407243] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.408428] FAULT_INJECTION: forcing a failure. [ 2023.408428] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2023.409948] CPU: 1 PID: 8940 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2023.410891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.412033] Call Trace: [ 2023.412394] dump_stack+0x107/0x167 [ 2023.412891] should_fail.cold+0x5/0xa [ 2023.413415] _copy_from_user+0x2e/0x1b0 [ 2023.413969] __copy_msghdr_from_user+0x91/0x4b0 [ 2023.414632] ? __ia32_sys_shutdown+0x80/0x80 [ 2023.415192] ? ieee802154_sock_release+0xb0/0xb0 [ 2023.415832] ? sock_sendmsg+0x55/0x190 [ 2023.416323] sendmsg_copy_msghdr+0xa1/0x160 [ 2023.416884] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.417377] ? __lock_acquire+0x1657/0x5b00 [ 2023.417948] ___sys_sendmsg+0xc6/0x170 [ 2023.418438] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.419034] ? vmacache_find+0x55/0x2a0 [ 2023.419553] ? __lockdep_reset_lock+0x180/0x180 [ 2023.420155] ? find_held_lock+0x2c/0x110 [ 2023.420680] ? __might_fault+0xd3/0x180 02:08:18 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2023.421198] ? lock_downgrade+0x6d0/0x6d0 [ 2023.421957] ? asm_exc_page_fault+0x1e/0x30 [ 2023.422536] __sys_sendmmsg+0x195/0x470 [ 2023.423063] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2023.423609] ? lock_downgrade+0x6d0/0x6d0 [ 2023.424143] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2023.424753] ? wait_for_completion+0x270/0x270 [ 2023.425323] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.425911] ? vfs_write+0x354/0xa30 [ 2023.426400] ? fput_many+0x2f/0x1a0 [ 2023.426885] ? ksys_write+0x1a9/0x260 [ 2023.427393] __x64_sys_sendmmsg+0x99/0x100 [ 2023.427935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.428606] do_syscall_64+0x33/0x40 [ 2023.429100] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.429775] RIP: 0033:0x7f867efe2b19 02:08:18 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x700, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2023.430255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.432760] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2023.433745] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2023.434688] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2023.435621] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.436541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.437477] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:08:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2023.457111] blktrace: Concurrent blktraces are not allowed on loop6 [ 2023.460713] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.486909] ieee802154 phy0 wpan0: encryption failed: -22 02:08:19 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x101) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)=r3) fcntl$setown(0xffffffffffffffff, 0x8, r3) r4 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x2a8203, 0x100) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) [ 2023.526052] blktrace: Concurrent blktraces are not allowed on loop12 02:08:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:08:19 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) 02:08:19 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 54) 02:08:19 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 53) 02:08:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r1, 0x4, 0x2000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000200)={0x6, 'geneve1\x00', {0x5}, 0x1}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) chmod(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_complete(0x0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x1) [ 2023.572949] ieee802154 phy0 wpan0: encryption failed: -22 02:08:19 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) [ 2023.577667] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.590373] FAULT_INJECTION: forcing a failure. [ 2023.590373] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2023.591955] CPU: 1 PID: 8961 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2023.592776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.593834] Call Trace: [ 2023.594174] dump_stack+0x107/0x167 [ 2023.594631] should_fail.cold+0x5/0xa [ 2023.595105] _copy_from_user+0x2e/0x1b0 [ 2023.595606] __copy_msghdr_from_user+0x91/0x4b0 [ 2023.596167] ? __ia32_sys_shutdown+0x80/0x80 [ 2023.596719] ? ieee802154_sock_release+0xb0/0xb0 [ 2023.597284] ? sock_sendmsg+0x55/0x190 [ 2023.597769] sendmsg_copy_msghdr+0xa1/0x160 [ 2023.598293] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.598780] ? __lock_acquire+0x1657/0x5b00 [ 2023.599327] ___sys_sendmsg+0xc6/0x170 [ 2023.599799] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.600424] ? vmacache_find+0x55/0x2a0 [ 2023.600985] ? __lockdep_reset_lock+0x180/0x180 [ 2023.601593] ? find_held_lock+0x2c/0x110 [ 2023.602071] ? __might_fault+0xd3/0x180 [ 2023.602690] ? lock_downgrade+0x6d0/0x6d0 [ 2023.603227] ? asm_exc_page_fault+0x1e/0x30 [ 2023.603785] __sys_sendmmsg+0x195/0x470 [ 2023.604274] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2023.604800] ? lock_downgrade+0x6d0/0x6d0 [ 2023.605320] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2023.605913] ? wait_for_completion+0x270/0x270 [ 2023.606460] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.607030] ? vfs_write+0x354/0xa30 [ 2023.607478] ? fput_many+0x2f/0x1a0 [ 2023.607909] ? ksys_write+0x1a9/0x260 [ 2023.608373] __x64_sys_sendmmsg+0x99/0x100 [ 2023.608872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.609566] do_syscall_64+0x33/0x40 [ 2023.610015] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.610630] RIP: 0033:0x7f8542659b19 [ 2023.611082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.613247] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2023.614147] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2023.614992] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2023.615830] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.616664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.617500] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2023.623145] FAULT_INJECTION: forcing a failure. [ 2023.623145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2023.624561] CPU: 1 PID: 8958 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2023.625459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.626442] Call Trace: [ 2023.626780] dump_stack+0x107/0x167 [ 2023.627215] should_fail.cold+0x5/0xa [ 2023.627672] _copy_from_user+0x2e/0x1b0 [ 2023.628139] __copy_msghdr_from_user+0x91/0x4b0 [ 2023.628696] ? __ia32_sys_shutdown+0x80/0x80 [ 2023.629217] ? perf_trace_lock+0xac/0x490 [ 2023.629709] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2023.630330] sendmsg_copy_msghdr+0xa1/0x160 [ 2023.630836] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.631307] ? find_held_lock+0x2c/0x110 [ 2023.631785] ___sys_sendmsg+0xc6/0x170 [ 2023.632253] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.632779] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.633405] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2023.633935] ? trace_hardirqs_on+0x5b/0x180 [ 2023.634441] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2023.634988] ? finish_task_switch+0x126/0x5d0 [ 2023.635524] ? finish_task_switch+0xef/0x5d0 [ 2023.636047] ? __switch_to+0x572/0xff0 [ 2023.636508] ? __switch_to_asm+0x3a/0x60 [ 2023.636988] ? __switch_to_asm+0x34/0x60 [ 2023.637470] ? __schedule+0x850/0x1e90 [ 2023.637932] ? io_schedule_timeout+0x140/0x140 [ 2023.638511] __sys_sendmmsg+0x195/0x470 [ 2023.639001] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2023.639507] ? lock_downgrade+0x6d0/0x6d0 [ 2023.640007] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2023.640591] ? wait_for_completion+0x270/0x270 [ 2023.641241] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.641793] ? vfs_write+0x354/0xa30 [ 2023.642215] ? fput_many+0x2f/0x1a0 [ 2023.642657] ? ksys_write+0x1a9/0x260 [ 2023.643115] __x64_sys_sendmmsg+0x99/0x100 [ 2023.643622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.644225] do_syscall_64+0x33/0x40 [ 2023.644673] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.645277] RIP: 0033:0x7f867efe2b19 [ 2023.645726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.647321] blktrace: Concurrent blktraces are not allowed on loop12 [ 2023.647911] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2023.647924] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2023.647930] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2023.647937] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.647943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.647949] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2023.692190] blktrace: Concurrent blktraces are not allowed on loop12 [ 2038.154738] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:08:43 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (fail_nth: 1) 02:08:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x9, 0x1, 0xfc, 0x0, 0x8, 0x4122, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x4002, 0x6, 0xfffffff9, 0x9, 0x40, 0x2, 0x9, 0x0, 0x8, 0x0, 0x8}, 0x0, 0xd, r0, 0x9) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 02:08:43 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) 02:08:43 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 55) 02:08:43 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 54) [ 2047.951896] ieee802154 phy0 wpan0: encryption failed: -22 [ 2047.954572] blktrace: Concurrent blktraces are not allowed on loop12 [ 2047.973375] FAULT_INJECTION: forcing a failure. [ 2047.973375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2047.975824] CPU: 0 PID: 8982 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2047.977224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2047.978928] Call Trace: [ 2047.979491] dump_stack+0x107/0x167 [ 2047.979970] blktrace: Concurrent blktraces are not allowed on loop12 [ 2047.980253] should_fail.cold+0x5/0xa [ 2047.982367] _copy_from_user+0x2e/0x1b0 [ 2047.983226] __copy_msghdr_from_user+0x91/0x4b0 [ 2047.984001] ieee802154 phy0 wpan0: encryption failed: -22 [ 2047.984183] ? __ia32_sys_shutdown+0x80/0x80 [ 2047.984229] ? ieee802154_sock_release+0xb0/0xb0 [ 2047.987233] ? sock_sendmsg+0x55/0x190 [ 2047.988050] sendmsg_copy_msghdr+0xa1/0x160 [ 2047.988941] ? do_recvmmsg+0x6d0/0x6d0 [ 2047.989753] ? __lock_acquire+0x1657/0x5b00 [ 2047.990692] ___sys_sendmsg+0xc6/0x170 [ 2047.991522] ? sendmsg_copy_msghdr+0x160/0x160 [ 2047.992461] ? vmacache_find+0x55/0x2a0 [ 2047.993297] ? __lockdep_reset_lock+0x180/0x180 [ 2047.994287] ? find_held_lock+0x2c/0x110 [ 2047.995153] ? __might_fault+0xd3/0x180 [ 2047.995979] ? lock_downgrade+0x6d0/0x6d0 [ 2047.996832] ? asm_exc_page_fault+0x1e/0x30 [ 2047.997764] __sys_sendmmsg+0x195/0x470 [ 2047.998601] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2047.999505] ? lock_downgrade+0x6d0/0x6d0 [ 2048.000405] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2048.001404] ? wait_for_completion+0x270/0x270 [ 2048.002346] ? rcu_read_lock_any_held+0x75/0xa0 [ 2048.003316] ? vfs_write+0x354/0xa30 [ 2048.004092] ? fput_many+0x2f/0x1a0 [ 2048.004846] ? ksys_write+0x1a9/0x260 [ 2048.005661] __x64_sys_sendmmsg+0x99/0x100 [ 2048.006531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2048.007609] do_syscall_64+0x33/0x40 [ 2048.008390] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2048.009446] RIP: 0033:0x7f8542659b19 [ 2048.010216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2048.013962] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2048.015540] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2048.017004] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2048.018459] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2048.019935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2048.021407] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2048.023099] hpet: Lost 2 RTC interrupts [ 2048.023640] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.029395] blktrace: Concurrent blktraces are not allowed on loop6 [ 2048.031597] ieee802154 phy0 wpan0: encryption failed: -22 02:08:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff, 0x1, &(0x7f0000001380)=[{&(0x7f0000010000)="601c6d6b646f7366805d8600080801000240004000f801", 0x17}], 0x0, &(0x7f0000000140)={[{@fat=@time_offset}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xfd, 0x2}, {&(0x7f0000000280)="af849ce55f38fc5f5d9ec233001396d0f10f6cac67ed8c3a766f7890b8a457dbbc4a6cb08e2a438e423a0c4a29d563ffca37895e44dfbc5e2331b1657400376448ee513877f567424d9c1f8c66a23d8f5f624c682c00534167112e24e9225a2d78c5f86df6b34dcca6f57a3d2f9416645082e4b163715a5a73c8305a45ab8cb3085484982fc11dec3cdd3bbb9508a086745bea5b3807e8eed4fe6b4d85f8619559c227ee90014342f432370cc3d4812d1138757228", 0xb5, 0x800}, {&(0x7f0000000340)="0da26b161a9071cde6fc2f4980579fdc13bdc33f80b44935f95f12f13e79f550fb98c2e4fb92818d06212f4522052964c0543fa476db6285a02ba34e6a832cc23c1d8007c980b53b4cb358419142ee9bd20d3f6f6e3ae2b4ce0742f5c3200418fb714917be60116235cf71bdb5a38c90badce9d8", 0x74, 0x7fff}], 0x40000, &(0x7f00000004c0)={[{@huge_never}, {@huge_always}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x34, 0x36, 0x6b, 0x70, 0x37, 0x3d, 0x38]}}, {@huge_never}, {@huge_advise}, {@huge_within_size}], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, 'time_offset'}}, {@euid_lt={'euid<', r0}}, {@dont_appraise}, {@uid_lt={'uid<', 0xee01}}]}) r1 = syz_open_dev$vcsu(&(0x7f0000000580), 0x0, 0x16b300) signalfd(r1, &(0x7f00000005c0)={[0x54]}, 0x8) chdir(&(0x7f0000000040)='./file0\x00') 02:08:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:08:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2048.037027] FAULT_INJECTION: forcing a failure. [ 2048.037027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2048.039490] CPU: 0 PID: 8993 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2048.040905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2048.042591] Call Trace: [ 2048.043150] dump_stack+0x107/0x167 [ 2048.043972] should_fail.cold+0x5/0xa [ 2048.044764] _copy_from_user+0x2e/0x1b0 [ 2048.045592] __copy_msghdr_from_user+0x91/0x4b0 [ 2048.046547] ? __ia32_sys_shutdown+0x80/0x80 [ 2048.047523] ? ieee802154_sock_release+0xb0/0xb0 [ 2048.048505] ? sock_sendmsg+0x55/0x190 [ 2048.049322] sendmsg_copy_msghdr+0xa1/0x160 [ 2048.050205] ? do_recvmmsg+0x6d0/0x6d0 [ 2048.051116] ? __lock_acquire+0x1657/0x5b00 [ 2048.052145] ___sys_sendmsg+0xc6/0x170 [ 2048.053053] ? sendmsg_copy_msghdr+0x160/0x160 [ 2048.054100] ? vmacache_find+0x55/0x2a0 [ 2048.055051] ? __lockdep_reset_lock+0x180/0x180 [ 2048.056152] ? find_held_lock+0x2c/0x110 [ 2048.057104] ? __might_fault+0xd3/0x180 [ 2048.058026] ? lock_downgrade+0x6d0/0x6d0 [ 2048.058933] ? asm_exc_page_fault+0x1e/0x30 [ 2048.059863] __sys_sendmmsg+0x195/0x470 [ 2048.060694] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2048.061583] ? lock_downgrade+0x6d0/0x6d0 [ 2048.062474] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2048.063492] ? wait_for_completion+0x270/0x270 [ 2048.064434] ? rcu_read_lock_any_held+0x75/0xa0 [ 2048.065381] ? vfs_write+0x354/0xa30 [ 2048.066159] ? fput_many+0x2f/0x1a0 [ 2048.066926] ? ksys_write+0x1a9/0x260 [ 2048.067735] __x64_sys_sendmmsg+0x99/0x100 [ 2048.068609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2048.069662] do_syscall_64+0x33/0x40 [ 2048.070428] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2048.071481] RIP: 0033:0x7f867efe2b19 [ 2048.072255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2048.076017] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2048.077577] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2048.079039] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2048.080493] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2048.081945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2048.083409] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2048.085125] hpet: Lost 2 RTC interrupts 02:08:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x101) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)=r3) fcntl$setown(0xffffffffffffffff, 0x8, r3) r4 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x2a8203, 0x100) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) 02:08:43 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) 02:08:43 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 56) [ 2048.167025] blktrace: Concurrent blktraces are not allowed on loop12 [ 2048.179461] blktrace: Concurrent blktraces are not allowed on loop12 02:08:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) r2 = perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x7, 0x8, 0x2, 0x0, 0x1, 0x80000, 0xe, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x2, @perf_config_ext={0x7ff, 0x8000}, 0x1, 0x3, 0x3, 0x4, 0x7f, 0x9, 0x7fff, 0x0, 0x8, 0x0, 0x493e}, 0xffffffffffffffff, 0x10, r0, 0x4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r0, r0, r1, r2, r3], 0x5) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffd42) 02:08:43 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 55) 02:08:43 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:08:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:08:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2048.232757] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.240250] FAULT_INJECTION: forcing a failure. [ 2048.240250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2048.242823] CPU: 0 PID: 9009 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2048.244255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2048.245959] Call Trace: [ 2048.246511] dump_stack+0x107/0x167 [ 2048.247060] blktrace: Concurrent blktraces are not allowed on loop6 [ 2048.247291] should_fail.cold+0x5/0xa [ 2048.249411] _copy_from_user+0x2e/0x1b0 [ 2048.250241] __copy_msghdr_from_user+0x91/0x4b0 [ 2048.251261] ? __ia32_sys_shutdown+0x80/0x80 [ 2048.252178] ? ieee802154_sock_release+0xb0/0xb0 [ 2048.253150] ? sock_sendmsg+0x55/0x190 [ 2048.253970] sendmsg_copy_msghdr+0xa1/0x160 [ 2048.254859] ? do_recvmmsg+0x6d0/0x6d0 [ 2048.255686] ? __lock_acquire+0x1657/0x5b00 [ 2048.256612] ___sys_sendmsg+0xc6/0x170 [ 2048.257418] ? sendmsg_copy_msghdr+0x160/0x160 [ 2048.258354] ? vmacache_find+0x55/0x2a0 [ 2048.259207] ? __lockdep_reset_lock+0x180/0x180 [ 2048.260188] ? find_held_lock+0x2c/0x110 [ 2048.261040] ? __might_fault+0xd3/0x180 [ 2048.261859] ? lock_downgrade+0x6d0/0x6d0 [ 2048.262713] ? asm_exc_page_fault+0x1e/0x30 [ 2048.263658] __sys_sendmmsg+0x195/0x470 [ 2048.264497] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2048.265390] ? lock_downgrade+0x6d0/0x6d0 [ 2048.266286] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2048.267299] ? wait_for_completion+0x270/0x270 [ 2048.268244] ? rcu_read_lock_any_held+0x75/0xa0 [ 2048.268480] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.269197] ? vfs_write+0x354/0xa30 [ 2048.269228] ? fput_many+0x2f/0x1a0 [ 2048.269253] ? ksys_write+0x1a9/0x260 [ 2048.269301] __x64_sys_sendmmsg+0x99/0x100 [ 2048.273358] FAULT_INJECTION: forcing a failure. [ 2048.273358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2048.273505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2048.276854] do_syscall_64+0x33/0x40 [ 2048.277635] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2048.278681] RIP: 0033:0x7f867efe2b19 [ 2048.279479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2048.283219] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2048.284774] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2048.286225] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2048.287695] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2048.289149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2048.290599] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2048.292122] CPU: 1 PID: 9015 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2048.292358] hpet: Lost 2 RTC interrupts [ 2048.293630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2048.296172] Call Trace: [ 2048.296726] dump_stack+0x107/0x167 [ 2048.297482] should_fail.cold+0x5/0xa [ 2048.298278] _copy_from_user+0x2e/0x1b0 [ 2048.299117] __copy_msghdr_from_user+0x91/0x4b0 [ 2048.300071] ? __ia32_sys_shutdown+0x80/0x80 [ 2048.300986] ? ieee802154_sock_release+0xb0/0xb0 [ 2048.301965] ? sock_sendmsg+0x55/0x190 [ 2048.302790] sendmsg_copy_msghdr+0xa1/0x160 [ 2048.303695] ? do_recvmmsg+0x6d0/0x6d0 [ 2048.304506] ? __lock_acquire+0x1657/0x5b00 [ 2048.305418] ___sys_sendmsg+0xc6/0x170 [ 2048.306224] ? sendmsg_copy_msghdr+0x160/0x160 [ 2048.307160] ? vmacache_find+0x55/0x2a0 [ 2048.307990] ? __lockdep_reset_lock+0x180/0x180 [ 2048.308959] ? find_held_lock+0x2c/0x110 [ 2048.309812] ? __might_fault+0xd3/0x180 [ 2048.310630] ? lock_downgrade+0x6d0/0x6d0 [ 2048.311504] ? asm_exc_page_fault+0x1e/0x30 [ 2048.312441] __sys_sendmmsg+0x195/0x470 [ 2048.313379] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2048.314265] ? lock_downgrade+0x6d0/0x6d0 [ 2048.315170] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2048.316169] ? wait_for_completion+0x270/0x270 [ 2048.317111] ? rcu_read_lock_any_held+0x75/0xa0 [ 2048.318060] ? vfs_write+0x354/0xa30 [ 2048.318836] ? fput_many+0x2f/0x1a0 [ 2048.319601] ? ksys_write+0x1a9/0x260 [ 2048.320411] __x64_sys_sendmmsg+0x99/0x100 [ 2048.321280] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2048.322359] do_syscall_64+0x33/0x40 [ 2048.323134] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2048.324178] RIP: 0033:0x7f8542659b19 [ 2048.324945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2048.328753] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2048.330320] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2048.330897] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.331771] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2048.331785] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2048.331800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2048.331814] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:08:43 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) 02:08:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2048.426562] ieee802154 phy0 wpan0: encryption failed: -22 02:08:43 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) [ 2048.440255] blktrace: Concurrent blktraces are not allowed on loop12 [ 2048.449381] blktrace: Concurrent blktraces are not allowed on loop12 02:08:44 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4076, 0xfec}], 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000440)={{r0}, 0x9, 0x401, 0x10001}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x100) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f0000001640)=@getae={0x4c, 0x1f, 0x20, 0x70bd2c, 0x25dfdbff, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d4, 0xa, 0x85214112f556ed61}, @in=@empty, 0xfffffffb, 0x3500}, [@offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@getae={0x84, 0x1f, 0x4, 0x70bd29, 0x25dfdbfc, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0xa, 0x3c}, @in6=@remote, 0x8001, 0x3504}, [@XFRMA_IF_ID={0x8}, @replay_esn_val={0x3c, 0x17, {0x8, 0x70bd2c, 0x70bd2a, 0x70bd29, 0x70bd2c, 0x3, [0x1, 0xdf, 0x9, 0x4, 0x80000001, 0x928, 0x7, 0x80000001]}}]}, 0x84}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYRES16, @ANYRES32=r1, @ANYRESDEC=r3, @ANYRESHEX=r0, @ANYRESOCT, @ANYRESDEC=r2], 0x148}}, 0x4000001) dup2(r1, 0xffffffffffffffff) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x104) readlinkat(0xffffffffffffffff, &(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)=""/234, 0xea) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r4, 0x541b, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000001740)={@remote}, 0x14) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000000)={0x3, 'veth0_macvtap\x00', 0x3}, 0x18) socketpair$unix(0x1, 0xa2b430c4ea52c468, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) 02:08:44 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 56) 02:08:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x1, 0x4, &(0x7f0000001300)=[{&(0x7f0000000140)="c2d668bb0d90c68c5992ba6c5b4248f63616762ad289ccae04b1d224ec1f73fce3ab9667a1c69c588e9a1dfe9d87af1e7ea06d5f2cdef3832db22a843dd0064fdda6eb53c482c2c2a499cd0b935cc4d9bfad25151605fc1b1fad4fbe0bd99ecd59d82a11ffd7a252639d683a1e64a3a06483bd40ae53f81f2038a014", 0x7c, 0x6}, {&(0x7f00000001c0)="82c50a9a18afa22134a2520773bec40a0048dd12ee4cd65ecb769191446bb2d1851504edb97cd443e4b9b25d65ac09110ed699ca6cea4ffbff57f5264b5bb2fb6ef6880a1524f727c8f50139dbb5fe147b72dde3468936b2712e0a7f23c518bbc0f00a78de2574782f0f436e9ac006542db5b0f2cea3548e63dad33511f5d94ad1514683", 0x84}, {&(0x7f0000000280)="2a43d495681edecbb4d90303fcc219c5caf78d3725ec605be5e5745e6c88b0fa2f2bd8de73d01be0573a698ec5056e2405695f1a269e13e2d46f40131521c189620da5b948180a8e3f217bf69859c4e2fa178ae7", 0x54, 0x8}, {&(0x7f0000000300)="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", 0x1000, 0x2}], 0x4000, &(0x7f0000001380)={[{'(\'-%'}, {}, {'[['}, {'\x00'}, {'(:)]-\\,'}, {'{'}], [{@smackfstransmute={'smackfstransmute', 0x3d, ',-'}}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, '-!\\'}}, {@subj_user}, {@fowner_gt}]}) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000001400)={0x3f, 0xbe, 0x2, 0xfffffffc, 0x7, [{0x3, 0x1ff, 0x3e000000000, '\x00', 0x88}, {0x5, 0x101, 0x2, '\x00', 0x1b4ef6bc69d0a926}, {0x7fffffff, 0x800, 0x7ff}, {0xffe, 0xd59, 0x1, '\x00', 0x900}, {0x4, 0x7, 0x3, '\x00', 0x2}, {0x80000000, 0x4, 0x80000000, '\x00', 0x400}, {0x2d, 0x5, 0x1}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r1, 0x4, 0x2000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = fork() setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r2, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) syz_open_procfs(r2, &(0x7f00000015c0)='net/ip6_flowlabel\x00') r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) [ 2048.508556] blktrace: Concurrent blktraces are not allowed on loop6 02:08:44 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) 02:08:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:08:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1253, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2048.586338] nfs4: Unknown parameter '('-%' [ 2048.614877] blktrace: Concurrent blktraces are not allowed on loop12 [ 2048.626239] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.637981] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.638368] FAULT_INJECTION: forcing a failure. [ 2048.638368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2048.641955] CPU: 0 PID: 9042 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2048.643394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2048.645123] Call Trace: [ 2048.645689] dump_stack+0x107/0x167 [ 2048.646470] should_fail.cold+0x5/0xa [ 2048.647291] _copy_from_user+0x2e/0x1b0 [ 2048.648155] __copy_msghdr_from_user+0x91/0x4b0 [ 2048.649157] ? __ia32_sys_shutdown+0x80/0x80 [ 2048.650086] ? ieee802154_sock_release+0xb0/0xb0 [ 2048.651092] ? sock_sendmsg+0x55/0x190 [ 2048.651907] sendmsg_copy_msghdr+0xa1/0x160 [ 2048.652829] ? do_recvmmsg+0x6d0/0x6d0 [ 2048.653638] ? __lock_acquire+0x1657/0x5b00 [ 2048.654565] ___sys_sendmsg+0xc6/0x170 [ 2048.655384] ? sendmsg_copy_msghdr+0x160/0x160 [ 2048.656323] ? vmacache_find+0x55/0x2a0 [ 2048.657163] ? __lockdep_reset_lock+0x180/0x180 [ 2048.658139] ? find_held_lock+0x2c/0x110 [ 2048.659005] ? __might_fault+0xd3/0x180 [ 2048.659821] ? lock_downgrade+0x6d0/0x6d0 [ 2048.660682] ? asm_exc_page_fault+0x1e/0x30 [ 2048.661612] __sys_sendmmsg+0x195/0x470 [ 2048.662442] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2048.663358] ? lock_downgrade+0x6d0/0x6d0 [ 2048.664257] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2048.665251] ? wait_for_completion+0x270/0x270 [ 2048.666209] ? rcu_read_lock_any_held+0x75/0xa0 [ 2048.667164] ? vfs_write+0x354/0xa30 [ 2048.667937] ? fput_many+0x2f/0x1a0 [ 2048.668692] ? ksys_write+0x1a9/0x260 [ 2048.669498] __x64_sys_sendmmsg+0x99/0x100 [ 2048.670368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2048.671427] do_syscall_64+0x33/0x40 [ 2048.672192] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2048.673233] RIP: 0033:0x7f8542659b19 [ 2048.674000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2048.677743] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2048.679313] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2048.680799] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2048.682250] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2048.683756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2048.685224] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2048.686953] hpet: Lost 1 RTC interrupts [ 2048.703253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2048.727999] nfs4: Unknown parameter '('-%' [ 2064.844581] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:09:11 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) 02:09:11 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 57) 02:09:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$BTRFS_IOC_GET_FEATURES(r1, 0x80189439, &(0x7f0000000000)) getpid() 02:09:11 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 57) 02:09:11 executing program 2: signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600), 0x0, &(0x7f0000001640)=ANY=[], 0x38}}], 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x40000, 0xc0) 02:09:11 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:09:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:09:11 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) [ 2075.582468] ieee802154 phy0 wpan0: encryption failed: -22 [ 2075.583474] blktrace: Concurrent blktraces are not allowed on loop6 [ 2075.584492] FAULT_INJECTION: forcing a failure. [ 2075.584492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2075.586578] ieee802154 phy0 wpan0: encryption failed: -22 [ 2075.587726] CPU: 0 PID: 9061 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2075.590083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2075.591780] Call Trace: [ 2075.592335] dump_stack+0x107/0x167 [ 2075.593086] should_fail.cold+0x5/0xa [ 2075.593876] _copy_from_user+0x2e/0x1b0 [ 2075.594716] __copy_msghdr_from_user+0x91/0x4b0 [ 2075.595035] blktrace: Concurrent blktraces are not allowed on loop6 [ 2075.595666] ? __ia32_sys_shutdown+0x80/0x80 [ 2075.595709] ? ieee802154_sock_release+0xb0/0xb0 [ 2075.598865] ? sock_sendmsg+0x55/0x190 [ 2075.599718] sendmsg_copy_msghdr+0xa1/0x160 [ 2075.600610] ? do_recvmmsg+0x6d0/0x6d0 [ 2075.601417] ? __lock_acquire+0x1657/0x5b00 [ 2075.602327] ___sys_sendmsg+0xc6/0x170 [ 2075.603128] ? sendmsg_copy_msghdr+0x160/0x160 [ 2075.604072] ? vmacache_find+0x55/0x2a0 [ 2075.604892] ? __lockdep_reset_lock+0x180/0x180 [ 2075.605858] ? find_held_lock+0x2c/0x110 [ 2075.606697] ? __might_fault+0xd3/0x180 [ 2075.607515] ? lock_downgrade+0x6d0/0x6d0 [ 2075.608360] ? asm_exc_page_fault+0x1e/0x30 [ 2075.609281] __sys_sendmmsg+0x195/0x470 [ 2075.610107] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2075.610984] ? lock_downgrade+0x6d0/0x6d0 [ 2075.611877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2075.612862] ? wait_for_completion+0x270/0x270 [ 2075.613796] ? rcu_read_lock_any_held+0x75/0xa0 [ 2075.614737] ? vfs_write+0x354/0xa30 [ 2075.615543] ? fput_many+0x2f/0x1a0 [ 2075.616290] ? ksys_write+0x1a9/0x260 [ 2075.617089] __x64_sys_sendmmsg+0x99/0x100 [ 2075.617949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2075.618990] do_syscall_64+0x33/0x40 [ 2075.619757] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2075.620795] RIP: 0033:0x7f8542659b19 [ 2075.621551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.625236] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2075.626778] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2075.628231] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2075.629671] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.631134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2075.632581] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2075.634251] hpet: Lost 2 RTC interrupts [ 2075.646347] ieee802154 phy0 wpan0: encryption failed: -22 [ 2075.647298] blktrace: Concurrent blktraces are not allowed on loop12 [ 2075.654112] FAULT_INJECTION: forcing a failure. [ 2075.654112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2075.654298] blktrace: Concurrent blktraces are not allowed on loop12 [ 2075.656751] CPU: 1 PID: 9067 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2075.659511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2075.661269] Call Trace: [ 2075.661838] dump_stack+0x107/0x167 [ 2075.662620] should_fail.cold+0x5/0xa [ 2075.663460] _copy_from_user+0x2e/0x1b0 [ 2075.664317] __copy_msghdr_from_user+0x91/0x4b0 [ 2075.665315] ? __ia32_sys_shutdown+0x80/0x80 [ 2075.666264] ? ieee802154_sock_release+0xb0/0xb0 [ 2075.667286] ? sock_sendmsg+0x55/0x190 [ 2075.668129] sendmsg_copy_msghdr+0xa1/0x160 [ 2075.669051] ? do_recvmmsg+0x6d0/0x6d0 [ 2075.669887] ? __lock_acquire+0x1657/0x5b00 [ 2075.670821] ___sys_sendmsg+0xc6/0x170 [ 2075.671678] ? sendmsg_copy_msghdr+0x160/0x160 [ 2075.672680] ? vmacache_find+0x55/0x2a0 [ 2075.673533] ? __lockdep_reset_lock+0x180/0x180 [ 2075.674534] ? find_held_lock+0x2c/0x110 [ 2075.675419] ? __might_fault+0xd3/0x180 [ 2075.676268] ? lock_downgrade+0x6d0/0x6d0 [ 2075.677151] ? asm_exc_page_fault+0x1e/0x30 [ 2075.678096] __sys_sendmmsg+0x195/0x470 [ 2075.678951] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2075.679881] ? lock_downgrade+0x6d0/0x6d0 [ 2075.680789] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2075.681817] ? wait_for_completion+0x270/0x270 [ 2075.682789] ? rcu_read_lock_any_held+0x75/0xa0 [ 2075.683796] ? vfs_write+0x354/0xa30 [ 2075.684597] ? fput_many+0x2f/0x1a0 [ 2075.685375] ? ksys_write+0x1a9/0x260 [ 2075.686195] __x64_sys_sendmmsg+0x99/0x100 [ 2075.687098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2075.688235] do_syscall_64+0x33/0x40 [ 2075.689044] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2075.690134] RIP: 0033:0x7f867efe2b19 [ 2075.690930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.694841] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2075.696466] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2075.697979] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2075.699669] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.701381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2075.703082] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:09:11 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) [ 2075.761565] blktrace: Concurrent blktraces are not allowed on loop12 02:09:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x3000000) r1 = inotify_init1(0x0) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f00000023c0)=[{&(0x7f0000000180)="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", 0x1000, 0xffffffff}, {&(0x7f0000001180)="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", 0xfb, 0x9}, {&(0x7f0000001280)="58ae2f5a09cebc6778f05ab42fe1cfafde8559a03998cc48aacda5fe01dc80f99cc3d8ef928b5fbe87f74aa7d6ae59a7053ee29e9627edca15", 0x39, 0xff}, {&(0x7f00000012c0)="ea7666ae2867cae6c67c72073be9acde8a241234a274d9d48075a03b240792beb6659443939c820c4b650e1d03670cd1bf81dcc18291d52307c9060ee109cc9755585d5d7b0af7fa3f7de3ff3eba5afc47e0db56af055158ef636652fc8bab53f3e039fceca66ba4e5d9d0d0fbc880eb6a589be20811788f09d6ecd4f290a0b61679a1fc2332a228c5f84680ad49c891d68c7315407c0ed283c5f45d200932f759990595881067390243dad8f952b8218e923970c248fc8d2c", 0xb9, 0x1f}, {&(0x7f0000001380)="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", 0x1000, 0x1}, {&(0x7f0000002380)="465b1bf8df9511874e6f49d51c54ad1588876d1cb2c2ec472eeeca79d943da13ac8bb1bbe5e9dc515b5f9bb8b9e4bbc5a8f9f2", 0x33, 0x2}], 0x2012028, &(0x7f0000002480)={[{'[\x0e-}.&}'}, {'-&'}, {}, {',^):'}, {'.%}\xf6]..([/('}, {}, {'@*@{/\'@-\'}:'}, {}], [{@subj_user={'subj_user', 0x3d, '$'}}, {@obj_role}, {@dont_hash}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat(r2, &(0x7f0000002500)='./file0\x00', 0x8400, 0x40) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x82000003) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x65000dec) [ 2075.823046] blktrace: Concurrent blktraces are not allowed on loop6 [ 2075.830442] blktrace: Concurrent blktraces are not allowed on loop6 02:09:11 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:09:11 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 58) 02:09:11 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) [ 2075.862829] ieee802154 phy0 wpan0: encryption failed: -22 [ 2075.874765] ieee802154 phy0 wpan0: encryption failed: -22 [ 2075.879260] FAULT_INJECTION: forcing a failure. [ 2075.879260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2075.881761] CPU: 0 PID: 9095 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2075.883158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2075.884843] Call Trace: [ 2075.885393] dump_stack+0x107/0x167 [ 2075.886146] should_fail.cold+0x5/0xa [ 2075.886943] _copy_from_user+0x2e/0x1b0 [ 2075.887783] __copy_msghdr_from_user+0x91/0x4b0 [ 2075.888732] ? __ia32_sys_shutdown+0x80/0x80 [ 2075.889644] ? ieee802154_sock_release+0xb0/0xb0 [ 2075.890618] ? sock_sendmsg+0x55/0x190 [ 2075.891468] sendmsg_copy_msghdr+0xa1/0x160 [ 2075.892489] ? do_recvmmsg+0x6d0/0x6d0 [ 2075.893294] ? __lock_acquire+0x1657/0x5b00 [ 2075.894397] ___sys_sendmsg+0xc6/0x170 [ 2075.895193] ? sendmsg_copy_msghdr+0x160/0x160 [ 2075.896334] ? vmacache_find+0x55/0x2a0 [ 2075.897154] ? __lockdep_reset_lock+0x180/0x180 [ 2075.898319] ? find_held_lock+0x2c/0x110 [ 2075.899164] ? __might_fault+0xd3/0x180 [ 2075.900175] ? lock_downgrade+0x6d0/0x6d0 [ 2075.901018] ? asm_exc_page_fault+0x1e/0x30 [ 2075.902137] __sys_sendmmsg+0x195/0x470 [ 2075.902971] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2075.904054] ? lock_downgrade+0x6d0/0x6d0 [ 2075.904953] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2075.906156] ? wait_for_completion+0x270/0x270 [ 2075.907095] ? rcu_read_lock_any_held+0x75/0xa0 [ 2075.908266] ? vfs_write+0x354/0xa30 [ 2075.909048] ? fput_many+0x2f/0x1a0 [ 2075.909954] ? ksys_write+0x1a9/0x260 [ 2075.910767] __x64_sys_sendmmsg+0x99/0x100 [ 2075.911835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2075.912893] do_syscall_64+0x33/0x40 [ 2075.913814] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2075.914863] RIP: 0033:0x7f8542659b19 [ 2075.915802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.919521] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2075.921401] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2075.922853] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2075.924328] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.925778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2075.927224] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2075.928949] hpet: Lost 2 RTC interrupts [ 2075.937928] ieee802154 phy0 wpan0: encryption failed: -22 [ 2092.052521] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:09:36 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 58) 02:09:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='time_offset=0x0000000000C00']) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fcntl$dupfd(r0, 0x0, r1) 02:09:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4400, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:09:36 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 59) 02:09:36 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) 02:09:36 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) 02:09:36 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x11b2729f2b66a118, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:09:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2101.091450] ieee802154 phy0 wpan0: encryption failed: -22 [ 2101.108686] ieee802154 phy0 wpan0: encryption failed: -22 [ 2101.109111] FAULT_INJECTION: forcing a failure. [ 2101.109111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2101.112723] CPU: 1 PID: 9103 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2101.114174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.115997] Call Trace: [ 2101.116570] dump_stack+0x107/0x167 [ 2101.117354] should_fail.cold+0x5/0xa [ 2101.118195] _copy_from_user+0x2e/0x1b0 [ 2101.119036] __copy_msghdr_from_user+0x91/0x4b0 [ 2101.120079] ? __ia32_sys_shutdown+0x80/0x80 [ 2101.121025] ? ieee802154_sock_release+0xb0/0xb0 [ 2101.122027] ? sock_sendmsg+0x55/0x190 [ 2101.122844] sendmsg_copy_msghdr+0xa1/0x160 [ 2101.123758] ? do_recvmmsg+0x6d0/0x6d0 [ 2101.124584] ? __lock_acquire+0x1657/0x5b00 [ 2101.125513] ___sys_sendmsg+0xc6/0x170 [ 2101.126421] ? sendmsg_copy_msghdr+0x160/0x160 [ 2101.127367] ? vmacache_find+0x55/0x2a0 [ 2101.128214] ? __lockdep_reset_lock+0x180/0x180 [ 2101.129206] ? find_held_lock+0x2c/0x110 [ 2101.130079] ? __might_fault+0xd3/0x180 [ 2101.130891] ? lock_downgrade+0x6d0/0x6d0 [ 2101.131778] ? asm_exc_page_fault+0x1e/0x30 [ 2101.132695] __sys_sendmmsg+0x195/0x470 [ 2101.133540] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2101.134443] ? lock_downgrade+0x6d0/0x6d0 [ 2101.135342] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2101.136413] ? wait_for_completion+0x270/0x270 [ 2101.137364] ? rcu_read_lock_any_held+0x75/0xa0 [ 2101.138328] ? vfs_write+0x354/0xa30 [ 2101.139123] ? fput_many+0x2f/0x1a0 [ 2101.139903] ? ksys_write+0x1a9/0x260 [ 2101.140707] __x64_sys_sendmmsg+0x99/0x100 [ 2101.141588] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2101.142729] do_syscall_64+0x33/0x40 [ 2101.143517] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2101.144590] RIP: 0033:0x7f867efe2b19 [ 2101.145369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.149185] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2101.150752] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2101.152258] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2101.153737] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2101.155281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2101.156821] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2101.160514] blktrace: Concurrent blktraces are not allowed on loop6 02:09:36 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @val={0xc}}}}, 0x28}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r3, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x28, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x4, 0x65}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) [ 2101.184491] ieee802154 phy0 wpan0: encryption failed: -22 [ 2101.187486] blktrace: Concurrent blktraces are not allowed on loop12 [ 2101.206780] FAULT_INJECTION: forcing a failure. [ 2101.206780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2101.209236] CPU: 0 PID: 9115 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2101.210695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.212441] Call Trace: [ 2101.213010] dump_stack+0x107/0x167 [ 2101.213780] should_fail.cold+0x5/0xa [ 2101.214591] _copy_from_user+0x2e/0x1b0 [ 2101.215451] __copy_msghdr_from_user+0x91/0x4b0 [ 2101.216417] ? __ia32_sys_shutdown+0x80/0x80 [ 2101.217324] ? ieee802154_sock_release+0xb0/0xb0 [ 2101.218296] ? sock_sendmsg+0x55/0x190 [ 2101.219099] sendmsg_copy_msghdr+0xa1/0x160 [ 2101.220030] ? do_recvmmsg+0x6d0/0x6d0 [ 2101.220827] ? __lock_acquire+0x1657/0x5b00 [ 2101.221730] ___sys_sendmsg+0xc6/0x170 [ 2101.222540] ? sendmsg_copy_msghdr+0x160/0x160 [ 2101.223464] ? vmacache_find+0x55/0x2a0 [ 2101.224289] ? __lockdep_reset_lock+0x180/0x180 [ 2101.225260] ? find_held_lock+0x2c/0x110 [ 2101.226105] ? __might_fault+0xd3/0x180 [ 2101.226917] ? lock_downgrade+0x6d0/0x6d0 [ 2101.227780] ? asm_exc_page_fault+0x1e/0x30 [ 2101.228687] __sys_sendmmsg+0x195/0x470 [ 2101.229511] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2101.230398] ? lock_downgrade+0x6d0/0x6d0 [ 2101.231267] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2101.232291] ? wait_for_completion+0x270/0x270 [ 2101.233225] ? rcu_read_lock_any_held+0x75/0xa0 [ 2101.234168] ? vfs_write+0x354/0xa30 [ 2101.234932] ? fput_many+0x2f/0x1a0 [ 2101.235686] ? ksys_write+0x1a9/0x260 [ 2101.236474] __x64_sys_sendmmsg+0x99/0x100 [ 2101.237338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2101.238386] do_syscall_64+0x33/0x40 [ 2101.239147] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2101.240214] RIP: 0033:0x7f8542659b19 [ 2101.240973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.244715] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2101.246264] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2101.247736] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2101.249187] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2101.250634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2101.252103] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2101.253809] hpet: Lost 2 RTC interrupts 02:09:36 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 59) 02:09:36 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) [ 2101.335576] ieee802154 phy0 wpan0: encryption failed: -22 [ 2101.362946] ieee802154 phy0 wpan0: encryption failed: -22 02:09:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2101.380178] FAULT_INJECTION: forcing a failure. [ 2101.380178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2101.382394] blktrace: Concurrent blktraces are not allowed on loop6 [ 2101.382759] CPU: 1 PID: 9131 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2101.385351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.387063] Call Trace: [ 2101.387621] dump_stack+0x107/0x167 [ 2101.388394] should_fail.cold+0x5/0xa [ 2101.389191] _copy_from_user+0x2e/0x1b0 [ 2101.390031] __copy_msghdr_from_user+0x91/0x4b0 [ 2101.390996] ? __ia32_sys_shutdown+0x80/0x80 [ 2101.392047] ? ieee802154_sock_release+0xb0/0xb0 [ 2101.393192] ? sock_sendmsg+0x55/0x190 [ 2101.394004] sendmsg_copy_msghdr+0xa1/0x160 [ 2101.394887] ? do_recvmmsg+0x6d0/0x6d0 [ 2101.395727] ? __lock_acquire+0x1657/0x5b00 [ 2101.396635] ___sys_sendmsg+0xc6/0x170 [ 2101.397447] ? sendmsg_copy_msghdr+0x160/0x160 [ 2101.398382] ? vmacache_find+0x55/0x2a0 [ 2101.399204] ? __lockdep_reset_lock+0x180/0x180 [ 2101.400206] ? find_held_lock+0x2c/0x110 [ 2101.401052] ? __might_fault+0xd3/0x180 [ 2101.401392] blktrace: Concurrent blktraces are not allowed on loop6 [ 2101.401870] ? lock_downgrade+0x6d0/0x6d0 [ 2101.401891] ? asm_exc_page_fault+0x1e/0x30 [ 2101.401932] __sys_sendmmsg+0x195/0x470 [ 2101.405791] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2101.406681] ? lock_downgrade+0x6d0/0x6d0 [ 2101.407594] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2101.408622] ? wait_for_completion+0x270/0x270 [ 2101.409572] ? rcu_read_lock_any_held+0x75/0xa0 [ 2101.410525] ? vfs_write+0x354/0xa30 [ 2101.411300] ? fput_many+0x2f/0x1a0 [ 2101.412083] ? ksys_write+0x1a9/0x260 [ 2101.412865] __x64_sys_sendmmsg+0x99/0x100 [ 2101.413755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2101.414816] do_syscall_64+0x33/0x40 [ 2101.415586] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2101.416670] RIP: 0033:0x7f867efe2b19 [ 2101.417455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.421229] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2101.422805] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2101.424356] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2101.425815] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2101.427290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2101.428010] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2101.428749] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2116.746697] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2126.819224] ieee802154 phy0 wpan0: encryption failed: -22 [ 2126.821132] FAULT_INJECTION: forcing a failure. [ 2126.821132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2126.823551] CPU: 0 PID: 9142 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2126.824977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.826688] Call Trace: [ 2126.827245] dump_stack+0x107/0x167 [ 2126.828013] should_fail.cold+0x5/0xa [ 2126.828808] _copy_from_user+0x2e/0x1b0 [ 2126.829677] __copy_msghdr_from_user+0x91/0x4b0 [ 2126.830633] ? __ia32_sys_shutdown+0x80/0x80 [ 2126.831557] ? ieee802154_sock_release+0xb0/0xb0 [ 2126.832556] ? sock_sendmsg+0x55/0x190 [ 2126.833371] sendmsg_copy_msghdr+0xa1/0x160 [ 2126.834256] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.835067] ? __lock_acquire+0x1657/0x5b00 [ 2126.835997] ___sys_sendmsg+0xc6/0x170 02:10:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) 02:10:02 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) 02:10:02 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 60) 02:10:02 executing program 2: ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) r3 = signalfd(r0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) [ 2126.836935] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.837922] ? vmacache_find+0x55/0x2a0 [ 2126.838759] ? __lockdep_reset_lock+0x180/0x180 [ 2126.839726] ? find_held_lock+0x2c/0x110 [ 2126.840588] ? __might_fault+0xd3/0x180 [ 2126.841390] ? lock_downgrade+0x6d0/0x6d0 [ 2126.842232] ? asm_exc_page_fault+0x1e/0x30 [ 2126.843166] __sys_sendmmsg+0x195/0x470 [ 2126.843991] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2126.844897] ? lock_downgrade+0x6d0/0x6d0 [ 2126.845020] ieee802154 phy0 wpan0: encryption failed: -22 [ 2126.845798] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2126.845830] ? wait_for_completion+0x270/0x270 [ 2126.845860] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.849968] ? vfs_write+0x354/0xa30 [ 2126.850747] ? fput_many+0x2f/0x1a0 [ 2126.851376] FAULT_INJECTION: forcing a failure. [ 2126.851376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2126.851504] ? ksys_write+0x1a9/0x260 [ 2126.854860] __x64_sys_sendmmsg+0x99/0x100 [ 2126.855731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.856799] do_syscall_64+0x33/0x40 [ 2126.857570] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2126.858618] RIP: 0033:0x7f867efe2b19 [ 2126.859392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.863149] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2126.864727] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2126.866191] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2126.867656] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.869128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.870608] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2126.872139] CPU: 1 PID: 9146 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2126.872467] hpet: Lost 2 RTC interrupts [ 2126.873809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.876500] Call Trace: [ 2126.877120] dump_stack+0x107/0x167 [ 2126.877959] should_fail.cold+0x5/0xa [ 2126.878760] _copy_from_user+0x2e/0x1b0 [ 2126.879659] __copy_msghdr_from_user+0x91/0x4b0 [ 2126.880742] ? __ia32_sys_shutdown+0x80/0x80 [ 2126.881767] ? ieee802154_sock_release+0xb0/0xb0 [ 2126.882771] ? sock_sendmsg+0x55/0x190 [ 2126.883604] sendmsg_copy_msghdr+0xa1/0x160 [ 2126.884598] ? do_recvmmsg+0x6d0/0x6d0 [ 2126.885501] ? __lock_acquire+0x1657/0x5b00 [ 2126.886875] ___sys_sendmsg+0xc6/0x170 [ 2126.888096] ? sendmsg_copy_msghdr+0x160/0x160 [ 2126.889477] ? vmacache_find+0x55/0x2a0 sendmmsg$inet6(r3, &(0x7f0000004cc0)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x7ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xc878}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000480)="3319ef36ed48680650d57472fd6497412540b4aa22ed5a28a059bfc154f7d54b43853aa783caa8be6f71731f8cfd6fa8df59fc6789453b8b2ef6b1cc665b5563f224b657368ae6739d301e02559384e4787bf7d61212ce6429e78e8cc363bac6dcce31fbe6ba9f8090a2912482588e5461fc0b2bab84971cf536f06eedd802797bcfc68c1ad2569e631212a931653ac8d08266a19e9f4a04c7e37cb9ecf68cbd73afeb8c23c9bf06b4b407592eb7c26e6628f7f5f0595f7e3695616042412aa5ab58afc82492817e5522b7f9fddfb693a6deefbc01ee0bd2fea098a9df377ac555245a2e39e9171630a4326cd996588cb4eb6a964bb796f0129ce972a3b1b56142c98a12af07595deb32984c94dbd3eac8777232cb7bec325ffc3f46c34f8cf7ad692edc4f67143df1156c7051b10967d06a6aac390198674f199fcc2998ae0bb976618414a875c97b24185e81bda85dfa5bfcb4291c4cf395cf6e8e2d24cdd7f02fec6e98fda6328623e29c37635b8a5054279bda3f215d0bc3d55fc9f1e245c569aaead49662ad86d546753bd98c2bc252aece9a201f23b3470c09c67fd3b257e18cd193f197233b02308bebc5a2dfee6912c3a93afd3db97882ca71c0a06e8c5cdf6d79d37f1ba80d929e32e5aa714ae693e829d7355e4b1c93a934f535be36ab9ae7fd0de20aa73a208e7c14c5b0a3d12a62f1b4e7b0f16198db772fa4242048b7726c7ca0aa1b4ce4d7aa04d5b6875d4a6c7d8405bcf1d4feca5661c05cc6af68f136634c0419af8506f6899160f3f5a3e55eb6152e9ee7ba7cc7f67afef7f08facd7a4f810098ce3cc7e0849e1227204cd430c3353fb701a96e1fb54dc76e991eafc92239dc90a426cf2c466f318a4da0f5cf325468c46e537930daf9e0f8bfbaa6683fe91ce7ee3615d399ac29ec1d13330102191a437a2acd1913d7f5078a9e4598094bd54d249619d4a634c2d4fb79ee46255c00ac98ff3efa58b7eae2065f97e49ba8de04b9c0422ff14016a98888bf211f07552987c7f77345e26401072aeba807599715ec5c50f6fbe06409d4c38874711aaee23f30d8409d238608e5e4d2bb0bb9b65f9bbc6933a9e0a4d183ea7ccccfbd7407cac2719d5aa800e37266ffeff035bdea9cefba90cf4663ab56b69df41354aa5b259653e714ee7854d24dccf75cd45d3d153941220822fea6286db646d940badf2ff877d346a8baaad84b4d49c691f8594bdaf72b5e61d53e91c5d65e8c58299095106bb7ebb135c46812a777131165cf8b736e99c747f087a3735acffea4eaa6e4b0cfa0b4454380046e6dca6d99cb5bc96236a79ee37db4c2cd301a5742a8dc26076866b22547b1abe509b8a94dce4ed65c6574a30dcd2d5bb3f389fa6c651b6aa66f60544d96b14835c2155be764a990eb85903602078efde0dcedaa329e07e678b44e22215e7cc6edf291f6a4cac1eafdfd226e8c0a27252078828ee7413e7c32c8633a82b672c86b87b4be8a3e5d31ade0cc446f467a21f4f46345e4f77715203f1dfca2b11d49d6876c24cdc85c640d57a0322f2b8b0af1591b626bfa76caccbc3b745a377a1d4f3570518af5791caaa8c52eaf1e9f5190238da585bf4845e14103211acccbbda52c0b1eddf321f10488f4cdfae09002cdfe08c9fcffe17747f2c639b6c7098270ed9a40ff3da8e3aca1443ed67c63dcd8af30ff9d40dd053771fbf5665206d37296625423e34cf2f523bec5f3bf855291a43c1d12023c924f9d306e83f67ce7f22c3373175453417079f90c7e39b3c48b36d43e662adec46df499683b09822d4388e6397f7fb2adf05d6a82f4f649f6b53427fe075163b129e855ea597e0086cd05043b6cfbfb0ece62c9b3412c3efb778c96bc13b3c615391136bea8705da51dad0bccdd0ad3c376273afe50bc85e0d25af886c3b0079d3c4de4c3c828116fedac64c518bb96232400562c192bbb649a1bf53dc592b03b8e37f36d3f9290f6418013c353705c37f072005994c623725ba94f6fc93918b854eb9de3464fc2dddfb55aed173a152ab879faf9286cef6738b7c6db0bce6da16b7ff7ecf98144bf1a2275d2e7f68cb7fc52d06dca94e3dca9c122ca7dc4886d6ead1f6ffbb827a7fa18c74d82e18daff0d964786f1ba9f032b21ad85dbe390411213e4e400e3e223255946e09c1f4410b05938cd5efdc5f6d5dd028d24ba5ba16571f9fcaa6922ef07ddd65cc4627c0169e8b53a786c9c48a570f70908856a16e2ec70759f27464cd9ce87e10cd44b19ac95738b6376e4e720b473e5ae4e15c87b4595c4ccd8373e36441ad51959af58a5ebc70ddff5d41e8603b5c065737d8eb973ae8d29bf416ec4eda8f7c12c46e1c5a8c62b3a9c485fab4d608baca957c671e6eb30ab20ff9f9b7de1d38259d261ff52dbd1ec14ac426eb27b6e78df4d1d6f3ee4530a28a3eacb90951c074eb184a209e970b88d2e4d2a7c7fb82203c6df90f83fb2a86429908b4eff0cdafb58ce6637b0a508bcae59602d2c44d6458c592c7131b4f689e1addcd031a160691d5b5656014cab3eb16c1634531bed6d72bc306faf9deecb34ee5cfa1f41c1f4e9addc51d034f500933d32c9aff77f8d8775d570d1f5a247ecbe0bdca16c4e3d9d71b673b45410dc70fab91cb5ea8ff91a2a6343192424854a1c75834b6be0d92d1a9e2374e5296b438a80b62590eb556b4ddd03905eede761a46ec9ba8480156063ba54a8c0511877ba3830aee3332380d7f430924e3114ed232f671a3038e9e0b93a20cbf6f8092d254f24e91dd3fb2c96404c8e5d5303138709bb040727db128d23d2ff760ec07144a91e6dee480a079504d9dce399c7f2474f66b1b7bde583ce0095918b14df89e424824a929d6681a787456b15a23599aaaf0eff9fe528f113f9dc04b782edfc6c2a4a80ed883a7fd45ad5259960f63053937363d284b9ed38e9364b58ec2b96d10089a2fb8947cad37fd3518cb66f7f34c9a6a1dd0f5a8d950b1df6c3af414a18e0b8627c50df7eaf859a58b438f200955400fc510ad30aca849b117722e97b20f9781070253c7a938b98201f4e4b5a4b685712e9f36856d536923e08cb8a2f061466d2c30aea2c43502bca48e898655089c011bab77e3d2d6d68bcf6c515fb0dd8a34dc97e4db25bffd0e598ce2f48646a69f903768253d182075a6d522722998abe7c697ba469cb01d15f2936502f363152152f1b8eeccd3dca05177fe2279e94aff25e6015acf4b4ebc53cab147e25610655ccec70c780f96216582a4e78085c2a7d787e32466152dd2f0edf25d7c8fdbf67873c39be22de4445de278f435acf132c85d54a987e3028e9f3bd16bb221f00957cf7e215300b2f795a4865c9e061f5ea77239cb4b9073dd1ed4c90ef27e8115ac2e66d3ad50686e603f3e95f16c9a71beabf7d903a393339ff4357d8d81b19b9d1640eea57e55bcc151fe1898d14184e92767add2c450888e050b7483ae2b6d22100a75ce2b7047fda2458921f6c3eaaa0b3d2a9a070868de07b0f327090230e2ea3ac68517f73b50e0312bac81b8ff9e558e2d031d512664755b3cb90624543fc7fdb082420a992b141ad0b6766df3549529b66e1fdd018362b6d055606afe02a4841cfe71480e2be45d939cd4a4b2329c8180607cd87c06a5c3dd581c36032a45390c06a3351543dcf516a81e66aadaf9244cec2fbbb27dfa619d692c181caea6b58199913c2b3fed247fae0a5699333e278899d7576441b90e10f78ef6195cfa015b0ad950bf553da49fd197269ffe2fc664294aa2c1f47f9233cf28a2d7a9fa3adb57971858c262bda28d862bd1542192ee1692b36e883849f165233b6f55eec0410e9493ccb37219bcf29f3453222007f57e27d0fb9b8cd25ede61f6890b474bd9c2d3c81feb0caf7302ce8a194336a1d3ff4e99f92045a5e5e22202d78ec4dafb707c4131b31d185bae0f635084de7ac1f584febf17a49a7fe9427789aedc88fc8d34ab9c6de4c277bddf953785e78fa9cceb7f918b1ed8d3ea337444e9aac1ce9880f27f512917ed660403fcaad48bd5cc23b927b8a8efe889bd3fc99c83d7f110c8d00d2a7c1cdb76b42b3e02b00184dcd84d9fe5f13516d5be7fa367fa3aaf982ff8ccf6f6a08ea6ca36cd91302e776028bc419d579b211fbd8d9f13c1cbb8921d9ef0a47d73d7e0c06b7b34fea3c2be6a25b78493ce7fc47d9f83a0c252f5fec99a49130e84d7f77481e2e19faa0be17271a2a17c810c2b73a4e0719903b545d686413aca12c3bb78e3b524f3104f8d66175814207a2d04b45a272f84154752450b5b5b2e6e3ec733a6ec0ef672bdbfd0f4cf36ce81ac09d96c95708f4448ed65dcfc516d3dbc66bd2d2194ebf7230395ad79a42ed7e980b0108821b0ae14b1c426d071cc4a75659323129a67c7d4dbf9b756f4ac65d0f39a5843c4a8950e17d6bce43bc389966ee7b0945ec64a3600fdca637fe15c724bd1a22de286cd0ff614d679744394d1fb7a60a24ff97aab2c70ac0f62cac408aadccd5102ca4c351a954df02e926e333f86586888380eb7e84dc00ceb160aed03f8dd1a21ea803d53ea8565a4b9136c8a1b16c2b1d85aeccd463ddc02112f7c56ed8ddeece2eaa4d53221c6e0561c62a352139310480d3d0fe8988ac0cd0de1fc6e408daf6fce77e6a5bed9bac1c2f7b32095be48c2723bea05b38383951fc361f2930cdacf37715243adb841407b844b3e2c9ec58884b260ce51688933bc1c2e5d462878e0c5ca06cba598765391eab81ad963bed394ad535bcd572617b22ca7787ab1e7756348412d2b7a741cf813e066eadd123f6a9a931685d498d63372e8e6715f60e7c2d77aac9a284832690a51e1193815723099fb75a661985d177f157fbf5a5d01b8133c1ef00d388aa82a0cbed978359ea01858d3ccf6a91e8af7e07f4ff4ec50291f70b85afa8907e181912f36dfca236f5d15a18a7b66d9dfe91af9ce8eccfc77f31cc61334d2a29fc6368dbb2f1f0b6a4add8183cf2e7b772c1020e12764dc009f4a9ee94cf834a4eea257e9758c53227ce21c6d337d7941877542a436809bb86105745ec682187d1747e3e5749c74cb18f3c3f64f34c25c9707e02e9e37d93dda98f71f8c329bf7778502026b2b992043201e13c9b8f070a69f123208e7d41af6f25ea71875945679505e5479a85a23132945ec523905c8f1ed5d0c6b6c668857f06012e731c692aa200608063b680ac66d28263e47202be9ca72693af8b386f26e1256282dd2d28d02488259b214d6840cf375e4b9ae6babc464f29e10da9cb7ff15b808ca32a4e9ef9103aebb36963a0d3b2bdaebd58a3d63435d296697336571ec1afebefbbbcb638b9c0e7837a79463c8c585ff96bb4aa303eebdf96b4074d01b81b2519cbeb6a26889696f6383e8ed1aabd4530321a8e78f620b601c807667777201fc80e5cba29c15660edb8885b7435050d7b184c404d5c2c2677729a05b159ad6a54134fff91b833ee645064db32181d059308df3e5d59fb1dafa0116f8def7de9b7bf833c734c08acb6a0004fca5e23abd9557b87be35b2f38efdb8566c6fe3da2b48a043009ebc1e3f128f91651c89c1aedd2b0f7663e70e6f122018212b09c81e90ae3f493d6180e8d60ea4e2b698c4fd00f79f58cfa69cf156d27a1287dea01b1b24c02bf3214dd7b653fde84ea40df0da59dc050f074868e0e10d69763641d44dfdc1e8c7b629ba7212eeb285db34bd67ac13b12d5f910205ad3b353c5fe0097c0b7f97c7c244c99839958ad022ac0dc8", 0x1000}, {&(0x7f0000000240)="26d75c9988304a1481524ec4494b2d82e6f3c3edf79a617e1e2e8ebcc7a00b5611ad25286ce954bda7823037777cb51bff4e1cdc1c1f721eed4b9521c6d4520da32e80af6d450dcac7e8a150e1f305bcf5b1c04fd76f32356126557dd036", 0x5e}, {&(0x7f00000002c0)="b412683cb05795b7c74432aacaf9c5167f7a403f8cf495d1622f00f5b81f45ea8239b21cbb1f025edfb28126567c309d16a0a1744421f95dc698d028fa9f6269ccdec29845348f543ef1096495fc859f6a2c3f238866d9d8ab6ffcab39f990f1aae7b55c3659fe16c2c1761a7c593d8673bdc81447b390cd5ba84493e9a5e77c7641622998f4131407b862e538d09cd7c980df6b467d729487f9c6c43851cec0a9cfee95172bf10a5dc5d75c66430298128bc6fc2903", 0xb6}, {&(0x7f0000000380)="10a667207f62547d5c36244eb9232e091e49787dd8c517f931a0a2b325e115067b9beb22adf406dfe4d1e46a212a3913", 0x30}, {&(0x7f00000003c0)="30fbdba33a25b9eefc17b887", 0xc}, {&(0x7f0000001480)="6a706cfbdcacb289563de6aa5681ef63d98a5f98bd17a2caf098258c9ac4425d7feb1856f23df7edda453e4e433bb64250f44ad779d8e68a16f8ee381f6473bb6064b3d62bbac541b3e4d21177467e5853656deb6b16827fc3e71092b300174684ec54323893f82af77af5d5bcb2d6b89cee39984d0feafa45ee9c7687d8719ea129f3bd2494e2d0e82c68de99967939f2d333e249fd5f1870cd7baaabd904b85985909f4273bbd7b1e659045134a214eb846345ef0d80864192007a96174da030396c530ae17a6ba70a927a3313055da42908", 0xd3}, {&(0x7f0000001580)="37cf4912003efe63c685f58c2f0624a8fb364ddde86241f610f8a76ab975b64ba87d0b7af4f24de6212daaff8f21b300d3ade93811990ad6d1631f97f252efa099a923b8bc05d8e43db703e4e17146e3400fb44555cc0fcbfcbada350618a40f1a130d4c632c9ad85d7c17a201ee06f98854d024c2b620c1b454ae6520a9", 0x7e}], 0x7, &(0x7f0000000400)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0x28}}, {{&(0x7f0000001680)={0xa, 0x4e24, 0xfffffff9, @mcast2, 0x2}, 0x1c, &(0x7f0000001880)=[{&(0x7f00000016c0)="38ecb3cb71bc34231b87c206b564f0fa563a5997f41e5a90d3c53657140a26c6a53266a23491369caf28c0f75da45dd0e89ce2694e560b300a6fb2df5f17c031afc0304d4de51555f0d7c3ddbc9b91173c578d671c8a76f2c6c7a98eb25a9a60d5dc579847491185bd5ae060683d251545b7c5acbec52806cfa588677cca4f7de93abcd431f839791e853a3d95366bfe4f13be7d93ed0228333ec6d0d6ed35e3c91b7c38839ffa47d04bd6bdf8dddbea0ef72db634dcaaf86a7783e2c2da266bd28b66e7dc8729", 0xc7}, {&(0x7f00000017c0)="e0fe7d2e779d40ff396aad127ea4282bb37651e8dc4ac23a941fc51a61fd553a7660da989070b5272f9dd9eec38a3c43486f5755a7178c9b55b2ad29d4a3a8a8a0ad7ef63a5303ee2f03bfbb93adfc0112d8ffa49c105fc9f5bafba8f4854b9907e93ce71b9d0d248aba08a27da1b231a783df6d3610d000e36756a38944c4029aaa5955ed7de48578", 0x89}], 0x2, &(0x7f00000018c0)=[@hoplimit={{0x14, 0x29, 0x34, 0xe8}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x0, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x76c8}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @hoplimit={{0x14, 0x29, 0x34, 0x7fffffff}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001a40)="55f3de3382ba600a6e7c52fcb4ad21b7e2885630e7b44179b2c2bcadfae122d42c606b46a6c0a99aa78456e2fdc25abdd2131ea4201c527c725536b8cf561c536ad17319e5d5c61e1e31f0d79e5b348f0803c2f5e5070e3af7973b5196691c25699751ea8971aa99ea", 0x69}, {&(0x7f0000001ac0)="6dbc5367534944eb4eeba01b60bd00ac9ce1e1de675df24adba118dc834313d0f58bb4d06ed1b4be753d7f6fdb2d6adc510d077e61e2d99d8c6fea2e004b7cc81761acec59a304d07a2cf207d4b33c5dc775c93d464d67c06b7311a36da568835df50e619112813ae96b6ab27329ce2a9b0e2826a21db7b4068b0f1b6593dc9b21e47070d843df", 0x87}, {&(0x7f0000001b80)="6567706bccaf8ae4454a039dcc2052b1fe3d9c73addc77f581ab6083a913102cb3cb81f25e15d7db18f442496f32b710c1380392c139dc727f62d465cb18592465d2c65afaa7cada0c1df76632e3bf8119a8b7e8b611505fc7d27a996e4c08a960026166a0482d4673c12b5e", 0x6c}], 0x3, &(0x7f0000001c40)=[@hopopts_2292={{0x40, 0x29, 0x36, {0x8, 0x4, '\x00', [@enc_lim={0x4, 0x1, 0xb2}, @calipso={0x7, 0x18, {0x0, 0x4, 0x5, 0x7f, [0x0, 0xc3e]}}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x3b, 0x4, '\x00', [@ra={0x5, 0x2, 0x5}, @jumbo={0xc2, 0x4, 0x10001}, @enc_lim={0x4, 0x1, 0x2}, @enc_lim={0x4, 0x1, 0x20}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x10, {0x3, 0x2, 0x4, 0x5, [0x4]}}]}}}], 0x80}}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000001cc0)="f77800aac08c5c96d33c98ce94c0dff6966744c7fdab0032b3894ed7e53ef0621b006aafdab2f2c5114a45b497ba720ead31d2e5860d8c3295c012786f151ad8a618f14e3b", 0x45}, {&(0x7f0000001d40)="2fac38c4c345b7937dd592cfcf80dca6ec77f3fa54312fc31dc1134379d7c657c1c8b4f01ad80a7e3aabfd3804c4004935558d550acd9ff7a9094bc22db2951ae99a2cd2b6979b82cfa8edc81cc559cdf00768b3cf7fb36355f54efd5649818e9c2460345e799f463f9b6aa6e9807fe040d14fb8c62bf1defda287c89fc64fee245ce6bfe441eb207593b00be8bf750cfcd0b27761fcfe03654e72bba48892471e126f3a7adbaec66d2c4e65f48355c43a86cfa3bc76ea58c2057590cde6", 0xbe}, {&(0x7f0000001e00)="8181dd2837b019e2d85adf121d7ea67174547451d7d3afeb221b1535cf60bea8", 0x20}, {&(0x7f0000001e40)="b212a8ccb42908e911bc8b9052803473b4e3373a260edebe3f29115cadc2b3194d225277a01ce22e9488803d2aa2bedc3169ad3bf073e4f460e202178f58e2a66e7d005a5f2ce93ae6978f7b5e4cd8cf56aeb5a69f1f1c6d1047a3c11aa1bbf5c575994e818e4e96c5cb7fb66c9b996a6f2a4578fac42a99289f6f6cdd1cba3334c1ddc93a310d43409fb8b446ade59937f13bd922b21bcd7a4f4c98396536217e212698a9d7afa5c006f832ada6758e76ccf7fc71d55a8386822ec214a5", 0xbe}, {&(0x7f0000001f00)="c79d4630abc233e7033d0265d9be261d1220670e3ee96e798e1e666a58a5773eb876cb84cdd227c117ea1ece63f36d9290ddedae9a5749e104347992cab71f817c9dc6ed17bea0e587086b20a7734c3127e96bfdf3b4f4eeeb6ca1b55d52837d86387f5c4e887a588efca73d6f8a2cc9b96749efa0c7a2bbf01f5479c270529c116044a2353ae1a06114b5a0de2fc7e45ee01b5bcadcc4ecd85ca0c5a301708ac8bc62d77105a27b9d7a38812c1a2a0be04e406773dd8ab0418aae63a5605daf27bec24e8c93fa1905455ce4d1170f656485fb8a4e75871b", 0xd8}, {&(0x7f0000002000)="7dfa9e0071426f768520ea1f917a9881eec6bb41ef1e18d0a1f59add575520e2ccda792b26124fc6a45e9d7648df501ec97d58ff358c2af33c7fa9187c6991d926c60e1d9fbd58600278e4d2eef86e5f37b9106ca32f97736d0b9572ee11050f7ab423d7ae7db053805fa54009571130494542191b807f031560", 0x7a}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003080)="3bf23de79a83a6c7d0fa2cea4e8e2cf89ab64c113f0a8a124a245965e6e903302c617ace7f34ce70556db5fa2f1046b4e9129da61c15c52d8c007551c7d3009e51dad44517513449d87919972b56da35f0af3edd54dffe4a80ef136cc51d033b67e8bdb0ea78dd394124ea5ce561415d3bc8fdc58df90283077285027128bebcb6d2bded14bb9a33614cff5d3d60ffbfdb4803a639709e820c05f2814a5ccb594cc7f6b9e7cf967ae0b00e9381c8d794e73165c72c51925b3b6fe1f801fac164394e42ac0e43bfc361cc64f4ca42901e9ca35999cd0efc3a08268d8c936e24aeca73", 0xe2}, {&(0x7f0000003180)="ac4af83c960de57a0d024f4872b54c376ad0451d2e6a0d25bf63b15835d8af29ec9e8a8f5147fc07c858bb98d9e0677262a73b19d431154f25ed2696bf", 0x3d}, {&(0x7f00000031c0)="0cfd9d88cab12fa8d8a2e9a5168b298dc5746694d737d61c7c66d51827babf1e2781d2dfab91fd864cce536258aae7a3a356585a4dc511234eb250540e95e1e3313287e3b190abe6b16476d3792b5788ef837f3cd887daaa2ce94536795541c50f49aea8b87721cd8a090150a320bc254a291fab0834bbbdd0728d647032be78c65bc9d93a01266d37d131cbc5ee20b30c6c4c078615aab7eb79", 0x9a}], 0xa, &(0x7f0000003340)=[@hopopts={{0xb0, 0x29, 0x36, {0x5e, 0x12, '\x00', [@generic={0xef, 0x71, "3f112cf0ffadb9ce33fd5aff98c2d67be0c3ffa40189382fac39c16191cf80f1f5904b22ce782ae0c977c822c403bc09d141396eabe424fe03381391b1f648a45b281116d0dc209eeb2960dbe0b4712b67dcba869eba292898d10adfecdfabbb835b2c22905281a370193501f12a1960bc"}, @calipso={0x7, 0x18, {0x1, 0x4, 0x1f, 0x0, [0x9, 0x6]}}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x6}, @ra={0x5, 0x2, 0x1}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x11, 0x3, '\x00', [@generic={0x40, 0x16, "7795e9e291d84e47aa8b565fd8edf1d2b7eaf1e0d258"}]}}}, @rthdr={{0x28, 0x29, 0x39, {0x29, 0x2, 0x2, 0x3f, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x42}}}}, @hoplimit={{0x14}}, @hopopts={{0x30, 0x29, 0x36, {0x21, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0xff01}, @pad1, @jumbo={0xc2, 0x4, 0x2dca}]}}}, @hoplimit_2292={{0x14}}, @hopopts={{0xd8, 0x29, 0x36, {0x2c, 0x17, '\x00', [@pad1, @generic={0x81, 0xae, "59c639d9c527c5027e87bd61924f5d09f668843522d495a91bc51d00fefa77ca0039f4b39fe8d4779c4114682dba7e78840d0bf876d9f58ec547b6bb06f5b8aa5f3f83f92fa6245e265f661e7e1c844a64df659827bd762f4968aad872cf1741224d8f83bbaa2f2c50a6646a0c1f5bc7e22606b2a7118584fb859c87398c76de0c18d0bae2e90acb485d6bbf5037d387a76377d470ffbcf4b025c7ee3350c7f8f912933e99d85d1d81411a8f8bc3"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x280}}, {{&(0x7f00000035c0)={0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x2}, 0x1c, &(0x7f0000003840)=[{&(0x7f0000003600)="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", 0xfe}, {&(0x7f0000003700)="7587737513f6", 0x6}, {&(0x7f0000003740)="91a86f9efc4da930a3c02d775c3abe94f9ef6b5527f4fd7458b0b77f08c796534eceea6324d0e319761e3026389890a63f82c44b652663d0fbe07a6de269c720999b226d8c86e44792d1e7972212516fea217e7c2bdfe5c06c8f3d6d96c095006916d08c58843141bcb207c4a6b07dad76f874b13fe2322f4977080edc063308ccb53d3279cbe3fa806efbf59715e04e642afa3a0a55f3254668bc2d44aad7f08aa3d37b663e8420714969dd64ce81487e7a489f6949174c6157be48495f841c440704bd62bc768764df23634bc4d8950dc1ccd20a63a0bdb40a4ba2789c8ddd07a046227bb065223a3b49046d5e608a68d69d4a13632762e94e91", 0xfb}], 0x3}}, {{&(0x7f0000003880)={0xa, 0x4e23, 0x5, @local, 0x42d8}, 0x1c, &(0x7f0000004a40)=[{&(0x7f00000038c0)="10654be4e1220cce5f6b121ca4233c47e3074601c1a9e78c67c2c04151253306aaf348c34b17b2cb5d29fe5375c2a6be8f3e563ddb9ba4cb54f26b80132de0204a907d68c49650e9e99a8dae65de8dfbb732ab15eef29341fdcac054f1107c14c246", 0x62}, {&(0x7f0000003940)="c86467c9997c4a", 0x7}, {&(0x7f0000003980)="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", 0x1000}, {&(0x7f0000004980)="13cb647b18afb7117780b0ae1a2cb1c3f78e9d651abfeeb37147e1f56afabe677cfb90e38c2efa7718ced744450a5efa16b36f3a08b7ccfe1b201d3c438e95a93f39cd378b32768134167ab34ea86278723c7a75b6527cfa0740847bd0da30c5b67d42a9f5ac9cef8e7de8074b4f3f9796a2e5caa4d961b66b3e935e2300cb0708d190d2f2a456fac6f4ca40e21f26ab82ed4f8e87", 0x95}], 0x4}}, {{&(0x7f0000004a80)={0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x5}, 0x1c, &(0x7f0000004ac0), 0x0, &(0x7f0000004b00)=[@rthdr_2292={{0xb8, 0x29, 0x39, {0x4, 0x14, 0x0, 0x3, 0x0, [@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, @local, @local, @empty]}}}, @rthdr={{0x48, 0x29, 0x39, {0x3c, 0x6, 0x0, 0x8, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x0, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0x70}, @jumbo={0xc2, 0x4, 0x153715f}, @jumbo={0xc2, 0x4, 0x7}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x54, 0x0, '\x00', [@ra={0x5, 0x2, 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xff}}, @dontfrag={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @tclass={{0x14, 0x29, 0x43, 0x7}}], 0x1b0}}], 0x7, 0x0) 02:10:02 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 60) 02:10:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4800, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:10:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c", 0xffffffff}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) [ 2126.890618] ? __lockdep_reset_lock+0x180/0x180 [ 2126.891998] ? find_held_lock+0x2c/0x110 [ 2126.893124] ? __might_fault+0xd3/0x180 [ 2126.894181] ? lock_downgrade+0x6d0/0x6d0 [ 2126.895284] ? asm_exc_page_fault+0x1e/0x30 [ 2126.896512] __sys_sendmmsg+0x195/0x470 [ 2126.897498] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2126.898473] ? lock_downgrade+0x6d0/0x6d0 [ 2126.899438] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2126.900562] ? wait_for_completion+0x270/0x270 [ 2126.901618] ? rcu_read_lock_any_held+0x75/0xa0 [ 2126.902686] ? vfs_write+0x354/0xa30 [ 2126.903554] ? fput_many+0x2f/0x1a0 [ 2126.904407] ? ksys_write+0x1a9/0x260 [ 2126.905312] __x64_sys_sendmmsg+0x99/0x100 [ 2126.906293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2126.907426] do_syscall_64+0x33/0x40 [ 2126.908353] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2126.909506] RIP: 0033:0x7f8542659b19 [ 2126.910406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.914524] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2126.916240] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2126.917912] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2126.918584] blktrace: Concurrent blktraces are not allowed on loop6 [ 2126.919531] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.919546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.919560] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2126.936401] blktrace: Concurrent blktraces are not allowed on loop12 [ 2126.939988] ieee802154 phy0 wpan0: encryption failed: -22 [ 2126.942761] blktrace: Concurrent blktraces are not allowed on loop12 [ 2126.959432] blktrace: Concurrent blktraces are not allowed on loop6 [ 2127.002572] ieee802154 phy0 wpan0: encryption failed: -22 02:10:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) 02:10:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x14, 0x1a, 0xc21}, 0x14}}, 0x0) ioctl(r0, 0xffff0001, &(0x7f0000000040)="95a20e8df2f905cc34a06a22982099819e4b8fae103654d7c5538633f40ad019050a4b82588eca1e869585cdd6cbb0844e836fe6cbb3f2701c225979b64236e7a44aeeb7ed116490b68603c4bc39231337a8c8f70aa521096ae9f8585aa7b68fbf86b9c0fd6497ca5ff9577be9afefcb8ccb5d74f60ff8cdb83a280456e4628e130c9b0953d9810254") 02:10:02 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) [ 2127.108143] blktrace: Concurrent blktraces are not allowed on loop12 [ 2127.113085] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pid=9169 comm=syz-executor.5 [ 2127.125598] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pid=9169 comm=syz-executor.5 02:10:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2127.165572] blktrace: Concurrent blktraces are not allowed on loop6 [ 2127.177304] blktrace: Concurrent blktraces are not allowed on loop6 [ 2127.208682] ieee802154 phy0 wpan0: encryption failed: -22 [ 2127.261935] ieee802154 phy0 wpan0: encryption failed: -22 [ 2141.197844] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2151.987742] blktrace: Concurrent blktraces are not allowed on loop6 [ 2151.989108] blktrace: Concurrent blktraces are not allowed on loop6 02:10:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5312, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:10:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 61) 02:10:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000001c0)=0x6, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="6c000000e60000020000000001000000070200000800000000000000500000802b4ac4b7eee571208f0318ffcf3e92852ef0c2d86d87cb8c07f7bae5dc5f2f0b814c1d1da5c7638ccb74ba358d8bc22c3ffa5df672d2886e32d3901b0663362b7eccabf08d5c6e9a"], 0x6c}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000002300100026bd7000ffdbdf251000000004002880080069000000000008007500", @ANYRES32, @ANYBLOB="2bfc825f2958fc0b759bc480ff8fdb3c9ada8dd226c7f31abca194f1024aaa77b5b4940e389f2e19026428745ee70b651c38bd257fc875928379ca075a217fdf944379a78705ee38c4b18c9caafce1ade611dcfae549000a142432666f50d16fc8"], 0x28}, 0x1, 0x0, 0x0, 0x4040010}, 0x20000000) 02:10:27 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file2\x00', 0xa013, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1000, 0x96d}], 0x2050, &(0x7f0000000240)={[{@sbsector={'sbsector', 0x3d, 0x4}}, {@check_strict}, {@cruft}, {@map_normal}, {@utf8}, {@check_relaxed}, {@gid={'gid', 0x3d, 0xee00}}, {@overriderock}], [{@fsmagic={'fsmagic', 0x3d, 0x10000}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%:!-'}}]}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000440)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r2, 0x0) statx(r0, &(0x7f0000000000)='./file2\x00', 0x400, 0x7ff, &(0x7f0000000680)) openat(0xffffffffffffffff, 0x0, 0x141201, 0x4d) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r3, &(0x7f0000000100)=@reiserfs_2={0x8, 0x2, {0x2}}, 0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0x30000, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x14d) open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x1000) sendfile(0xffffffffffffffff, r1, 0x0, 0x6) 02:10:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 61) 02:10:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) 02:10:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) [ 2152.013565] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.019131] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.020290] FAULT_INJECTION: forcing a failure. [ 2152.020290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.021775] CPU: 1 PID: 9192 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2152.022567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.023533] Call Trace: [ 2152.023858] dump_stack+0x107/0x167 [ 2152.024290] should_fail.cold+0x5/0xa [ 2152.024744] _copy_from_user+0x2e/0x1b0 [ 2152.025210] __copy_msghdr_from_user+0x91/0x4b0 [ 2152.025752] ? __ia32_sys_shutdown+0x80/0x80 [ 2152.026275] ? ieee802154_sock_release+0xb0/0xb0 [ 2152.026836] ? sock_sendmsg+0x55/0x190 [ 2152.027297] sendmsg_copy_msghdr+0xa1/0x160 [ 2152.027796] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.028248] ? __lock_acquire+0x1657/0x5b00 [ 2152.028776] ___sys_sendmsg+0xc6/0x170 [ 2152.029230] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.029763] ? vmacache_find+0x55/0x2a0 [ 2152.030226] ? __lockdep_reset_lock+0x180/0x180 [ 2152.030792] ? find_held_lock+0x2c/0x110 [ 2152.031315] ? __might_fault+0xd3/0x180 [ 2152.031801] ? lock_downgrade+0x6d0/0x6d0 [ 2152.032368] ? asm_exc_page_fault+0x1e/0x30 [ 2152.032905] __sys_sendmmsg+0x195/0x470 [ 2152.033443] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2152.033939] ? lock_downgrade+0x6d0/0x6d0 [ 2152.034428] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2152.035016] ? wait_for_completion+0x270/0x270 [ 2152.035572] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.036104] ? vfs_write+0x354/0xa30 [ 2152.036541] ? fput_many+0x2f/0x1a0 [ 2152.036969] ? ksys_write+0x1a9/0x260 [ 2152.037437] __x64_sys_sendmmsg+0x99/0x100 [ 2152.037982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.038583] do_syscall_64+0x33/0x40 [ 2152.039022] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.039631] RIP: 0033:0x7f867efe2b19 [ 2152.040059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.042296] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2152.043217] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2152.044036] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2152.044864] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.045696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.046558] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:10:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) [ 2152.050361] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.053920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=230 sclass=netlink_route_socket pid=9195 comm=syz-executor.5 [ 2152.056216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=9195 comm=syz-executor.5 [ 2152.056509] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.062213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=230 sclass=netlink_route_socket pid=9200 comm=syz-executor.5 [ 2152.066660] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.068570] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.076162] FAULT_INJECTION: forcing a failure. [ 2152.076162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.078766] CPU: 0 PID: 9199 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2152.080502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.082204] Call Trace: [ 2152.082876] dump_stack+0x107/0x167 [ 2152.083659] should_fail.cold+0x5/0xa [ 2152.084645] _copy_from_user+0x2e/0x1b0 [ 2152.085646] __copy_msghdr_from_user+0x91/0x4b0 [ 2152.085791] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.086757] ? __ia32_sys_shutdown+0x80/0x80 [ 2152.086798] ? ieee802154_sock_release+0xb0/0xb0 [ 2152.089462] ? sock_sendmsg+0x55/0x190 [ 2152.090327] sendmsg_copy_msghdr+0xa1/0x160 [ 2152.091262] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.092115] ? __lock_acquire+0x1657/0x5b00 [ 2152.092484] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.093094] ___sys_sendmsg+0xc6/0x170 [ 2152.094691] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.095697] ? vmacache_find+0x55/0x2a0 [ 2152.096543] ? __lockdep_reset_lock+0x180/0x180 [ 2152.097515] ? find_held_lock+0x2c/0x110 [ 2152.098409] ? __might_fault+0xd3/0x180 [ 2152.099275] ? lock_downgrade+0x6d0/0x6d0 [ 2152.100171] ? asm_exc_page_fault+0x1e/0x30 [ 2152.101300] __sys_sendmmsg+0x195/0x470 [ 2152.102341] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2152.103424] ? lock_downgrade+0x6d0/0x6d0 [ 2152.104464] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2152.105459] ? wait_for_completion+0x270/0x270 [ 2152.106399] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.107353] ? vfs_write+0x354/0xa30 [ 2152.108135] ? fput_many+0x2f/0x1a0 [ 2152.108915] ? ksys_write+0x1a9/0x260 [ 2152.109727] __x64_sys_sendmmsg+0x99/0x100 [ 2152.110778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.111838] do_syscall_64+0x33/0x40 [ 2152.112779] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.113837] RIP: 0033:0x7f8542659b19 [ 2152.114756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.118473] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2152.120351] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2152.121826] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2152.123355] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.124832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.126273] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2152.128050] hpet: Lost 3 RTC interrupts 02:10:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) 02:10:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2152.156473] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.158560] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.166055] blktrace: Concurrent blktraces are not allowed on loop6 02:10:27 executing program 5: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x68}}, 0x880c0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x4026c0, 0x102) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff018}, {}]}, 0x10) r6 = open_tree(r4, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$CDROMRESET(r6, 0x5312) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r7, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) fchdir(r7) 02:10:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) 02:10:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) 02:10:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 62) [ 2152.240281] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.241378] FAULT_INJECTION: forcing a failure. [ 2152.241378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.242732] CPU: 1 PID: 9217 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2152.243482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.244394] Call Trace: [ 2152.244690] dump_stack+0x107/0x167 [ 2152.245103] should_fail.cold+0x5/0xa [ 2152.245535] _copy_from_user+0x2e/0x1b0 [ 2152.245982] __copy_msghdr_from_user+0x91/0x4b0 [ 2152.246497] ? __ia32_sys_shutdown+0x80/0x80 [ 2152.246979] ? ieee802154_sock_release+0xb0/0xb0 [ 2152.247506] ? sock_sendmsg+0x55/0x190 [ 2152.247930] sendmsg_copy_msghdr+0xa1/0x160 [ 2152.247972] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.248416] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.248440] ? __lock_acquire+0x1657/0x5b00 [ 2152.250455] ___sys_sendmsg+0xc6/0x170 [ 2152.250888] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.251407] ? vmacache_find+0x55/0x2a0 [ 2152.251952] ? __lockdep_reset_lock+0x180/0x180 [ 2152.252525] ? find_held_lock+0x2c/0x110 [ 2152.252984] ? __might_fault+0xd3/0x180 [ 2152.253460] ? lock_downgrade+0x6d0/0x6d0 [ 2152.253925] ? asm_exc_page_fault+0x1e/0x30 [ 2152.254418] __sys_sendmmsg+0x195/0x470 [ 2152.254868] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2152.255350] ? lock_downgrade+0x6d0/0x6d0 [ 2152.255826] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2152.256369] ? wait_for_completion+0x270/0x270 [ 2152.256882] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.257381] ? vfs_write+0x354/0xa30 [ 2152.257788] ? fput_many+0x2f/0x1a0 [ 2152.258196] ? ksys_write+0x1a9/0x260 [ 2152.258637] __x64_sys_sendmmsg+0x99/0x100 [ 2152.259111] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.259689] do_syscall_64+0x33/0x40 [ 2152.260107] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.260666] RIP: 0033:0x7f867efe2b19 [ 2152.261086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.263239] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2152.264086] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2152.264927] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2152.265693] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.266488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.267292] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2152.274772] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.287740] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.309569] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.333982] blktrace: Concurrent blktraces are not allowed on loop6 02:10:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6800, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:10:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 63) 02:10:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) 02:10:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 62) 02:10:27 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file2\x00', 0xa013, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1000, 0x96d}], 0x2050, &(0x7f0000000240)={[{@sbsector={'sbsector', 0x3d, 0x4}}, {@check_strict}, {@cruft}, {@map_normal}, {@utf8}, {@check_relaxed}, {@gid={'gid', 0x3d, 0xee00}}, {@overriderock}], [{@fsmagic={'fsmagic', 0x3d, 0x10000}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%:!-'}}]}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000440)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r2, 0x0) statx(r0, &(0x7f0000000000)='./file2\x00', 0x400, 0x7ff, &(0x7f0000000680)) openat(0xffffffffffffffff, 0x0, 0x141201, 0x4d) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r3, &(0x7f0000000100)=@reiserfs_2={0x8, 0x2, {0x2}}, 0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0x30000, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x14d) open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x1000) sendfile(0xffffffffffffffff, r1, 0x0, 0x6) [ 2152.469769] ieee802154 phy0 wpan0: encryption failed: -22 02:10:28 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) [ 2152.483592] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.488166] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.494479] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.497096] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.497506] FAULT_INJECTION: forcing a failure. [ 2152.497506] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.500470] CPU: 0 PID: 9238 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2152.502175] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.503897] Call Trace: [ 2152.504485] dump_stack+0x107/0x167 [ 2152.505390] should_fail.cold+0x5/0xa [ 2152.506189] _copy_from_user+0x2e/0x1b0 [ 2152.507182] __copy_msghdr_from_user+0x91/0x4b0 [ 2152.508136] ? __ia32_sys_shutdown+0x80/0x80 [ 2152.509250] ? ieee802154_sock_release+0xb0/0xb0 [ 2152.510225] ? sock_sendmsg+0x55/0x190 [ 2152.511205] sendmsg_copy_msghdr+0xa1/0x160 [ 2152.512095] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.512965] ? __lock_acquire+0x1657/0x5b00 [ 2152.513882] ___sys_sendmsg+0xc6/0x170 [ 2152.514675] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.515612] ? vmacache_find+0x55/0x2a0 [ 2152.516442] ? __lockdep_reset_lock+0x180/0x180 [ 2152.517408] ? find_held_lock+0x2c/0x110 [ 2152.518248] ? __might_fault+0xd3/0x180 [ 2152.519067] ? lock_downgrade+0x6d0/0x6d0 [ 2152.519906] ? asm_exc_page_fault+0x1e/0x30 [ 2152.520854] __sys_sendmmsg+0x195/0x470 [ 2152.521681] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2152.522559] ? lock_downgrade+0x6d0/0x6d0 [ 2152.523489] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2152.524528] ? wait_for_completion+0x270/0x270 [ 2152.525465] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.526406] ? vfs_write+0x354/0xa30 [ 2152.527220] ? fput_many+0x2f/0x1a0 [ 2152.527971] ? ksys_write+0x1a9/0x260 [ 2152.528801] __x64_sys_sendmmsg+0x99/0x100 [ 2152.529668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.530733] do_syscall_64+0x33/0x40 [ 2152.531529] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.532614] RIP: 0033:0x7f8542659b19 [ 2152.533376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.537094] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2152.538637] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2152.540104] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2152.541557] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.543032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.544497] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2152.546213] hpet: Lost 2 RTC interrupts [ 2152.549175] ieee802154 phy0 wpan0: encryption failed: -22 02:10:28 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) [ 2152.562474] blktrace: Concurrent blktraces are not allowed on loop12 [ 2152.567093] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.568481] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.594232] ieee802154 phy0 wpan0: encryption failed: -22 02:10:28 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6c00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:10:28 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) [ 2152.611315] FAULT_INJECTION: forcing a failure. [ 2152.611315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2152.614322] CPU: 0 PID: 9250 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2152.615982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.617674] Call Trace: [ 2152.618222] dump_stack+0x107/0x167 [ 2152.618972] should_fail.cold+0x5/0xa [ 2152.619755] _copy_from_user+0x2e/0x1b0 [ 2152.620589] __copy_msghdr_from_user+0x91/0x4b0 [ 2152.621544] ? __ia32_sys_shutdown+0x80/0x80 [ 2152.622521] ? ieee802154_sock_release+0xb0/0xb0 [ 2152.623646] ? sock_sendmsg+0x55/0x190 [ 2152.624477] sendmsg_copy_msghdr+0xa1/0x160 [ 2152.625353] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.626155] ? __lock_acquire+0x1657/0x5b00 [ 2152.627092] ___sys_sendmsg+0xc6/0x170 [ 2152.627889] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.628982] ? vmacache_find+0x55/0x2a0 [ 2152.629987] ? __lockdep_reset_lock+0x180/0x180 [ 2152.631172] ? find_held_lock+0x2c/0x110 [ 2152.632186] ? __might_fault+0xd3/0x180 [ 2152.633013] ? lock_downgrade+0x6d0/0x6d0 [ 2152.633852] ? asm_exc_page_fault+0x1e/0x30 [ 2152.634771] __sys_sendmmsg+0x195/0x470 [ 2152.635584] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2152.636477] ? lock_downgrade+0x6d0/0x6d0 [ 2152.637359] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2152.638333] ? wait_for_completion+0x270/0x270 [ 2152.639271] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.640298] ? vfs_write+0x354/0xa30 [ 2152.641248] ? fput_many+0x2f/0x1a0 [ 2152.642164] ? ksys_write+0x1a9/0x260 [ 2152.643025] __x64_sys_sendmmsg+0x99/0x100 [ 2152.643885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.644955] do_syscall_64+0x33/0x40 [ 2152.645713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.646751] RIP: 0033:0x7f867efe2b19 [ 2152.647507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.650672] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.651221] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2152.653738] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2152.654174] ieee802154 phy0 wpan0: encryption failed: -22 [ 2152.655175] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2152.655189] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.655203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.655220] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2152.657577] blktrace: Concurrent blktraces are not allowed on loop6 [ 2152.659128] hpet: Lost 2 RTC interrupts [ 2152.696713] ieee802154 phy0 wpan0: encryption failed: -22 [ 2167.671735] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:10:52 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 64) 02:10:52 executing program 5: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x68}}, 0x880c0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x4026c0, 0x102) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff018}, {}]}, 0x10) r6 = open_tree(r4, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$CDROMRESET(r6, 0x5312) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r7, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) fchdir(r7) 02:10:52 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7400, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2177.181949] ieee802154 phy0 wpan0: encryption failed: -22 02:10:52 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 63) 02:10:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2177.193130] ieee802154 phy0 wpan0: encryption failed: -22 [ 2177.203500] blktrace: Concurrent blktraces are not allowed on loop12 [ 2177.206204] ieee802154 phy0 wpan0: encryption failed: -22 [ 2177.211500] FAULT_INJECTION: forcing a failure. [ 2177.211500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2177.213334] CPU: 1 PID: 9267 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2177.214396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2177.215668] Call Trace: [ 2177.216092] dump_stack+0x107/0x167 [ 2177.216686] should_fail.cold+0x5/0xa [ 2177.217305] _copy_from_user+0x2e/0x1b0 [ 2177.217948] __copy_msghdr_from_user+0x91/0x4b0 [ 2177.218677] ? __ia32_sys_shutdown+0x80/0x80 [ 2177.219386] ? ieee802154_sock_release+0xb0/0xb0 [ 2177.220137] ? sock_sendmsg+0x55/0x190 [ 2177.220851] sendmsg_copy_msghdr+0xa1/0x160 [ 2177.221541] ? do_recvmmsg+0x6d0/0x6d0 [ 2177.222178] ? __lock_acquire+0x1657/0x5b00 [ 2177.222876] ___sys_sendmsg+0xc6/0x170 [ 2177.223506] ? sendmsg_copy_msghdr+0x160/0x160 [ 2177.224231] ? vmacache_find+0x55/0x2a0 [ 2177.224898] ? __lockdep_reset_lock+0x180/0x180 [ 2177.225646] ? find_held_lock+0x2c/0x110 [ 2177.226307] ? __might_fault+0xd3/0x180 [ 2177.226938] ? lock_downgrade+0x6d0/0x6d0 [ 2177.227595] ? asm_exc_page_fault+0x1e/0x30 [ 2177.228325] __sys_sendmmsg+0x195/0x470 [ 2177.228976] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2177.229663] ? lock_downgrade+0x6d0/0x6d0 [ 2177.230357] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2177.231143] ? wait_for_completion+0x270/0x270 [ 2177.231883] ? rcu_read_lock_any_held+0x75/0xa0 [ 2177.232644] ? vfs_write+0x354/0xa30 [ 2177.233248] ? fput_many+0x2f/0x1a0 [ 2177.233832] ? ksys_write+0x1a9/0x260 [ 2177.234462] __x64_sys_sendmmsg+0x99/0x100 [ 2177.235133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2177.235933] do_syscall_64+0x33/0x40 [ 2177.236629] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2177.237443] RIP: 0033:0x7f8542659b19 [ 2177.238035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2177.240955] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2177.242191] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2177.243333] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2177.244462] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2177.245609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2177.246753] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2177.251960] blktrace: Concurrent blktraces are not allowed on loop6 [ 2177.254124] blktrace: Concurrent blktraces are not allowed on loop12 [ 2177.257009] FAULT_INJECTION: forcing a failure. [ 2177.257009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2177.258920] CPU: 1 PID: 9264 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2177.260000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2177.261329] Call Trace: [ 2177.261760] dump_stack+0x107/0x167 [ 2177.262338] should_fail.cold+0x5/0xa [ 2177.262940] _copy_from_user+0x2e/0x1b0 02:10:52 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 02:10:52 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 02:10:52 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2177.263587] __copy_msghdr_from_user+0x91/0x4b0 [ 2177.264477] ? __ia32_sys_shutdown+0x80/0x80 [ 2177.265197] ? ieee802154_sock_release+0xb0/0xb0 [ 2177.265964] ? sock_sendmsg+0x55/0x190 [ 2177.266591] sendmsg_copy_msghdr+0xa1/0x160 [ 2177.267270] ? do_recvmmsg+0x6d0/0x6d0 [ 2177.267946] ? __lock_acquire+0x1657/0x5b00 [ 2177.268652] ___sys_sendmsg+0xc6/0x170 [ 2177.269276] ? sendmsg_copy_msghdr+0x160/0x160 [ 2177.269997] ? vmacache_find+0x55/0x2a0 [ 2177.270636] ? __lockdep_reset_lock+0x180/0x180 [ 2177.271384] ? find_held_lock+0x2c/0x110 [ 2177.272032] ? __might_fault+0xd3/0x180 [ 2177.272701] ? lock_downgrade+0x6d0/0x6d0 [ 2177.273396] ? asm_exc_page_fault+0x1e/0x30 [ 2177.274133] __sys_sendmmsg+0x195/0x470 [ 2177.274802] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2177.275511] ? lock_downgrade+0x6d0/0x6d0 [ 2177.276241] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2177.277058] ? wait_for_completion+0x270/0x270 [ 2177.277818] ? rcu_read_lock_any_held+0x75/0xa0 [ 2177.278591] ? vfs_write+0x354/0xa30 [ 2177.279211] ? fput_many+0x2f/0x1a0 [ 2177.279816] ? ksys_write+0x1a9/0x260 [ 2177.280532] __x64_sys_sendmmsg+0x99/0x100 [ 2177.281339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2177.282155] do_syscall_64+0x33/0x40 [ 2177.282734] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2177.283629] RIP: 0033:0x7f867efe2b19 [ 2177.284311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2177.287463] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2177.288724] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2177.289980] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2177.291212] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2177.292546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2177.293725] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2177.300363] blktrace: Concurrent blktraces are not allowed on loop6 [ 2177.317220] ieee802154 phy0 wpan0: encryption failed: -22 02:10:52 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:52 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) 02:10:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:10:52 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) [ 2177.447747] blktrace: Concurrent blktraces are not allowed on loop12 [ 2177.464450] blktrace: Concurrent blktraces are not allowed on loop12 02:10:53 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7a00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2177.484624] blktrace: Concurrent blktraces are not allowed on loop6 [ 2177.510720] blktrace: Concurrent blktraces are not allowed on loop6 02:10:53 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 64) 02:10:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x6}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x1) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r0 = syz_open_pts(0xffffffffffffffff, 0x2002) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0x3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000040)='./file2\x00', 0x20000, 0x140) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x92a049b132f0c354, 0x9e) close(0xffffffffffffffff) 02:10:53 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2177.595213] ieee802154 phy0 wpan0: encryption failed: -22 [ 2177.629792] ieee802154 phy0 wpan0: encryption failed: -22 [ 2177.643435] FAULT_INJECTION: forcing a failure. [ 2177.643435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2177.646171] CPU: 0 PID: 9299 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2177.647648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2177.649454] Call Trace: [ 2177.650054] dump_stack+0x107/0x167 [ 2177.650869] should_fail.cold+0x5/0xa [ 2177.651726] _copy_from_user+0x2e/0x1b0 [ 2177.652635] __copy_msghdr_from_user+0x91/0x4b0 [ 2177.653661] ? __ia32_sys_shutdown+0x80/0x80 [ 2177.654641] ? ieee802154_sock_release+0xb0/0xb0 [ 2177.655691] ? sock_sendmsg+0x55/0x190 [ 2177.656557] sendmsg_copy_msghdr+0xa1/0x160 [ 2177.657508] ? do_recvmmsg+0x6d0/0x6d0 [ 2177.658378] ? __lock_acquire+0x1657/0x5b00 [ 2177.659356] ___sys_sendmsg+0xc6/0x170 [ 2177.660212] ? sendmsg_copy_msghdr+0x160/0x160 [ 2177.661200] ? vmacache_find+0x55/0x2a0 [ 2177.662085] ? __lockdep_reset_lock+0x180/0x180 [ 2177.663132] ? find_held_lock+0x2c/0x110 [ 2177.664034] ? __might_fault+0xd3/0x180 [ 2177.664928] ? lock_downgrade+0x6d0/0x6d0 [ 2177.665850] ? asm_exc_page_fault+0x1e/0x30 [ 2177.666843] __sys_sendmmsg+0x195/0x470 [ 2177.667732] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2177.668686] ? lock_downgrade+0x6d0/0x6d0 [ 2177.669632] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2177.670704] ? wait_for_completion+0x270/0x270 [ 2177.671700] ? rcu_read_lock_any_held+0x75/0xa0 [ 2177.672737] ? vfs_write+0x354/0xa30 [ 2177.673555] ? fput_many+0x2f/0x1a0 [ 2177.674360] ? ksys_write+0x1a9/0x260 [ 2177.675217] __x64_sys_sendmmsg+0x99/0x100 [ 2177.676148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2177.677284] do_syscall_64+0x33/0x40 [ 2177.678108] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2177.679225] RIP: 0033:0x7f8542659b19 [ 2177.680035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2177.683979] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2177.685649] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2177.687189] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2177.688742] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2177.690289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2177.691828] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2177.693592] hpet: Lost 2 RTC interrupts [ 2177.709532] blktrace: Concurrent blktraces are not allowed on loop12 [ 2177.715215] blktrace: Concurrent blktraces are not allowed on loop12 [ 2177.735215] ieee802154 phy0 wpan0: encryption failed: -22 [ 2194.601421] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:11:18 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 65) 02:11:18 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7f00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2203.025696] blktrace: Concurrent blktraces are not allowed on loop12 02:11:18 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:11:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:11:18 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) 02:11:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/213) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) readv(r1, &(0x7f0000000000), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="700000000208030000000000000000000200000405000300060000000600024088f8000006000240000d000009000100737910343bd2c870a61a0143da7383edc1d397e16900010073797a300000000014000480080001400000040008000140000000070900010073797adfd030f800f7162c0f2730000000000900"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000240)={{r0}, 0x4, &(0x7f0000000040)=[0x7f, 0x77, 0x10000, 0x80], 0xb37, 0xebe6aa7ca8cf97d, [0x7, 0x7fffffff, 0x3ff, 0x5]}) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0xc2981) 02:11:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) openat(r1, &(0x7f0000000180)='./file0\x00', 0x208000, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000280), 0x2, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400", @ANYRES16=r2, @ANYBLOB="000000000000000000000800000046dff21750dbf97191b418faa076"], 0x14}}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000280)={0x20, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb0, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x1a84}, @ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x80, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x73, 0x4, "19ceddb9511143ed347a529f53923818ec662757bc059d710d276149f001858a8a7e561ce63ce102d21564dba8928dbd65e056fdf272359bfa7783d9810f52c73b52e1853b4496309993a2d33f67778e86319354139afd4379ffb20feea19ab4d5e88ea1baf476d3498be82aad2e38"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xb0}}, 0x44854) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x5ead}, {0xa, 0x4e24, 0x1000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, 0x1, [0x1, 0x100, 0x0, 0x20, 0xfffffffb, 0x6, 0x6, 0xfffffffc]}, 0x5c) 02:11:18 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 65) [ 2203.045820] blktrace: Concurrent blktraces are not allowed on loop12 [ 2203.049093] ieee802154 phy0 wpan0: encryption failed: -22 [ 2203.051014] blktrace: Concurrent blktraces are not allowed on loop6 [ 2203.059055] blktrace: Concurrent blktraces are not allowed on loop6 [ 2203.070699] ieee802154 phy0 wpan0: encryption failed: -22 [ 2203.074373] ieee802154 phy0 wpan0: encryption failed: -22 [ 2203.081546] FAULT_INJECTION: forcing a failure. [ 2203.081546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2203.084338] CPU: 1 PID: 9323 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2203.085954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.087886] Call Trace: [ 2203.088519] dump_stack+0x107/0x167 [ 2203.089406] should_fail.cold+0x5/0xa [ 2203.090330] _copy_from_user+0x2e/0x1b0 [ 2203.091276] __copy_msghdr_from_user+0x91/0x4b0 [ 2203.092357] ? __ia32_sys_shutdown+0x80/0x80 [ 2203.093416] ? ieee802154_sock_release+0xb0/0xb0 [ 2203.094513] ? sock_sendmsg+0x55/0x190 [ 2203.095441] sendmsg_copy_msghdr+0xa1/0x160 [ 2203.096529] ? do_recvmmsg+0x6d0/0x6d0 [ 2203.097458] ? __lock_acquire+0x1657/0x5b00 [ 2203.098496] ___sys_sendmsg+0xc6/0x170 [ 2203.099423] ? sendmsg_copy_msghdr+0x160/0x160 [ 2203.100485] ? vmacache_find+0x55/0x2a0 [ 2203.101448] ? __lockdep_reset_lock+0x180/0x180 [ 2203.102572] ? find_held_lock+0x2c/0x110 [ 2203.103534] ? __might_fault+0xd3/0x180 [ 2203.104439] ? lock_downgrade+0x6d0/0x6d0 [ 2203.105385] ? asm_exc_page_fault+0x1e/0x30 [ 2203.106406] __sys_sendmmsg+0x195/0x470 [ 2203.107314] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2203.108284] ? lock_downgrade+0x6d0/0x6d0 [ 2203.109297] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2203.110394] ? wait_for_completion+0x270/0x270 [ 2203.111432] ? rcu_read_lock_any_held+0x75/0xa0 [ 2203.112558] ? vfs_write+0x354/0xa30 [ 2203.113422] ? fput_many+0x2f/0x1a0 [ 2203.114251] ? ksys_write+0x1a9/0x260 [ 2203.115143] __x64_sys_sendmmsg+0x99/0x100 [ 2203.116099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2203.117281] do_syscall_64+0x33/0x40 [ 2203.118126] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2203.119270] RIP: 0033:0x7f8542659b19 [ 2203.120109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.121421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2203.124226] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2203.124254] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2203.124269] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2203.124290] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.131915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2203.133520] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2203.141362] FAULT_INJECTION: forcing a failure. [ 2203.141362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2203.143959] CPU: 0 PID: 9325 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2203.145384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.147076] Call Trace: [ 2203.147628] dump_stack+0x107/0x167 [ 2203.148386] should_fail.cold+0x5/0xa [ 2203.149188] _copy_from_user+0x2e/0x1b0 [ 2203.150017] __copy_msghdr_from_user+0x91/0x4b0 [ 2203.150966] ? __ia32_sys_shutdown+0x80/0x80 [ 2203.151876] ? ieee802154_sock_release+0xb0/0xb0 [ 2203.152838] ? sock_sendmsg+0x55/0x190 02:11:18 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) 02:11:18 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) [ 2203.153658] sendmsg_copy_msghdr+0xa1/0x160 [ 2203.154626] ? do_recvmmsg+0x6d0/0x6d0 [ 2203.155425] ? __lock_acquire+0x1657/0x5b00 [ 2203.156335] ___sys_sendmsg+0xc6/0x170 [ 2203.157144] ? sendmsg_copy_msghdr+0x160/0x160 [ 2203.158069] ? vmacache_find+0x55/0x2a0 [ 2203.158900] ? __lockdep_reset_lock+0x180/0x180 [ 2203.159856] ? find_held_lock+0x2c/0x110 [ 2203.160689] ? __might_fault+0xd3/0x180 [ 2203.161517] ? lock_downgrade+0x6d0/0x6d0 [ 2203.162363] ? asm_exc_page_fault+0x1e/0x30 [ 2203.163267] __sys_sendmmsg+0x195/0x470 [ 2203.164084] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2203.164960] ? lock_downgrade+0x6d0/0x6d0 [ 2203.165836] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2203.166814] ? wait_for_completion+0x270/0x270 [ 2203.167738] ? rcu_read_lock_any_held+0x75/0xa0 [ 2203.168667] ? vfs_write+0x354/0xa30 [ 2203.169437] ? fput_many+0x2f/0x1a0 [ 2203.170175] ? ksys_write+0x1a9/0x260 [ 2203.170969] __x64_sys_sendmmsg+0x99/0x100 [ 2203.171823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2203.172855] do_syscall_64+0x33/0x40 [ 2203.173623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2203.174654] RIP: 0033:0x7f867efe2b19 [ 2203.175404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.179051] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2203.180567] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2203.182011] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2203.183419] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.184830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2203.186251] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2203.187919] hpet: Lost 1 RTC interrupts [ 2203.213972] blktrace: Concurrent blktraces are not allowed on loop6 [ 2203.219163] blktrace: Concurrent blktraces are not allowed on loop12 [ 2203.225495] blktrace: Concurrent blktraces are not allowed on loop6 02:11:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2203.228792] blktrace: Concurrent blktraces are not allowed on loop12 02:11:18 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xff03, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:11:18 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:11:18 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) 02:11:18 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) 02:11:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2203.366548] ieee802154 phy0 wpan0: encryption failed: -22 [ 2203.414107] blktrace: Concurrent blktraces are not allowed on loop6 [ 2203.424398] blktrace: Concurrent blktraces are not allowed on loop6 [ 2203.432121] blktrace: Concurrent blktraces are not allowed on loop12 [ 2203.445591] blktrace: Concurrent blktraces are not allowed on loop12 [ 2203.446744] ieee802154 phy0 wpan0: encryption failed: -22 [ 2218.909338] hpet: Lost 1 RTC interrupts [ 2220.496950] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:11:45 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 66) 02:11:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x34000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:11:45 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) 02:11:45 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x28018000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/igmp6\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x8e) r3 = openat(r2, &(0x7f0000000140)='./file1\x00', 0x40000, 0x80) bind$bt_l2cap(r1, &(0x7f0000000500)={0x1f, 0x0, @none, 0x6}, 0xe) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r4, 0xf507, 0x0) r5 = inotify_init1(0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000180)={0x6, 0x7f0}) fcntl$dupfd(r5, 0x0, r5) openat(r3, &(0x7f00000001c0)='./file0\x00', 0x8100, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2229.538510] ieee802154 phy0 wpan0: encryption failed: -22 02:11:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:11:45 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 66) 02:11:45 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:11:45 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) [ 2229.563627] blktrace: Concurrent blktraces are not allowed on loop12 [ 2229.573678] FAULT_INJECTION: forcing a failure. [ 2229.573678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2229.577623] CPU: 1 PID: 9362 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2229.579924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.580725] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.581978] Call Trace: [ 2229.582004] dump_stack+0x107/0x167 [ 2229.582022] should_fail.cold+0x5/0xa [ 2229.582042] _copy_from_user+0x2e/0x1b0 [ 2229.582062] __copy_msghdr_from_user+0x91/0x4b0 [ 2229.582113] ? __ia32_sys_shutdown+0x80/0x80 [ 2229.582135] ? ieee802154_sock_release+0xb0/0xb0 [ 2229.582151] ? sock_sendmsg+0x55/0x190 [ 2229.582170] sendmsg_copy_msghdr+0xa1/0x160 [ 2229.582183] ? do_recvmmsg+0x6d0/0x6d0 [ 2229.582203] ? __lock_acquire+0x1657/0x5b00 [ 2229.586273] blktrace: Concurrent blktraces are not allowed on loop12 [ 2229.586377] ___sys_sendmsg+0xc6/0x170 [ 2229.586397] ? sendmsg_copy_msghdr+0x160/0x160 [ 2229.594933] ? vmacache_find+0x55/0x2a0 [ 2229.595572] ? __lockdep_reset_lock+0x180/0x180 [ 2229.596317] ? find_held_lock+0x2c/0x110 [ 2229.598526] FAULT_INJECTION: forcing a failure. [ 2229.598526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2229.598745] ? __might_fault+0xd3/0x180 [ 2229.598770] ? lock_downgrade+0x6d0/0x6d0 [ 2229.604134] ? asm_exc_page_fault+0x1e/0x30 [ 2229.605739] __sys_sendmmsg+0x195/0x470 [ 2229.607128] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2229.608626] ? lock_downgrade+0x6d0/0x6d0 [ 2229.610079] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2229.611818] ? wait_for_completion+0x270/0x270 [ 2229.613700] ? rcu_read_lock_any_held+0x75/0xa0 [ 2229.615416] ? vfs_write+0x354/0xa30 [ 2229.616744] ? fput_many+0x2f/0x1a0 [ 2229.618072] ? ksys_write+0x1a9/0x260 [ 2229.619391] __x64_sys_sendmmsg+0x99/0x100 [ 2229.620955] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2229.622823] do_syscall_64+0x33/0x40 [ 2229.624207] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.626111] RIP: 0033:0x7f867efe2b19 [ 2229.627521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.634649] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2229.636526] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2229.639201] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2229.641933] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2229.644240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2229.646816] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2229.649036] CPU: 0 PID: 9373 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2229.651057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.653416] Call Trace: [ 2229.654163] dump_stack+0x107/0x167 [ 2229.654410] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.655188] should_fail.cold+0x5/0xa [ 2229.655221] _copy_from_user+0x2e/0x1b0 [ 2229.655250] __copy_msghdr_from_user+0x91/0x4b0 [ 2229.659545] blktrace: Concurrent blktraces are not allowed on loop6 [ 2229.659869] ? __ia32_sys_shutdown+0x80/0x80 [ 2229.659903] ? ieee802154_sock_release+0xb0/0xb0 [ 2229.659929] ? sock_sendmsg+0x55/0x190 [ 2229.663934] blktrace: Concurrent blktraces are not allowed on loop4 [ 2229.664795] sendmsg_copy_msghdr+0xa1/0x160 [ 2229.664815] ? do_recvmmsg+0x6d0/0x6d0 [ 2229.664844] ? __lock_acquire+0x1657/0x5b00 [ 2229.667402] blktrace: Concurrent blktraces are not allowed on loop6 [ 2229.668365] ___sys_sendmsg+0xc6/0x170 [ 2229.668393] ? sendmsg_copy_msghdr+0x160/0x160 [ 2229.673412] ? vmacache_find+0x55/0x2a0 [ 2229.674537] ? __lockdep_reset_lock+0x180/0x180 [ 2229.675961] ? find_held_lock+0x2c/0x110 [ 2229.677099] ? __might_fault+0xd3/0x180 [ 2229.678200] ? lock_downgrade+0x6d0/0x6d0 [ 2229.679359] ? asm_exc_page_fault+0x1e/0x30 [ 2229.680600] __sys_sendmmsg+0x195/0x470 [ 2229.681745] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2229.682973] ? lock_downgrade+0x6d0/0x6d0 [ 2229.684209] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2229.685639] ? wait_for_completion+0x270/0x270 [ 2229.686977] ? rcu_read_lock_any_held+0x75/0xa0 [ 2229.688288] ? vfs_write+0x354/0xa30 [ 2229.689368] ? fput_many+0x2f/0x1a0 [ 2229.690342] ? ksys_write+0x1a9/0x260 [ 2229.691399] __x64_sys_sendmmsg+0x99/0x100 [ 2229.692542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2229.693966] do_syscall_64+0x33/0x40 [ 2229.694974] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.696440] RIP: 0033:0x7f8542659b19 [ 2229.697491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.701927] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2229.702994] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2229.704001] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2229.704562] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.705000] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2229.705012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2229.705023] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2229.705265] hpet: Lost 2 RTC interrupts 02:11:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:11:45 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:11:45 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) 02:11:45 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) 02:11:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x2) [ 2229.813872] blktrace: Concurrent blktraces are not allowed on loop12 [ 2229.819963] blktrace: Concurrent blktraces are not allowed on loop12 02:11:45 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 67) 02:11:45 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 67) [ 2229.836102] blktrace: Concurrent blktraces are not allowed on loop4 [ 2229.844224] blktrace: Concurrent blktraces are not allowed on loop6 [ 2229.850867] blktrace: Concurrent blktraces are not allowed on loop6 [ 2229.897670] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.907059] FAULT_INJECTION: forcing a failure. [ 2229.907059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2229.908392] CPU: 1 PID: 9394 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2229.909172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.910184] Call Trace: [ 2229.910548] dump_stack+0x107/0x167 [ 2229.911029] should_fail.cold+0x5/0xa [ 2229.911540] _copy_from_user+0x2e/0x1b0 [ 2229.912038] __copy_msghdr_from_user+0x91/0x4b0 [ 2229.912533] ? __ia32_sys_shutdown+0x80/0x80 [ 2229.912989] ? ieee802154_sock_release+0xb0/0xb0 [ 2229.913523] ? sock_sendmsg+0x55/0x190 [ 2229.914021] sendmsg_copy_msghdr+0xa1/0x160 [ 2229.914536] ? do_recvmmsg+0x6d0/0x6d0 [ 2229.915023] ? __lock_acquire+0x1657/0x5b00 [ 2229.915133] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.915541] ___sys_sendmsg+0xc6/0x170 [ 2229.915564] ? sendmsg_copy_msghdr+0x160/0x160 [ 2229.917402] ? vmacache_find+0x55/0x2a0 [ 2229.917869] ? __lockdep_reset_lock+0x180/0x180 [ 2229.918404] ? find_held_lock+0x2c/0x110 [ 2229.918872] ? __might_fault+0xd3/0x180 [ 2229.919314] ? lock_downgrade+0x6d0/0x6d0 [ 2229.919798] ? asm_exc_page_fault+0x1e/0x30 [ 2229.920298] __sys_sendmmsg+0x195/0x470 [ 2229.920758] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2229.921239] ? lock_downgrade+0x6d0/0x6d0 [ 2229.921810] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2229.922523] ? wait_for_completion+0x270/0x270 [ 2229.923201] ? rcu_read_lock_any_held+0x75/0xa0 [ 2229.923864] ? vfs_write+0x354/0xa30 [ 2229.923988] FAULT_INJECTION: forcing a failure. [ 2229.923988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2229.924391] ? fput_many+0x2f/0x1a0 [ 2229.926591] ? ksys_write+0x1a9/0x260 [ 2229.927030] __x64_sys_sendmmsg+0x99/0x100 [ 2229.927506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2229.928082] do_syscall_64+0x33/0x40 [ 2229.928510] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.929211] RIP: 0033:0x7f8542659b19 [ 2229.929748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.932092] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2229.933092] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2229.933986] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2229.934726] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2229.935481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2229.936268] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2229.937169] CPU: 0 PID: 9397 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2229.938199] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.939398] Call Trace: [ 2229.939807] dump_stack+0x107/0x167 [ 2229.940416] should_fail.cold+0x5/0xa [ 2229.940987] _copy_from_user+0x2e/0x1b0 [ 2229.941587] __copy_msghdr_from_user+0x91/0x4b0 [ 2229.942269] ? __ia32_sys_shutdown+0x80/0x80 [ 2229.942907] ? ieee802154_sock_release+0xb0/0xb0 [ 2229.943601] ? sock_sendmsg+0x55/0x190 [ 2229.944184] sendmsg_copy_msghdr+0xa1/0x160 [ 2229.944826] ? do_recvmmsg+0x6d0/0x6d0 [ 2229.945462] ? __lock_acquire+0x1657/0x5b00 [ 2229.946147] ___sys_sendmsg+0xc6/0x170 [ 2229.946746] ? sendmsg_copy_msghdr+0x160/0x160 [ 2229.947438] ? vmacache_find+0x55/0x2a0 [ 2229.948007] ? __lockdep_reset_lock+0x180/0x180 [ 2229.948735] ? find_held_lock+0x2c/0x110 [ 2229.949383] ? __might_fault+0xd3/0x180 [ 2229.949958] ? lock_downgrade+0x6d0/0x6d0 [ 2229.950525] ? asm_exc_page_fault+0x1e/0x30 [ 2229.951138] __sys_sendmmsg+0x195/0x470 [ 2229.951691] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2229.952285] ? lock_downgrade+0x6d0/0x6d0 [ 2229.952869] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2229.953521] ? wait_for_completion+0x270/0x270 [ 2229.954119] ? rcu_read_lock_any_held+0x75/0xa0 [ 2229.954727] ? vfs_write+0x354/0xa30 [ 2229.955228] ? fput_many+0x2f/0x1a0 [ 2229.955702] ? ksys_write+0x1a9/0x260 [ 2229.956223] __x64_sys_sendmmsg+0x99/0x100 [ 2229.956783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2229.957748] do_syscall_64+0x33/0x40 [ 2229.958338] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.959079] RIP: 0033:0x7f867efe2b19 [ 2229.959644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.962407] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2229.963527] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2229.964581] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2229.965597] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2229.966646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2229.967681] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2229.968888] hpet: Lost 1 RTC interrupts [ 2242.350649] hpet: Lost 1 RTC interrupts [ 2244.678756] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2253.756520] blktrace: Concurrent blktraces are not allowed on loop12 [ 2253.765261] blktrace: Concurrent blktraces are not allowed on loop6 02:12:09 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 68) 02:12:09 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x40000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:12:09 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 68) 02:12:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:12:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) 02:12:09 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:12:09 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) 02:12:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) process_vm_readv(r2, &(0x7f0000000740)=[{&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f0000000400)=""/250, 0xfa}, {&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f00000005c0)=""/215, 0xd7}, {&(0x7f00000006c0)=""/94, 0x5e}, {&(0x7f0000000100)}], 0x6, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/180, 0xb4}, {&(0x7f0000000880)=""/187, 0xbb}, {&(0x7f0000000940)=""/36, 0x24}, {&(0x7f0000000980)=""/250, 0xfa}], 0x4, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) sendfile(r0, r3, &(0x7f0000000100)=0x3, 0x1) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) [ 2253.774748] blktrace: Concurrent blktraces are not allowed on loop12 [ 2253.793072] ieee802154 phy0 wpan0: encryption failed: -22 [ 2253.794555] FAULT_INJECTION: forcing a failure. [ 2253.794555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2253.796350] CPU: 0 PID: 9418 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2253.797351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.798811] Call Trace: [ 2253.799485] dump_stack+0x107/0x167 [ 2253.800488] should_fail.cold+0x5/0xa [ 2253.801516] _copy_from_user+0x2e/0x1b0 [ 2253.802753] __copy_msghdr_from_user+0x91/0x4b0 [ 2253.804215] ? __ia32_sys_shutdown+0x80/0x80 [ 2253.805332] ? ieee802154_sock_release+0xb0/0xb0 [ 2253.806541] ? sock_sendmsg+0x55/0x190 [ 2253.807520] sendmsg_copy_msghdr+0xa1/0x160 [ 2253.808578] ? do_recvmmsg+0x6d0/0x6d0 [ 2253.809575] ? __lock_acquire+0x1657/0x5b00 [ 2253.810952] ___sys_sendmsg+0xc6/0x170 [ 2253.812116] ? sendmsg_copy_msghdr+0x160/0x160 [ 2253.813218] ? vmacache_find+0x55/0x2a0 [ 2253.814261] ? __lockdep_reset_lock+0x180/0x180 [ 2253.815375] ? find_held_lock+0x2c/0x110 [ 2253.816360] ? __might_fault+0xd3/0x180 [ 2253.817331] ? lock_downgrade+0x6d0/0x6d0 [ 2253.818502] ? asm_exc_page_fault+0x1e/0x30 [ 2253.819631] __sys_sendmmsg+0x195/0x470 [ 2253.820722] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2253.821865] ? lock_downgrade+0x6d0/0x6d0 [ 2253.822893] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2253.824098] ? wait_for_completion+0x270/0x270 [ 2253.825221] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.826675] ? vfs_write+0x354/0xa30 [ 2253.827663] ? fput_many+0x2f/0x1a0 [ 2253.828572] ? ksys_write+0x1a9/0x260 [ 2253.829529] __x64_sys_sendmmsg+0x99/0x100 [ 2253.830842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.832501] do_syscall_64+0x33/0x40 [ 2253.833420] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2253.834605] RIP: 0033:0x7f8542659b19 [ 2253.835132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.837651] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2253.838730] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2253.839753] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2253.840858] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.841902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2253.842790] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2253.843934] hpet: Lost 2 RTC interrupts [ 2253.847595] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2253.848543] ieee802154 phy0 wpan0: encryption failed: -22 02:12:09 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) [ 2253.853227] ieee802154 phy0 wpan0: encryption failed: -22 02:12:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) [ 2253.858624] FAULT_INJECTION: forcing a failure. [ 2253.858624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2253.860450] CPU: 0 PID: 9419 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2253.861498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.862759] Call Trace: [ 2253.863173] dump_stack+0x107/0x167 [ 2253.863725] should_fail.cold+0x5/0xa [ 2253.864381] _copy_from_user+0x2e/0x1b0 [ 2253.865010] __copy_msghdr_from_user+0x91/0x4b0 [ 2253.865790] ? __ia32_sys_shutdown+0x80/0x80 [ 2253.866410] ? ieee802154_sock_release+0xb0/0xb0 [ 2253.867567] ? sock_sendmsg+0x55/0x190 [ 2253.868221] sendmsg_copy_msghdr+0xa1/0x160 [ 2253.868876] ? do_recvmmsg+0x6d0/0x6d0 [ 2253.869458] ? __lock_acquire+0x1657/0x5b00 [ 2253.870146] ___sys_sendmsg+0xc6/0x170 [ 2253.870771] ? sendmsg_copy_msghdr+0x160/0x160 [ 2253.871432] ? __lockdep_reset_lock+0x180/0x180 [ 2253.872121] ? trace_hardirqs_on+0x5b/0x180 [ 2253.872764] ? find_held_lock+0x2c/0x110 [ 2253.873374] ? __might_fault+0xd3/0x180 [ 2253.873941] ? lock_downgrade+0x6d0/0x6d0 [ 2253.874497] ? io_schedule_timeout+0x140/0x140 [ 2253.875203] __sys_sendmmsg+0x195/0x470 [ 2253.875803] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2253.876421] ? lock_downgrade+0x6d0/0x6d0 [ 2253.877035] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2253.877750] ? wait_for_completion+0x270/0x270 [ 2253.878346] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.878957] ? vfs_write+0x354/0xa30 [ 2253.879456] ? fput_many+0x2f/0x1a0 [ 2253.879946] ? ksys_write+0x1a9/0x260 [ 2253.880467] __x64_sys_sendmmsg+0x99/0x100 [ 2253.881036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.881728] do_syscall_64+0x33/0x40 [ 2253.882345] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2253.883863] RIP: 0033:0x7f867efe2b19 [ 2253.884887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.890439] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2253.892785] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2253.894164] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2253.895065] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.895986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2253.896869] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2253.901680] hpet: Lost 2 RTC interrupts [ 2253.906959] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 02:12:09 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) 02:12:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2253.931258] ieee802154 phy0 wpan0: encryption failed: -22 [ 2253.946579] blktrace: Concurrent blktraces are not allowed on loop12 [ 2253.953364] blktrace: Concurrent blktraces are not allowed on loop12 [ 2253.965117] blktrace: Concurrent blktraces are not allowed on loop6 [ 2253.970842] blktrace: Concurrent blktraces are not allowed on loop6 [ 2254.033436] syz-executor.5 (9415) used greatest stack depth: 23168 bytes left [ 2269.231562] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:12:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 69) 02:12:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x80000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:12:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) [ 2278.133991] ieee802154 phy0 wpan0: encryption failed: -22 02:12:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:12:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 69) 02:12:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) [ 2278.157374] blktrace: Concurrent blktraces are not allowed on loop6 [ 2278.174931] ieee802154 phy0 wpan0: encryption failed: -22 02:12:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) process_vm_readv(r2, &(0x7f0000000740)=[{&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f0000000400)=""/250, 0xfa}, {&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f00000005c0)=""/215, 0xd7}, {&(0x7f00000006c0)=""/94, 0x5e}, {&(0x7f0000000100)}], 0x6, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/180, 0xb4}, {&(0x7f0000000880)=""/187, 0xbb}, {&(0x7f0000000940)=""/36, 0x24}, {&(0x7f0000000980)=""/250, 0xfa}], 0x4, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) sendfile(r0, r3, &(0x7f0000000100)=0x3, 0x1) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) 02:12:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) [ 2278.188361] blktrace: Concurrent blktraces are not allowed on loop6 [ 2278.190526] FAULT_INJECTION: forcing a failure. [ 2278.190526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2278.192588] CPU: 0 PID: 9446 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2278.193663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.194962] Call Trace: [ 2278.195398] dump_stack+0x107/0x167 [ 2278.195987] should_fail.cold+0x5/0xa [ 2278.197177] _copy_from_user+0x2e/0x1b0 [ 2278.197844] __copy_msghdr_from_user+0x91/0x4b0 [ 2278.199401] ? __ia32_sys_shutdown+0x80/0x80 [ 2278.200115] ? ieee802154_sock_release+0xb0/0xb0 [ 2278.201541] ? sock_sendmsg+0x55/0x190 [ 2278.202211] sendmsg_copy_msghdr+0xa1/0x160 [ 2278.203646] ? do_recvmmsg+0x6d0/0x6d0 [ 2278.204292] ? __lock_acquire+0x1657/0x5b00 [ 2278.205818] ___sys_sendmsg+0xc6/0x170 [ 2278.206519] ? sendmsg_copy_msghdr+0x160/0x160 [ 2278.208098] ? __lockdep_reset_lock+0x180/0x180 [ 2278.208872] ? trace_hardirqs_on+0x5b/0x180 [ 2278.210316] ? find_held_lock+0x2c/0x110 [ 2278.211736] ? __might_fault+0xd3/0x180 [ 2278.212361] ? lock_downgrade+0x6d0/0x6d0 [ 2278.213701] ? io_schedule_timeout+0x140/0x140 [ 2278.214493] __sys_sendmmsg+0x195/0x470 [ 2278.215788] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2278.216551] ? lock_downgrade+0x6d0/0x6d0 [ 2278.217974] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2278.218784] ? wait_for_completion+0x270/0x270 [ 2278.220386] ? rcu_read_lock_any_held+0x75/0xa0 [ 2278.221163] ? vfs_write+0x354/0xa30 [ 2278.222424] ? fput_many+0x2f/0x1a0 [ 2278.223037] ? ksys_write+0x1a9/0x260 [ 2278.224317] __x64_sys_sendmmsg+0x99/0x100 [ 2278.225026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2278.226751] do_syscall_64+0x33/0x40 [ 2278.227391] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2278.229057] RIP: 0033:0x7f8542659b19 [ 2278.229697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.231701] blktrace: Concurrent blktraces are not allowed on loop12 [ 2278.235606] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2278.235627] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2278.235637] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2278.235648] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2278.235658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2278.235674] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2278.244771] hpet: Lost 2 RTC interrupts [ 2278.248363] ieee802154 phy0 wpan0: encryption failed: -22 [ 2278.266293] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2278.281197] ieee802154 phy0 wpan0: encryption failed: -22 [ 2278.281295] blktrace: Concurrent blktraces are not allowed on loop12 02:12:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) 02:12:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) [ 2278.294253] FAULT_INJECTION: forcing a failure. [ 2278.294253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2278.297090] CPU: 0 PID: 9457 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2278.299365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.301336] Call Trace: [ 2278.302239] dump_stack+0x107/0x167 [ 2278.303501] should_fail.cold+0x5/0xa [ 2278.304749] _copy_from_user+0x2e/0x1b0 [ 2278.306038] __copy_msghdr_from_user+0x91/0x4b0 [ 2278.307440] ? __ia32_sys_shutdown+0x80/0x80 [ 2278.308872] ? ieee802154_sock_release+0xb0/0xb0 [ 2278.310363] ? sock_sendmsg+0x55/0x190 [ 2278.311617] sendmsg_copy_msghdr+0xa1/0x160 [ 2278.312985] ? do_recvmmsg+0x6d0/0x6d0 [ 2278.314220] ? __lock_acquire+0x1657/0x5b00 [ 2278.315598] ___sys_sendmsg+0xc6/0x170 [ 2278.316828] ? sendmsg_copy_msghdr+0x160/0x160 [ 2278.318329] ? __lockdep_reset_lock+0x180/0x180 [ 2278.319893] ? trace_hardirqs_on+0x5b/0x180 [ 2278.321405] ? find_held_lock+0x2c/0x110 [ 2278.322796] ? __might_fault+0xd3/0x180 [ 2278.324117] ? lock_downgrade+0x6d0/0x6d0 [ 2278.325457] ? io_schedule_timeout+0x140/0x140 [ 2278.327019] __sys_sendmmsg+0x195/0x470 [ 2278.328381] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2278.329711] ? lock_downgrade+0x6d0/0x6d0 [ 2278.331096] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2278.332780] ? wait_for_completion+0x270/0x270 [ 2278.334330] ? rcu_read_lock_any_held+0x75/0xa0 [ 2278.335864] ? vfs_write+0x354/0xa30 [ 2278.337138] ? fput_many+0x2f/0x1a0 [ 2278.338386] ? ksys_write+0x1a9/0x260 [ 2278.339681] __x64_sys_sendmmsg+0x99/0x100 [ 2278.341076] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2278.342750] do_syscall_64+0x33/0x40 [ 2278.343995] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2278.345750] RIP: 0033:0x7f867efe2b19 [ 2278.347010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.353027] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2278.355621] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2278.357766] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2278.359464] blktrace: Concurrent blktraces are not allowed on loop6 [ 2278.359866] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2278.359877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2278.359888] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2278.361445] hpet: Lost 3 RTC interrupts [ 2278.390787] blktrace: Concurrent blktraces are not allowed on loop6 [ 2293.113625] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:12:57 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x12ba, 0x0) [ 2302.274373] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.280279] blktrace: Concurrent blktraces are not allowed on loop12 02:12:57 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 70) 02:12:57 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 70) 02:12:57 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:12:57 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x200000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:12:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:12:57 executing program 5: openat(0xffffffffffffffff, 0x0, 0x0, 0xe1) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x760aa46b, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r1, 0x2, 0x2, 0x6985) r2 = openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x80100, 0x18, 0x2}, 0x18) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="0020000000060000002f66696c653000"]) sendmsg$nl_generic(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x80000000}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r5, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xe1}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r6, 0x80047210, &(0x7f0000000140)) r7 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20402, 0x28, 0x1f}, 0x18) mknodat(r7, &(0x7f0000000200)='./file0\x00', 0x8000, 0x6) close_range(0xffffffffffffffff, r3, 0x2) creat(&(0x7f0000000280)='./file0\x00', 0x3a2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 02:12:57 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x12ba, 0x0) [ 2302.287292] blktrace: Concurrent blktraces are not allowed on loop12 [ 2302.289145] blktrace: Concurrent blktraces are not allowed on loop6 [ 2302.294432] blktrace: Concurrent blktraces are not allowed on loop6 [ 2302.301253] FAULT_INJECTION: forcing a failure. [ 2302.301253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2302.304138] CPU: 1 PID: 9472 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2302.306130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2302.308890] Call Trace: [ 2302.309771] dump_stack+0x107/0x167 [ 2302.311051] should_fail.cold+0x5/0xa [ 2302.312377] _copy_from_user+0x2e/0x1b0 [ 2302.313770] __copy_msghdr_from_user+0x91/0x4b0 [ 2302.315326] ? __ia32_sys_shutdown+0x80/0x80 [ 2302.316957] ? ieee802154_sock_release+0xb0/0xb0 [ 2302.318518] ? sock_sendmsg+0x55/0x190 [ 2302.319793] sendmsg_copy_msghdr+0xa1/0x160 [ 2302.321245] ? do_recvmmsg+0x6d0/0x6d0 [ 2302.322552] ? __lock_acquire+0x1657/0x5b00 [ 2302.323996] ___sys_sendmsg+0xc6/0x170 [ 2302.325248] ? sendmsg_copy_msghdr+0x160/0x160 [ 2302.326761] ? vmacache_find+0x55/0x2a0 [ 2302.328093] ? __lockdep_reset_lock+0x180/0x180 [ 2302.329722] ? find_held_lock+0x2c/0x110 [ 2302.331061] ? __might_fault+0xd3/0x180 [ 2302.332549] ? lock_downgrade+0x6d0/0x6d0 [ 2302.333969] ? asm_exc_page_fault+0x1e/0x30 [ 2302.335450] __sys_sendmmsg+0x195/0x470 [ 2302.336808] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2302.338319] ? lock_downgrade+0x6d0/0x6d0 [ 2302.338951] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2302.339525] ? wait_for_completion+0x270/0x270 [ 2302.340136] ? rcu_read_lock_any_held+0x75/0xa0 [ 2302.340808] ? vfs_write+0x354/0xa30 [ 2302.341319] ? fput_many+0x2f/0x1a0 [ 2302.341751] ? ksys_write+0x1a9/0x260 [ 2302.342313] __x64_sys_sendmmsg+0x99/0x100 [ 2302.342928] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2302.343627] do_syscall_64+0x33/0x40 [ 2302.344077] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2302.344671] RIP: 0033:0x7f8542659b19 [ 2302.345120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.347282] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2302.348487] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2302.349523] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2302.350577] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.351640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2302.352624] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2302.356053] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.358446] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.361029] FAULT_INJECTION: forcing a failure. [ 2302.361029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2302.362869] CPU: 1 PID: 9489 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2302.363984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2302.366142] Call Trace: [ 2302.366916] dump_stack+0x107/0x167 [ 2302.367768] should_fail.cold+0x5/0xa [ 2302.368827] _copy_from_user+0x2e/0x1b0 [ 2302.369924] __copy_msghdr_from_user+0x91/0x4b0 [ 2302.371211] ? __ia32_sys_shutdown+0x80/0x80 [ 2302.372431] ? ieee802154_sock_release+0xb0/0xb0 [ 2302.373736] ? sock_sendmsg+0x55/0x190 02:12:57 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) 02:12:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:12:57 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) [ 2302.374828] sendmsg_copy_msghdr+0xa1/0x160 [ 2302.376186] ? do_recvmmsg+0x6d0/0x6d0 [ 2302.377277] ? __lock_acquire+0x1657/0x5b00 [ 2302.378817] ___sys_sendmsg+0xc6/0x170 [ 2302.379927] ? sendmsg_copy_msghdr+0x160/0x160 [ 2302.381190] ? vmacache_find+0x55/0x2a0 [ 2302.382341] ? __lockdep_reset_lock+0x180/0x180 [ 2302.383644] ? find_held_lock+0x2c/0x110 [ 2302.384854] ? __might_fault+0xd3/0x180 [ 2302.386023] ? lock_downgrade+0x6d0/0x6d0 [ 2302.387200] ? asm_exc_page_fault+0x1e/0x30 [ 2302.388441] __sys_sendmmsg+0x195/0x470 [ 2302.389306] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2302.389903] ? lock_downgrade+0x6d0/0x6d0 [ 2302.390407] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2302.391059] ? wait_for_completion+0x270/0x270 [ 2302.391674] ? rcu_read_lock_any_held+0x75/0xa0 [ 2302.392300] ? vfs_write+0x354/0xa30 [ 2302.392803] ? fput_many+0x2f/0x1a0 [ 2302.393292] ? ksys_write+0x1a9/0x260 [ 2302.393812] __x64_sys_sendmmsg+0x99/0x100 [ 2302.394497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2302.395186] do_syscall_64+0x33/0x40 [ 2302.395690] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2302.396379] RIP: 0033:0x7f867efe2b19 [ 2302.396883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.399345] RSP: 002b:00007f867c537188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2302.400253] RAX: ffffffffffffffda RBX: 00007f867f0f6020 RCX: 00007f867efe2b19 [ 2302.401108] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2302.402013] RBP: 00007f867c5371d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.403548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2302.405163] R13: 00007fffb7ecc00f R14: 00007f867c537300 R15: 0000000000022000 [ 2302.415859] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.454886] blktrace: Concurrent blktraces are not allowed on loop12 [ 2302.461415] blktrace: Concurrent blktraces are not allowed on loop12 02:12:58 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2302.472191] blktrace: Concurrent blktraces are not allowed on loop6 [ 2302.481887] blktrace: Concurrent blktraces are not allowed on loop6 02:12:58 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x400300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:12:58 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 71) 02:12:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) [ 2302.560469] ieee802154 phy0 wpan0: encryption failed: -22 02:12:58 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 71) [ 2302.568665] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.572438] FAULT_INJECTION: forcing a failure. [ 2302.572438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2302.574056] CPU: 1 PID: 9505 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2302.574938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2302.575979] Call Trace: [ 2302.576328] dump_stack+0x107/0x167 [ 2302.576806] should_fail.cold+0x5/0xa [ 2302.577343] _copy_from_user+0x2e/0x1b0 [ 2302.577874] __copy_msghdr_from_user+0x91/0x4b0 [ 2302.578511] ? __ia32_sys_shutdown+0x80/0x80 [ 2302.579108] ? ieee802154_sock_release+0xb0/0xb0 [ 2302.579732] ? sock_sendmsg+0x55/0x190 [ 2302.580238] sendmsg_copy_msghdr+0xa1/0x160 [ 2302.580820] ? do_recvmmsg+0x6d0/0x6d0 [ 2302.581357] ? __lock_acquire+0x1657/0x5b00 [ 2302.582018] ___sys_sendmsg+0xc6/0x170 [ 2302.582565] ? sendmsg_copy_msghdr+0x160/0x160 [ 2302.583191] ? vmacache_find+0x55/0x2a0 [ 2302.583712] ? __lockdep_reset_lock+0x180/0x180 [ 2302.584344] ? find_held_lock+0x2c/0x110 [ 2302.584869] ? __might_fault+0xd3/0x180 [ 2302.585415] ? lock_downgrade+0x6d0/0x6d0 [ 2302.585950] ? asm_exc_page_fault+0x1e/0x30 [ 2302.586554] __sys_sendmmsg+0x195/0x470 [ 2302.587078] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2302.587674] ? lock_downgrade+0x6d0/0x6d0 [ 2302.588256] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2302.588867] ? wait_for_completion+0x270/0x270 [ 2302.589461] ? rcu_read_lock_any_held+0x75/0xa0 [ 2302.590112] ? vfs_write+0x354/0xa30 [ 2302.590695] ? fput_many+0x2f/0x1a0 [ 2302.591264] ? ksys_write+0x1a9/0x260 [ 2302.591836] __x64_sys_sendmmsg+0x99/0x100 [ 2302.592453] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2302.593138] do_syscall_64+0x33/0x40 [ 2302.593654] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2302.594406] RIP: 0033:0x7f867efe2b19 [ 2302.594889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.595117] blktrace: Concurrent blktraces are not allowed on loop12 [ 2302.597224] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2302.597243] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2302.597252] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2302.597261] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.597278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2302.603000] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2302.613745] blktrace: Concurrent blktraces are not allowed on loop12 [ 2302.618329] blktrace: Concurrent blktraces are not allowed on loop6 02:12:58 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) 02:12:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2302.640544] blktrace: Concurrent blktraces are not allowed on loop6 [ 2302.651624] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.666432] ieee802154 phy0 wpan0: encryption failed: -22 [ 2302.668537] FAULT_INJECTION: forcing a failure. [ 2302.668537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2302.670074] CPU: 1 PID: 9518 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2302.670923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2302.671941] Call Trace: [ 2302.672282] dump_stack+0x107/0x167 [ 2302.672771] should_fail.cold+0x5/0xa [ 2302.673279] _copy_from_user+0x2e/0x1b0 [ 2302.673821] __copy_msghdr_from_user+0x91/0x4b0 [ 2302.674535] ? __ia32_sys_shutdown+0x80/0x80 [ 2302.675174] ? ieee802154_sock_release+0xb0/0xb0 [ 2302.675968] ? sock_sendmsg+0x55/0x190 [ 2302.676630] sendmsg_copy_msghdr+0xa1/0x160 [ 2302.677239] ? do_recvmmsg+0x6d0/0x6d0 [ 2302.677788] ? __lock_acquire+0x1657/0x5b00 [ 2302.678416] ___sys_sendmsg+0xc6/0x170 [ 2302.678954] ? sendmsg_copy_msghdr+0x160/0x160 [ 2302.679600] ? vmacache_find+0x55/0x2a0 [ 2302.680176] ? __lockdep_reset_lock+0x180/0x180 [ 2302.680856] ? find_held_lock+0x2c/0x110 [ 2302.681460] ? __might_fault+0xd3/0x180 [ 2302.682019] ? lock_downgrade+0x6d0/0x6d0 [ 2302.682640] ? asm_exc_page_fault+0x1e/0x30 [ 2302.683314] __sys_sendmmsg+0x195/0x470 [ 2302.683885] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2302.684511] ? lock_downgrade+0x6d0/0x6d0 [ 2302.685872] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2302.686588] ? wait_for_completion+0x270/0x270 [ 2302.687288] ? rcu_read_lock_any_held+0x75/0xa0 [ 2302.688185] ? vfs_write+0x354/0xa30 [ 2302.688747] ? fput_many+0x2f/0x1a0 [ 2302.689291] ? ksys_write+0x1a9/0x260 [ 2302.689876] __x64_sys_sendmmsg+0x99/0x100 [ 2302.690452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2302.691186] do_syscall_64+0x33/0x40 [ 2302.691743] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2302.692477] RIP: 0033:0x7f8542659b19 [ 2302.693086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2302.695739] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2302.696825] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2302.697851] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2302.698923] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2302.699933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2302.700960] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2316.897968] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:13:21 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:13:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:13:21 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 72) 02:13:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200), 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_I_TEI={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010101}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x10, 0x70bd29, 0x1f, {}, [@GTPA_TID={0xc}, @GTPA_VERSION={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newspdinfo={0x2c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH, @XFRMA_SPD_IPV4_HTHRESH, @XFRMA_SPD_IPV6_HTHRESH={0x3}]}, 0x2c}}, 0x0) 02:13:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) 02:13:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) 02:13:21 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe0ffff, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:13:21 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 72) [ 2325.487481] blktrace: Concurrent blktraces are not allowed on loop6 [ 2325.504004] blktrace: Concurrent blktraces are not allowed on loop12 [ 2325.525116] blktrace: Concurrent blktraces are not allowed on loop12 [ 2325.528703] ieee802154 phy0 wpan0: encryption failed: -22 [ 2325.535723] ieee802154 phy0 wpan0: encryption failed: -22 [ 2325.538305] ieee802154 phy0 wpan0: encryption failed: -22 [ 2325.544458] FAULT_INJECTION: forcing a failure. [ 2325.544458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2325.547071] CPU: 1 PID: 9537 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2325.548591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.550320] Call Trace: [ 2325.550915] dump_stack+0x107/0x167 [ 2325.551792] should_fail.cold+0x5/0xa [ 2325.552647] _copy_from_user+0x2e/0x1b0 [ 2325.553529] __copy_msghdr_from_user+0x91/0x4b0 [ 2325.554617] ? __ia32_sys_shutdown+0x80/0x80 [ 2325.555599] ? ieee802154_sock_release+0xb0/0xb0 [ 2325.556672] ? sock_sendmsg+0x55/0x190 [ 2325.557561] sendmsg_copy_msghdr+0xa1/0x160 [ 2325.558564] ? do_recvmmsg+0x6d0/0x6d0 [ 2325.559439] ? __lock_acquire+0x1657/0x5b00 [ 2325.560433] ___sys_sendmsg+0xc6/0x170 [ 2325.561296] ? sendmsg_copy_msghdr+0x160/0x160 [ 2325.562255] ? vmacache_find+0x55/0x2a0 [ 2325.563090] ? __lockdep_reset_lock+0x180/0x180 [ 2325.564138] ? find_held_lock+0x2c/0x110 [ 2325.564991] ? __might_fault+0xd3/0x180 [ 2325.565805] ? lock_downgrade+0x6d0/0x6d0 [ 2325.566775] ? asm_exc_page_fault+0x1e/0x30 [ 2325.567764] __sys_sendmmsg+0x195/0x470 [ 2325.568690] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2325.569590] ? lock_downgrade+0x6d0/0x6d0 [ 2325.570601] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2325.571676] ? wait_for_completion+0x270/0x270 [ 2325.572688] ? rcu_read_lock_any_held+0x75/0xa0 [ 2325.573749] ? vfs_write+0x354/0xa30 [ 2325.574640] ? fput_many+0x2f/0x1a0 [ 2325.575430] ? ksys_write+0x1a9/0x260 [ 2325.576321] __x64_sys_sendmmsg+0x99/0x100 [ 2325.577296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2325.578459] do_syscall_64+0x33/0x40 [ 2325.579317] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2325.580471] RIP: 0033:0x7f8542659b19 [ 2325.581325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.585475] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2325.587160] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2325.588726] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2325.590289] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.591920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2325.593481] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2325.621553] FAULT_INJECTION: forcing a failure. [ 2325.621553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2325.623973] CPU: 1 PID: 9540 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2325.625361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.627072] Call Trace: [ 2325.627615] dump_stack+0x107/0x167 [ 2325.628360] should_fail.cold+0x5/0xa [ 2325.629206] _copy_from_user+0x2e/0x1b0 [ 2325.630027] __copy_msghdr_from_user+0x91/0x4b0 [ 2325.630994] ? __ia32_sys_shutdown+0x80/0x80 [ 2325.632004] ? ieee802154_sock_release+0xb0/0xb0 [ 2325.633038] ? sock_sendmsg+0x55/0x190 [ 2325.633864] sendmsg_copy_msghdr+0xa1/0x160 [ 2325.634768] ? do_recvmmsg+0x6d0/0x6d0 [ 2325.635598] ? __lock_acquire+0x1657/0x5b00 [ 2325.636569] ___sys_sendmsg+0xc6/0x170 [ 2325.637431] ? sendmsg_copy_msghdr+0x160/0x160 [ 2325.638374] ? vmacache_find+0x55/0x2a0 [ 2325.639216] ? __lockdep_reset_lock+0x180/0x180 [ 2325.640178] ? find_held_lock+0x2c/0x110 [ 2325.641018] ? __might_fault+0xd3/0x180 [ 2325.641831] ? lock_downgrade+0x6d0/0x6d0 [ 2325.642695] ? asm_exc_page_fault+0x1e/0x30 02:13:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) [ 2325.643700] __sys_sendmmsg+0x195/0x470 [ 2325.644574] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2325.645464] ? lock_downgrade+0x6d0/0x6d0 [ 2325.646332] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2325.647338] ? wait_for_completion+0x270/0x270 [ 2325.648280] ? rcu_read_lock_any_held+0x75/0xa0 [ 2325.649233] ? vfs_write+0x354/0xa30 [ 2325.649994] ? fput_many+0x2f/0x1a0 [ 2325.650750] ? ksys_write+0x1a9/0x260 [ 2325.651540] __x64_sys_sendmmsg+0x99/0x100 [ 2325.652401] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2325.653454] do_syscall_64+0x33/0x40 [ 2325.654223] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2325.655277] RIP: 0033:0x7f867efe2b19 [ 2325.656043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.659831] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2325.661442] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2325.662924] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2325.664400] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.665866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2325.667369] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2325.672247] blktrace: Concurrent blktraces are not allowed on loop12 [ 2325.682948] blktrace: Concurrent blktraces are not allowed on loop12 [ 2325.689242] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 02:13:21 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 73) 02:13:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) [ 2325.729169] ieee802154 phy0 wpan0: encryption failed: -22 02:13:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:13:21 executing program 2: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:13:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) [ 2325.813339] ieee802154 phy0 wpan0: encryption failed: -22 02:13:21 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2325.821887] blktrace: Concurrent blktraces are not allowed on loop6 [ 2325.826417] FAULT_INJECTION: forcing a failure. [ 2325.826417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2325.828922] CPU: 0 PID: 9553 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2325.830340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.831566] blktrace: Concurrent blktraces are not allowed on loop6 [ 2325.832138] Call Trace: [ 2325.832172] dump_stack+0x107/0x167 [ 2325.832208] should_fail.cold+0x5/0xa [ 2325.835628] _copy_from_user+0x2e/0x1b0 [ 2325.836481] __copy_msghdr_from_user+0x91/0x4b0 [ 2325.837483] ? __ia32_sys_shutdown+0x80/0x80 [ 2325.838411] ? ieee802154_sock_release+0xb0/0xb0 [ 2325.839440] ? sock_sendmsg+0x55/0x190 [ 2325.840261] sendmsg_copy_msghdr+0xa1/0x160 [ 2325.841153] ? do_recvmmsg+0x6d0/0x6d0 [ 2325.841968] ? __lock_acquire+0x1657/0x5b00 [ 2325.842903] ___sys_sendmsg+0xc6/0x170 [ 2325.843712] ? sendmsg_copy_msghdr+0x160/0x160 [ 2325.844659] ? vmacache_find+0x55/0x2a0 [ 2325.845494] ? __lockdep_reset_lock+0x180/0x180 [ 2325.846487] ? find_held_lock+0x2c/0x110 [ 2325.847370] ? __might_fault+0xd3/0x180 [ 2325.848193] ? lock_downgrade+0x6d0/0x6d0 [ 2325.849047] ? asm_exc_page_fault+0x1e/0x30 [ 2325.849992] __sys_sendmmsg+0x195/0x470 [ 2325.850852] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2325.851746] ? lock_downgrade+0x6d0/0x6d0 [ 2325.852645] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2325.853649] ? wait_for_completion+0x270/0x270 [ 2325.854607] ? rcu_read_lock_any_held+0x75/0xa0 [ 2325.855566] ? vfs_write+0x354/0xa30 [ 2325.856348] ? fput_many+0x2f/0x1a0 [ 2325.857113] ? ksys_write+0x1a9/0x260 [ 2325.857930] __x64_sys_sendmmsg+0x99/0x100 [ 2325.858834] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2325.859897] do_syscall_64+0x33/0x40 [ 2325.860668] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2325.861722] RIP: 0033:0x7f8542659b19 [ 2325.862494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.866252] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2325.867846] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2325.869311] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2325.870479] blktrace: Concurrent blktraces are not allowed on loop12 [ 2325.870837] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.870852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2325.870866] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2325.871168] hpet: Lost 2 RTC interrupts [ 2325.890137] blktrace: Concurrent blktraces are not allowed on loop12 02:13:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e36383530363930383600"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040000c00000000000000dbf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000004700000000000000", 0x20, 0x560}, {&(0x7f0000010300)="02000000030000000400000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dbf4655fdbf4655fdbf4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2080}, {&(0x7f0000011600)="8081000000601020dbf4655fdbf4655fdbf4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000", 0x60, 0x2300}, {&(0x7f0000011700)="c041000000400000dbf4655fdbf4655fdbf4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2500}, {&(0x7f0000011800)="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"/768, 0x300, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000011d00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000011e00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000011f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012000)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012400)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033340075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012500)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000012600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000012b00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000012c00)="000002ea0100000001000000270f240c000000000000000000000000000000000601f8070000000006000000779b539778617474723100000601f00700000000060000007498539778617474723200"/96, 0x60, 0x40000}, {&(0x7f0000012d00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x407e0}, {&(0x7f0000012e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x50000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00']) 02:13:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) [ 2325.917460] ieee802154 phy0 wpan0: encryption failed: -22 02:13:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:13:21 executing program 2: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2325.975580] ieee802154 phy0 wpan0: encryption failed: -22 02:13:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) 02:13:21 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 73) [ 2325.995098] blktrace: Concurrent blktraces are not allowed on loop6 [ 2326.003595] blktrace: Concurrent blktraces are not allowed on loop6 [ 2326.056388] ieee802154 phy0 wpan0: encryption failed: -22 [ 2326.062788] FAULT_INJECTION: forcing a failure. 02:13:21 executing program 5: geteuid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@empty, 0x0}, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = socket$nl_generic(0x10, 0x3, 0x10) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x14010, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@access_client}], [{@smackfsdef={'smackfsdef', 0x3d, 'port'}}, {@smackfshat={'smackfshat', 0x3d, 'team0\x00'}}, {@subj_type={'subj_type', 0x3d, '\x00'}}]}}) fstat(r3, &(0x7f00000001c0)) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00db8d25205a000030003d01000000000000000000000000080006"], 0x1c}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000640)={'sit0\x00', r0, 0x29, 0x1, 0x2, 0x4, 0x10, @mcast1, @mcast1, 0x8000, 0x1, 0x4, 0x40}}) setresuid(0xffffffffffffffff, 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_any}], [{@uid_eq}, {@obj_user={'obj_user', 0x3d, '@{%]}}6!&'}}]}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000400), 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1f, 0x5, 0xe4, 0xff, 0x0, 0x5, 0x10000, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000440), 0x4}, 0x11000, 0x2, 0x2, 0x4, 0x1ff, 0x1, 0x101, 0x0, 0x3, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xf, r1, 0x9) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000111}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2326.062788] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2326.065431] CPU: 1 PID: 9577 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2326.066912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.068604] Call Trace: [ 2326.069156] dump_stack+0x107/0x167 [ 2326.069912] should_fail.cold+0x5/0xa [ 2326.070714] _copy_from_user+0x2e/0x1b0 [ 2326.071533] __copy_msghdr_from_user+0x91/0x4b0 [ 2326.072481] ? __ia32_sys_shutdown+0x80/0x80 [ 2326.073386] ? ieee802154_sock_release+0xb0/0xb0 [ 2326.074342] ? sock_sendmsg+0x55/0x190 [ 2326.075153] sendmsg_copy_msghdr+0xa1/0x160 [ 2326.076033] ? do_recvmmsg+0x6d0/0x6d0 [ 2326.076833] ? __lock_acquire+0x1657/0x5b00 [ 2326.076907] blktrace: Concurrent blktraces are not allowed on loop12 [ 2326.077720] ___sys_sendmsg+0xc6/0x170 [ 2326.077743] ? sendmsg_copy_msghdr+0x160/0x160 [ 2326.080762] ? vmacache_find+0x55/0x2a0 [ 2326.081587] ? __lockdep_reset_lock+0x180/0x180 [ 2326.082597] ? find_held_lock+0x2c/0x110 [ 2326.083440] ? __might_fault+0xd3/0x180 [ 2326.084255] ? lock_downgrade+0x6d0/0x6d0 [ 2326.085095] ? asm_exc_page_fault+0x1e/0x30 [ 2326.086004] __sys_sendmmsg+0x195/0x470 [ 2326.086838] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2326.087722] ? lock_downgrade+0x6d0/0x6d0 [ 2326.088589] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2326.089583] ? wait_for_completion+0x270/0x270 [ 2326.090508] ? rcu_read_lock_any_held+0x75/0xa0 [ 2326.091477] ? vfs_write+0x354/0xa30 [ 2326.092248] ? fput_many+0x2f/0x1a0 [ 2326.093002] ? ksys_write+0x1a9/0x260 [ 2326.093798] __x64_sys_sendmmsg+0x99/0x100 [ 2326.094680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2326.095737] do_syscall_64+0x33/0x40 [ 2326.096493] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2326.097545] RIP: 0033:0x7f867efe2b19 02:13:21 executing program 2: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2326.098364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2326.102203] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2326.103772] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2326.105198] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2326.106677] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2326.108108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2326.109565] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:13:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) [ 2326.114581] blktrace: Concurrent blktraces are not allowed on loop12 02:13:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2326.167929] blktrace: Concurrent blktraces are not allowed on loop6 [ 2326.174001] blktrace: Concurrent blktraces are not allowed on loop6 [ 2342.565162] kmemleak: 42 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:13:48 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 74) 02:13:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:13:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 02:13:48 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:13:48 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) 02:13:48 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:13:48 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) 02:13:48 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 74) [ 2352.898686] ieee802154 phy0 wpan0: encryption failed: -22 [ 2352.909626] blktrace: Concurrent blktraces are not allowed on loop12 [ 2352.911307] ieee802154 phy0 wpan0: encryption failed: -22 [ 2352.912442] blktrace: Concurrent blktraces are not allowed on loop6 [ 2352.913219] blktrace: Concurrent blktraces are not allowed on loop6 [ 2352.918458] ieee802154 phy0 wpan0: encryption failed: -22 [ 2352.920807] FAULT_INJECTION: forcing a failure. [ 2352.920807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2352.923276] CPU: 0 PID: 9604 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2352.924680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.925458] blktrace: Concurrent blktraces are not allowed on loop12 [ 2352.926415] Call Trace: [ 2352.926447] dump_stack+0x107/0x167 [ 2352.926489] should_fail.cold+0x5/0xa [ 2352.929859] _copy_from_user+0x2e/0x1b0 [ 2352.930698] __copy_msghdr_from_user+0x91/0x4b0 [ 2352.931668] ? __ia32_sys_shutdown+0x80/0x80 [ 2352.932594] ? ieee802154_sock_release+0xb0/0xb0 [ 2352.933575] ? sock_sendmsg+0x55/0x190 [ 2352.934400] sendmsg_copy_msghdr+0xa1/0x160 [ 2352.935308] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.936124] ? __lock_acquire+0x1657/0x5b00 [ 2352.936144] FAULT_INJECTION: forcing a failure. [ 2352.936144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2352.939371] ___sys_sendmsg+0xc6/0x170 [ 2352.940183] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.941119] ? vmacache_find+0x55/0x2a0 [ 2352.941950] ? __lockdep_reset_lock+0x180/0x180 [ 2352.942956] ? find_held_lock+0x2c/0x110 [ 2352.943814] ? __might_fault+0xd3/0x180 [ 2352.944640] ? lock_downgrade+0x6d0/0x6d0 [ 2352.945496] ? asm_exc_page_fault+0x1e/0x30 [ 2352.946436] __sys_sendmmsg+0x195/0x470 [ 2352.947283] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2352.948174] ? lock_downgrade+0x6d0/0x6d0 [ 2352.949071] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2352.950076] ? wait_for_completion+0x270/0x270 [ 2352.951033] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.951988] ? vfs_write+0x354/0xa30 [ 2352.952770] ? fput_many+0x2f/0x1a0 [ 2352.953528] ? ksys_write+0x1a9/0x260 [ 2352.954341] __x64_sys_sendmmsg+0x99/0x100 [ 2352.955237] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2352.956304] do_syscall_64+0x33/0x40 [ 2352.957077] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2352.958132] RIP: 0033:0x7f8542659b19 [ 2352.958914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.962684] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2352.964260] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2352.965724] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2352.967205] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.968669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2352.970135] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2352.971671] CPU: 1 PID: 9612 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2352.971955] hpet: Lost 2 RTC interrupts [ 2352.973163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2352.973177] Call Trace: [ 2352.976248] dump_stack+0x107/0x167 [ 2352.977004] should_fail.cold+0x5/0xa [ 2352.977796] _copy_from_user+0x2e/0x1b0 [ 2352.978615] __copy_msghdr_from_user+0x91/0x4b0 [ 2352.979575] ? __ia32_sys_shutdown+0x80/0x80 [ 2352.980482] ? ieee802154_sock_release+0xb0/0xb0 [ 2352.981457] ? sock_sendmsg+0x55/0x190 [ 2352.982260] sendmsg_copy_msghdr+0xa1/0x160 [ 2352.983146] ? do_recvmmsg+0x6d0/0x6d0 [ 2352.983948] ? __lock_acquire+0x1657/0x5b00 [ 2352.984848] ___sys_sendmsg+0xc6/0x170 [ 2352.985646] ? sendmsg_copy_msghdr+0x160/0x160 [ 2352.986576] ? vmacache_find+0x55/0x2a0 [ 2352.987410] ? __lockdep_reset_lock+0x180/0x180 [ 2352.988372] ? find_held_lock+0x2c/0x110 [ 2352.989259] ? __might_fault+0xd3/0x180 [ 2352.990071] ? lock_downgrade+0x6d0/0x6d0 [ 2352.990965] ? asm_exc_page_fault+0x1e/0x30 [ 2352.991889] __sys_sendmmsg+0x195/0x470 [ 2352.992701] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2352.993577] ? lock_downgrade+0x6d0/0x6d0 [ 2352.994433] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2352.995444] ? wait_for_completion+0x270/0x270 [ 2352.996363] ? rcu_read_lock_any_held+0x75/0xa0 [ 2352.997338] ? vfs_write+0x354/0xa30 [ 2352.998092] ? fput_many+0x2f/0x1a0 [ 2352.998848] ? ksys_write+0x1a9/0x260 [ 2352.999640] __x64_sys_sendmmsg+0x99/0x100 [ 2353.000505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2353.001015] ieee802154 phy0 wpan0: encryption failed: -22 [ 2353.001545] do_syscall_64+0x33/0x40 [ 2353.003431] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2353.004499] RIP: 0033:0x7f867efe2b19 [ 2353.005254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2353.008944] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2353.010476] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2353.011911] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2353.013347] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2353.014777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2353.016227] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:13:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:13:48 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:13:48 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) 02:13:48 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) [ 2353.180505] blktrace: Concurrent blktraces are not allowed on loop6 [ 2353.188277] blktrace: Concurrent blktraces are not allowed on loop12 [ 2353.195044] blktrace: Concurrent blktraces are not allowed on loop6 [ 2353.198554] blktrace: Concurrent blktraces are not allowed on loop12 [ 2370.139931] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:14:13 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 75) 02:14:13 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) 02:14:13 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) 02:14:13 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:14:13 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:14:13 executing program 5: pipe2(&(0x7f0000001080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$evdev(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x9840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x800}, 0x0, 0x0, 0xfffffffd, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/diskstats\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x38002, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x9, 0xc}, 0x800, 0x40, 0x10000, 0x5, 0x0, 0xff, 0x8, 0x0, 0x800, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0xa) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4}) fcntl$setstatus(r4, 0x4, 0x2800) 02:14:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:14:13 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 75) [ 2378.275747] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.277835] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.283309] blktrace: Concurrent blktraces are not allowed on loop12 [ 2378.283838] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.287778] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.289178] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.291666] blktrace: Concurrent blktraces are not allowed on loop12 [ 2378.293191] FAULT_INJECTION: forcing a failure. [ 2378.293191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2378.293213] CPU: 1 PID: 9639 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2378.293233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.298879] Call Trace: [ 2378.299443] dump_stack+0x107/0x167 [ 2378.300185] should_fail.cold+0x5/0xa [ 2378.300960] _copy_from_user+0x2e/0x1b0 [ 2378.301864] __copy_msghdr_from_user+0x91/0x4b0 [ 2378.302803] ? __ia32_sys_shutdown+0x80/0x80 [ 2378.303710] ? ieee802154_sock_release+0xb0/0xb0 [ 2378.304667] ? sock_sendmsg+0x55/0x190 [ 2378.305459] sendmsg_copy_msghdr+0xa1/0x160 [ 2378.306326] ? do_recvmmsg+0x6d0/0x6d0 [ 2378.307118] ? __lock_acquire+0x1657/0x5b00 [ 2378.308012] ___sys_sendmsg+0xc6/0x170 [ 2378.308799] ? sendmsg_copy_msghdr+0x160/0x160 [ 2378.309716] ? vmacache_find+0x55/0x2a0 [ 2378.310520] ? __lockdep_reset_lock+0x180/0x180 [ 2378.311488] ? find_held_lock+0x2c/0x110 [ 2378.312314] ? __might_fault+0xd3/0x180 [ 2378.313116] ? lock_downgrade+0x6d0/0x6d0 [ 2378.313951] ? asm_exc_page_fault+0x1e/0x30 [ 2378.314841] __sys_sendmmsg+0x195/0x470 [ 2378.315663] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2378.316533] ? lock_downgrade+0x6d0/0x6d0 [ 2378.317471] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.318445] ? wait_for_completion+0x270/0x270 [ 2378.319389] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.320323] ? vfs_write+0x354/0xa30 [ 2378.321079] ? fput_many+0x2f/0x1a0 [ 2378.321815] ? ksys_write+0x1a9/0x260 [ 2378.322596] __x64_sys_sendmmsg+0x99/0x100 [ 2378.323461] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.324500] do_syscall_64+0x33/0x40 [ 2378.325256] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.326312] RIP: 0033:0x7f867efe2b19 [ 2378.327080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.330867] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2378.332437] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2378.333971] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2378.335435] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.336882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.338329] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2378.347144] FAULT_INJECTION: forcing a failure. [ 2378.347144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2378.349785] CPU: 1 PID: 9642 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2378.351187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.352910] Call Trace: [ 2378.353455] dump_stack+0x107/0x167 [ 2378.354216] should_fail.cold+0x5/0xa [ 2378.355028] _copy_from_user+0x2e/0x1b0 [ 2378.355864] __copy_msghdr_from_user+0x91/0x4b0 [ 2378.356825] ? __ia32_sys_shutdown+0x80/0x80 [ 2378.357746] ? ieee802154_sock_release+0xb0/0xb0 [ 2378.358728] ? sock_sendmsg+0x55/0x190 [ 2378.359561] sendmsg_copy_msghdr+0xa1/0x160 [ 2378.360451] ? do_recvmmsg+0x6d0/0x6d0 [ 2378.361271] ? __lock_acquire+0x1657/0x5b00 [ 2378.362193] ___sys_sendmsg+0xc6/0x170 [ 2378.363002] ? sendmsg_copy_msghdr+0x160/0x160 [ 2378.363946] ? vmacache_find+0x55/0x2a0 [ 2378.364821] ? __lockdep_reset_lock+0x180/0x180 [ 2378.365803] ? find_held_lock+0x2c/0x110 [ 2378.366653] ? __might_fault+0xd3/0x180 [ 2378.367493] ? lock_downgrade+0x6d0/0x6d0 [ 2378.368347] ? asm_exc_page_fault+0x1e/0x30 [ 2378.369284] __sys_sendmmsg+0x195/0x470 [ 2378.370134] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2378.371024] ? lock_downgrade+0x6d0/0x6d0 [ 2378.371928] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.372935] ? wait_for_completion+0x270/0x270 [ 2378.373880] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.374834] ? vfs_write+0x354/0xa30 [ 2378.375631] ? fput_many+0x2f/0x1a0 [ 2378.376386] ? ksys_write+0x1a9/0x260 [ 2378.377193] __x64_sys_sendmmsg+0x99/0x100 [ 2378.378064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.379115] do_syscall_64+0x33/0x40 [ 2378.379943] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.381009] RIP: 0033:0x7f8542659b19 [ 2378.381770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.385516] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2378.387066] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2378.388561] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2378.390024] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.391515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.392989] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:14:13 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) 02:14:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000004800010000000000000000000a00000008000000", @ANYRES32=0x0, @ANYBLOB="ae08dbec42ebe31b331a15cbd0c926caa000ce4257ed6637d8df41bb144e7d40cd4a2888af7df8710ed4d3ff0fdad99ae9f303dd503b9c42e40d73779f029f75b8f5fe9b8237abdb0efde9e4e557bcede3318f62ac62cb4463f9cb3651127b40761bed2913449db7954c280fb4a7786c239575aa183752636f7692c3389b90b356ea531891492ee94cce01fd"], 0x1c}}, 0x0) r1 = socket(0x26, 0x800, 0x4) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4002}, 0x4000000) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x20101, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0xf7}}, './file0\x00'}) setresuid(0xffffffffffffffff, r2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'sit0\x00'}) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r4, 0x0) fork() r5 = accept4(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000000)=0x80, 0x180800) dup2(r5, 0xffffffffffffffff) 02:14:13 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) 02:14:13 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:14:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:14:14 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2378.462165] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.474593] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.495989] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.508128] blktrace: Concurrent blktraces are not allowed on loop12 [ 2378.517756] blktrace: Concurrent blktraces are not allowed on loop12 02:14:14 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 76) 02:14:14 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 76) 02:14:14 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) 02:14:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:14:14 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) [ 2378.656087] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.658853] ieee802154 phy0 wpan0: encryption failed: -22 [ 2378.663217] FAULT_INJECTION: forcing a failure. [ 2378.663217] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2378.665808] CPU: 1 PID: 9669 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2378.667214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.668939] Call Trace: [ 2378.669497] dump_stack+0x107/0x167 [ 2378.670256] should_fail.cold+0x5/0xa [ 2378.671053] _copy_from_user+0x2e/0x1b0 [ 2378.671888] __copy_msghdr_from_user+0x91/0x4b0 [ 2378.672843] ? __ia32_sys_shutdown+0x80/0x80 [ 2378.673762] ? ieee802154_sock_release+0xb0/0xb0 [ 2378.674732] ? sock_sendmsg+0x55/0x190 [ 2378.675552] sendmsg_copy_msghdr+0xa1/0x160 [ 2378.676435] ? do_recvmmsg+0x6d0/0x6d0 [ 2378.677357] ? __lock_acquire+0x1657/0x5b00 [ 2378.678289] ___sys_sendmsg+0xc6/0x170 [ 2378.679106] ? sendmsg_copy_msghdr+0x160/0x160 [ 2378.680060] ? vmacache_find+0x55/0x2a0 [ 2378.680902] ? __lockdep_reset_lock+0x180/0x180 [ 2378.681892] ? find_held_lock+0x2c/0x110 [ 2378.682753] ? __might_fault+0xd3/0x180 [ 2378.683585] ? lock_downgrade+0x6d0/0x6d0 [ 2378.684449] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2378.685596] __sys_sendmmsg+0x195/0x470 [ 2378.686412] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2378.687293] ? lock_downgrade+0x6d0/0x6d0 [ 2378.687352] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.688196] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.688230] ? wait_for_completion+0x270/0x270 [ 2378.691613] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.692637] ? vfs_write+0x354/0xa30 [ 2378.693394] ? fput_many+0x2f/0x1a0 [ 2378.694132] ? ksys_write+0x1a9/0x260 [ 2378.694922] __x64_sys_sendmmsg+0x99/0x100 [ 2378.695798] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.696832] do_syscall_64+0x33/0x40 [ 2378.697579] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.698594] RIP: 0033:0x7f8542659b19 [ 2378.699355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.701309] blktrace: Concurrent blktraces are not allowed on loop6 [ 2378.703112] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2378.703139] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2378.703153] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2378.703167] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.703187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.711979] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2378.725424] FAULT_INJECTION: forcing a failure. [ 2378.725424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2378.727966] CPU: 1 PID: 9670 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2378.729380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.731081] Call Trace: [ 2378.731641] dump_stack+0x107/0x167 [ 2378.732391] should_fail.cold+0x5/0xa [ 2378.733179] _copy_from_user+0x2e/0x1b0 [ 2378.733998] __copy_msghdr_from_user+0x91/0x4b0 [ 2378.734945] ? __ia32_sys_shutdown+0x80/0x80 [ 2378.735873] ? ieee802154_sock_release+0xb0/0xb0 [ 2378.736841] ? sock_sendmsg+0x55/0x190 [ 2378.737647] sendmsg_copy_msghdr+0xa1/0x160 [ 2378.738527] ? do_recvmmsg+0x6d0/0x6d0 [ 2378.739404] ? __lock_acquire+0x1657/0x5b00 [ 2378.740298] ___sys_sendmsg+0xc6/0x170 [ 2378.741118] ? sendmsg_copy_msghdr+0x160/0x160 [ 2378.742043] ? vmacache_find+0x55/0x2a0 [ 2378.742861] ? __lockdep_reset_lock+0x180/0x180 [ 2378.743842] ? find_held_lock+0x2c/0x110 [ 2378.744675] ? __might_fault+0xd3/0x180 [ 2378.745486] ? lock_downgrade+0x6d0/0x6d0 [ 2378.746333] ? asm_exc_page_fault+0x1e/0x30 [ 2378.747248] __sys_sendmmsg+0x195/0x470 [ 2378.747386] blktrace: Concurrent blktraces are not allowed on loop12 [ 2378.748069] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2378.748090] ? lock_downgrade+0x6d0/0x6d0 [ 2378.748131] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2378.752075] ? wait_for_completion+0x270/0x270 [ 2378.753014] ? rcu_read_lock_any_held+0x75/0xa0 [ 2378.753947] ? vfs_write+0x354/0xa30 [ 2378.754790] ? fput_many+0x2f/0x1a0 [ 2378.755536] ? ksys_write+0x1a9/0x260 [ 2378.756332] __x64_sys_sendmmsg+0x99/0x100 [ 2378.757188] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.758243] do_syscall_64+0x33/0x40 [ 2378.758993] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.760048] RIP: 0033:0x7f867efe2b19 [ 2378.760808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.764534] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2378.766074] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2378.766905] blktrace: Concurrent blktraces are not allowed on loop12 [ 2378.767528] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2378.767541] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.767553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2378.767565] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2392.978129] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2403.884848] ieee802154 phy0 wpan0: encryption failed: -22 02:14:39 executing program 5: [ 2403.911432] FAULT_INJECTION: forcing a failure. [ 2403.911432] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2403.912608] blktrace: Concurrent blktraces are not allowed on loop6 [ 2403.913863] CPU: 0 PID: 9700 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2403.916671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.917771] ieee802154 phy0 wpan0: encryption failed: -22 [ 2403.918353] Call Trace: [ 2403.918385] dump_stack+0x107/0x167 [ 2403.920834] should_fail.cold+0x5/0xa [ 2403.921619] _copy_from_user+0x2e/0x1b0 [ 2403.922438] tcp_setsockopt+0x120b/0x2690 [ 2403.923294] ? tcp_sock_set_keepidle+0x40/0x40 [ 2403.924244] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2403.925332] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2403.926473] ? __fget_files+0x296/0x480 [ 2403.927330] ? selinux_socket_setsockopt+0x6a/0x80 [ 2403.928349] ? sock_common_setsockopt+0x2b/0x100 [ 2403.929315] __sys_setsockopt+0x180/0x2b0 [ 2403.930157] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2403.931083] ? __ia32_sys_recv+0x100/0x100 [ 2403.931968] FAULT_INJECTION: forcing a failure. [ 2403.931968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2403.931988] ? fput_many+0x2f/0x1a0 [ 2403.932015] ? ksys_write+0x1a9/0x260 [ 2403.935996] __x64_sys_setsockopt+0xba/0x160 [ 2403.936894] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2403.937938] do_syscall_64+0x33/0x40 [ 2403.938700] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2403.939769] RIP: 0033:0x7f8f9b255b19 [ 2403.940532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.944265] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2403.945900] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2403.947467] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2403.949048] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2403.950568] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2403.952091] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 [ 2403.953634] CPU: 1 PID: 9697 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2403.953771] hpet: Lost 1 RTC interrupts [ 2403.955452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.958416] Call Trace: [ 2403.959076] dump_stack+0x107/0x167 [ 2403.959999] should_fail.cold+0x5/0xa [ 2403.960953] _copy_from_user+0x2e/0x1b0 [ 2403.961941] __copy_msghdr_from_user+0x91/0x4b0 [ 2403.963082] ? __ia32_sys_shutdown+0x80/0x80 [ 2403.964203] ? ieee802154_sock_release+0xb0/0xb0 [ 2403.964793] blktrace: Concurrent blktraces are not allowed on loop6 [ 2403.965247] ? sock_sendmsg+0x55/0x190 [ 2403.967389] sendmsg_copy_msghdr+0xa1/0x160 [ 2403.968341] ? do_recvmmsg+0x6d0/0x6d0 [ 2403.969207] ? __lock_acquire+0x1657/0x5b00 [ 2403.970186] ___sys_sendmsg+0xc6/0x170 [ 2403.971045] ? sendmsg_copy_msghdr+0x160/0x160 [ 2403.972063] ? vmacache_find+0x55/0x2a0 [ 2403.972947] ? __lockdep_reset_lock+0x180/0x180 [ 2403.974078] ? find_held_lock+0x2c/0x110 [ 2403.974992] ? __might_fault+0xd3/0x180 [ 2403.975881] ? lock_downgrade+0x6d0/0x6d0 syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000023c0)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}, {&(0x7f0000002500)="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", 0x1020, 0xffffffffffffff7f}, {&(0x7f0000001180)="68bba8d421ec928844201d7ada9c5866ceba71ee6d8178a1c7369f99491ca251e4ce93d067ec5f31ba55d2965e8432f461d3b4e50d0a3e055a6f6f4d80dd4c70aa88375088733bf8f0863f1a5ef41039937bce07a72c738574faba4123e4f6a26c55a647fdc58cd79ea13b0b692fa22dbd0b632327b0f78fe2d0d23e2f62408a175500895981a3b43089ee58478e7b67", 0x90, 0x7}, {&(0x7f0000001240)="05f97fc0157975bc5bd8b65b82e5789b2c9de17fb35f46112f282973e2323f7e88d9f4c996eaeec239d75cd6ddb7db82d4a4087db72b5ac5e4ff99c119920006f4142d44dc3afbb4493f176d305bdbdde9a3fa207390cc2c2777e8971b6af85cc21a404189f3eaab41314be907b7eb23310dab2a0a222029d4fcba9b972cc3348ed9e7f5c0f5a603846f6e55fafdee5e5fcb2d354605b8404492bb2796c380d8d57cda3b1805ced700c83ead507c25c08def1793872cad668cf3136dac61c857e25e773345d6b61612bc46e5fdbab1a6f6a1d9a044d9f702181e6607c0167b2a3924de2a60c1e5c6e2b3ce9f851882502f8dc67b283446570eaef60a7e320430860c450041c5140c94c43b6e72c13211119eea1a01f4851524d0a36c997d684f48bf21bbe17f6c9b9d267f49ca14bd98fce0233c1c7f221af71cf32e8ca8c737218b29472dfd26e730eb14bc399196093e06fa2a2987412fe2a4dbb3353b8b3aad2d03101489f1b7fe58c7120363ee8f030162f55ad83d9d81c14cc34d43d2239c60ddfc5d8188ff3e3f388c18fb6f1e9c667aaf2de90735ce1abe0699c089b03fac38ea999251fa5acdcbd246f46aeff488bfbca1f1821a465849fc6d062ee0f7e90bdf23e5aa3ecf479be88e98f4509c027cf20ee22e1de5cd2e35537f33526e2d4173e9617b49e6e7b2366ead76ade48ef77589e5f4da27b567b3ac905788ab9ffd14fc0680b70196e54693f16efd210d4c5f5f36d64ea0109242159e34b7850b582c3ee6eb28817a76ea6a5e0a3feee9fa2c2510229959a889a3717b0b4c7acdb2616b7fbfad314d1c7c880d4c7c67aa79828ebc798e3a74c8a661148e9c02bec610a39f439c0898ff5e99add7b8d78eacb7705b9b21df28ccaa4443e27768f8cbf9e0499a7774dd98297a29c5a6c8a4dd9527b7476dffd700511e19016332c9ab57ea299e5175e587ef62759e725439cdac7b65be79714365e73d3f512d0a35ca49b08b9dc34b914250b3582a60eda2141501440f7f3a8ae3331452cd822983f73ce7b4e6b38c5322293242dd931d9c638779a2a1c0dba20e48faef864b29bfca0f7b57bdf4a26562b82fd151e477c3328440aa6c0daa150392a85c49505c99409135154ce80be6f58ffcc7452b595fab9d0636e80446e7823701e6894364cc135bed0bd7044c27470fbcf4cb3ada4049da96b2d6cd5b28579baf8d3ed289adabba47a3c80e5275e23a6894259f3bedd8c70529b4686cab0599db01fc1f78f84a8e37dcf638475e7196be02dbde578b34e77802639293670c24d24261e731f1eb0b924e9f785913943ae3b5223f6a2df4d4de2b5880f65199bd2aeeaf4ba0574ae1366d1dbdd23955694a2cce552f6d2a2421ed291e8598549093867cc7c1ca9f71978a444dbe7317fb2e83706ae9a4332526efeab4cd4a5abbeabbf21c3f5687fd19ca9cfc8da674543d64df7ad4e97b6b01fe72034deb62cfbf5eb148ce82a2566aebe83c5546fd922b9cace653d88b4f73643232b53a1b490e3019b3599ad295fe817fcfebf91ef0e477936ed25b429d41e2e5feb9b4daf3a0137c77d9d85545e01769d863416eeb8d1d8a5fdfd50d0af01ef1691ee5b8f8d99c4baaaa931a16aef05135e2e3966ff7e641ea097225709e59764fe0d001e211c94f55ac0aed9f6737af95dfb0e494311ebfc992aa747ac70cddd9ec21baf54e715224fd303d987422c76118f5af326b01a686da4d0fba3dd18efce59ee39aac2da3364dfa660a6ebc649dfc1ec2cfb9592c456b9f5fc629def84325bfc5361430e7a33494fc1d4fc4405f995539bc30882e46550c030263d7440e40f38eb1938e92e9af9e332bf79ec2be958f3c1628e9be9eebe398a49b796a22c6387912e4f81fd6694b1573035a17bf85d8634e8becc3374fbc214b379f415a71f94218e06ac2bd2d9c6bbdf5fed688641c6d0ac5f1f8f43a0c5c95ef4d2513ee67d41647d66ee6f9206743203d07fd4f1474b5bf1fc7a4095631204c96f4981d641b9856812aa6b71dce137b765ec37728e0bdd6dd042996f5e484523e050bbd364b932170f148763d65bb1d901a2f4fcf5c228973108d12d6f843c1288a330c1e8e8b3468211e7f24db46963409d65b5734a19d870bfbc282e2de0dd14ef705084294111a405e3657aaf215c8565157b9f9a8eb377052d02869db48a84536b0321364aadfd3cf9e9fee397080951648955cd8dd62e4c156dac3541820bc4856e91fd09ca5b080688a552f2edfc62896dd34a8965463087b9d713b63ee0ee50adf944e0a7d08038ed6b93a16d49ccf01e64d7f7dbfe596a7a9086cbc67022373c7eb2c687639c777dc62c780d7897a5aebf9ffb3f3bdc1bf8570dba7536fbd376b5d83e5d9d3203fdceb2fa1cb65df913b55000fe9effc01faba0ff560741777521c80d15354dd01eb3ac59bbb16694d2c22d8b0accfd01e834756da0ff9381407c736bed51ebb212ceca633135d6d16a38e867175532a91a4947aa00d84eaa75d39466becddb805b0224916bc672da8e99d74b3d0e3d208abd172fef2a1437311af47193e5b6e820ec1ddfd0f095e2c60657f665166ad1cad5a2b0bff7d7bb42b300905819831bbbce531117dbdb86618b9d929c9ea1c1fc8507e0d2722ece75b1349d87ef7979d77bac000a44ea73b439cc4d639c45e1092d91c125ae3dcc28f98e10e0fa89535dad5ff0a7e2597b3afde1416271525aa0f80fd40eafa4fb2d3feddf7d2ca260cd4f97335bf12f4959bbae96fa91122dd602723cfe326d7d9d454366bd1a71d996db8af0ecbe8d934e55ce172c9488eea5e812912c0cf04d0214369af1e93c9f185c76793e10c494c89bc8655867a2811524c393d28ab7bd2323be4089b1b0b4760b810f0fed0fb12871b10246f1674adea3474871bc72564f37cbfe4a4195a106e66ef021822f012cf3439bb2acb6e447b5183058843167cbbeb99e78770e6d2f7f4f15f14d5d9d2e9cdcd90117d5bb49e9af2036075c2c1a8adcbf36a272174caba6646647879a6e104ff8048d0c8c00753026845dbfeda4fa847a4aa0862fefecb4a9da7702b721f687643f2d0fe70f82fed1fc7c67c81d3807bb9c7a77eafff3eafdc0713912de77c95325adb45c37d105c6243a51cd429e9c46778ac9ff9969b3ef76bb327bd2653d1f550684ec7a1d9741610ef5ca02011c457ab90bf6b4c2501019b3b29f0c920f65d6ce0524e61606fba029f44b5aa0ca25f28a7b904fc81ee05a3083db628324bcef8981d050170ad716516484d2e08ed64794d185fe7afd02f9e84155186cc2d6bb47537de57c441fffc5136f8d906f30fd9e5ed9a3122849663f55ab90a425c0e3ab2028b677294fee4fe7c370b3039ba6ec9830bd6e7b0af6a8d1dab5e1d609bd73d30cc453cb858e8a7ec8b56291e3ddcb653d681e4511271a3075e3fce0e980b582410582ad6491a222457a3286df7dc248cbb552a406bdc802c943aaca944a3e3c746007e4cd6fff3fbed413054132af278bd7e3e1000b0ebe16071eebffd2bd6bc31d3b3ad98db4875b6560862e09de69d299ca0e4f33ca7a20c7e3427ec6dd03bceeb4a66ecfcebeefcefa718c92793ec2747d5952eccf734df6f937c4b704b841a2b1f51d12b7be1110a5e9d1d7516318abdb07e79593e4a2da90f7ab6ac073877e011c290ffa3543694f07c4cff7d67bca5be57230c459dc0b55f5b798a02f63fe66a60ad42dec88cf5ef4af82a46f96243776292cfdf1003521c54a9d0e2776e3f4a6fcc778ff211281d0105b5314d9e33353fd17ad9b9bbbf90e449094afbce2705ead955881fc34ad9b59608f22a1c04498aeb1ef3f50e2470b97f7538d82a55482da1e09f42d54205a0146cc557920166c4b04f7999dcf140b09de4f2b2801180a755dbafc63008b8936a058ed4bbfd1d51550907ba951ecc4c54b19c5696588abfabb9b828768cfaeeef94eb803b0d9b276eff8d19d57984da72a56d576a37a437d8d4e9cc5ec833faf4f810451bb56a17bd8552390865db53ee85c4ddd36432c78e69b6df6a3e6e6726476b72849de2135ecc28941e568b4de82c52cbc81c14795ac250fb48cd58bf84214406f3c1d56f03b58095f0bf40be4290484bfbd3f0e8c7a8172c3f0c4080cdf6e9425e1d107a0e508ce179dd5589b67bec0fa56274353b22b1d192c1b39fbe2ef6e52cf1ac9b4ecfb0412a05a7e7f0490a7d928e98486ee99b2b013e5d2b2849f943ae1206f7972efd4ba0f3a2a177529c919dceb9bfac573b04ef05107e8d5437c93464629319f8e30e05fe17509fc22a9f2de6d4676c782e5e5dbe8cc429793d57acc099f59c2ce64d6322363e92d35b3180b959722761fa7a5a05ce9804651e2bd5a947a4e8c4b5493d4d883126cbb44219cf6302f205fa098f10c7bcf1d523ed7973482503360bc25d9f665ad4f783395ecf03ce0f4aba2583c66e55747c1979139eb2434551f7306adc49a32fd0a55e321312a79b7e9791a04e5c5d3359c2d309ac516a4206f345d64f86f62cd52f602370e0a17ab1a5c2756959a18933e2a9b563ba984181c07187f21d2d2ac02535cc97515ade2d973c3719509f1236436dc109f12b174efa9e7d1d9206fc0ac06783f982d36f27210e73bef5a856a99f3ac4d30e8a398611f7c47fea5988d85005f0394f3be9a118a758dfb4ae5991ec47a37670bf855f6d3c82ce780c39615168adf4ee3ad53b6ebc8f68c34baa572bed32e77e0ac1a0fbd66c9bb66b7cf7179e3c56509c80978ae652f5e0f236b5a06f403620b80bf9c090275b5d1c6d8e2bb9460333f4dfbc5f824f578d55eec077be47faf772ce9d638f9e08a0e1fae1d384b0b7d68b172e1e56f99ed63e9c4015c1149c2acf2cedb79ff77ba14be3f83695373b74e0d3f8e55d8444b6ac3e9848b4fd05833e6da245c31901b642cedbffabc6c9dc145a927c083edfb1a24e6ec719f7a106540f5ec287fb78d793305b823e40b1f2b9d42e7b39abbd9e60fde54c1f8493749023fb089bebc948ab2343b9449d390849adeb58a4b9771fa8887ebd7cf79dd59e0a99e342acffc7a5f7640e7fd53cbfdfa9208a6e7ae0faa05532a5007bb4eb8569d2860fb032093b9d46e8c8bceca62b61fda5ebdc7c1a43c0b3c04c039ee9699564a590e56a467fb46154cd56149d8c3139581d4eb41f8695abe5d77adff8cf20c609c2a486961f284af1f877a06c1ed3c918bd956ca0a546180da92df75bbe4fcd785ba381cffd0a50832e90779f1dd527f747b0bf38932006e6af0980617716dfbb43fcea9f8ba3c1d2a78301d4938827c8c98988562bbfe7541249780d226652c2e7e48883e172f4cdf92c0948a1d3a6f062d658d60becf32e8beb921b34bfc773518831b4cb352c46708f6534ee42c8be7e04456ad1df06ec6ea857d149ca6d5cdf96d7a54969adb4891348f7b3cba2d51a5cfd9fd9db3ad1cf88c768d62da4bf088c0de7f6aa169a28fafe875bad8ae0facda5da60e43c81ad9cca77e0b173f4696bc6d6a21c10b9b18652dad20aad0bfd6f99189f11a1a8f844c6d423ec9e75dbecc6c059e7e71393cb6819cd0b8e83982a68d14176533824dff6aa2ebecf9f84594bd81d9d5eb649ff7d94dc55d9b4ca51847306b2aac0c365b130aa1795b71fa20ddca5214cc02cb33d74413475610b9b8a408e4b1b8019a17a73a330ebb766d12a69500d936b04c91f03255184a8bb85bbc61f2288b5e19656d9748f8b46e7de78a4b904228966c75f72ef2da425f7963fdef3637de044", 0x1000, 0x7f}, {&(0x7f0000002240)="39addeb1b238856b2bdc47769bbf4879f3b730c7ab2a1a9d07118d2ad1923390cf345d7912817a803c05a8de6bc62a6de5dcf7351fbc6f8fab56b526ccc31650fea39e811ee6a41424cb0917aee18a6f5e20d98db04f5bf1e56cedf0b8fd363e0f0420207e3503a67d44770df0bbe667168c8ce78f48b7ee83a0929e33ca34a36e875f1cf5108521", 0x88, 0xfff}, {&(0x7f0000002300)="d15dabb9e7e9e72940fb6a993498042867077716d7033e61e46fb206d3c293715007233b0bab0c95073d37069131a969d83d13f8b90d99476c48a94cd372cfb0691a3c99fb25de53f2cae04b3d55b9d070a5b746583574ae9b86d2f6a6160bc4c0ead293e629d789cee9e721e235cb82b5352464454aa52bc95951165fd6e6472001f1fb2a45a8d27d9f2e5b234229ece7852af3b572bc70ad", 0x99}], 0x0, &(0x7f0000000040)={[], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) read(r1, &(0x7f0000002480)=""/77, 0x4d) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400, 0x22) 02:14:39 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:14:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 1) 02:14:39 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 77) 02:14:39 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2403.976800] ? asm_exc_page_fault+0x1e/0x30 [ 2403.978048] __sys_sendmmsg+0x195/0x470 [ 2403.978939] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2403.979905] ? lock_downgrade+0x6d0/0x6d0 [ 2403.980863] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2403.981929] ? wait_for_completion+0x270/0x270 [ 2403.982946] ? rcu_read_lock_any_held+0x75/0xa0 [ 2403.983978] ? vfs_write+0x354/0xa30 [ 2403.984808] ? fput_many+0x2f/0x1a0 02:14:39 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) 02:14:39 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) 02:14:39 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 77) [ 2403.985616] ? ksys_write+0x1a9/0x260 [ 2403.986612] __x64_sys_sendmmsg+0x99/0x100 [ 2403.987573] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2403.988708] do_syscall_64+0x33/0x40 [ 2403.989626] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2403.990751] RIP: 0033:0x7f8542659b19 [ 2403.991585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.995585] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2403.997248] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2403.998803] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2404.000370] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2404.001925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2404.002258] ieee802154 phy0 wpan0: encryption failed: -22 [ 2404.003468] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2404.010583] blktrace: Concurrent blktraces are not allowed on loop12 [ 2404.019477] blktrace: Concurrent blktraces are not allowed on loop12 [ 2404.033973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2404.040310] FAULT_INJECTION: forcing a failure. [ 2404.040310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2404.042944] CPU: 1 PID: 9709 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2404.044450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2404.046258] Call Trace: [ 2404.046841] dump_stack+0x107/0x167 [ 2404.047661] should_fail.cold+0x5/0xa [ 2404.048501] _copy_from_user+0x2e/0x1b0 [ 2404.049375] __copy_msghdr_from_user+0x91/0x4b0 [ 2404.050394] ? __ia32_sys_shutdown+0x80/0x80 [ 2404.051360] ? ieee802154_sock_release+0xb0/0xb0 [ 2404.052471] ? sock_sendmsg+0x55/0x190 [ 2404.053329] sendmsg_copy_msghdr+0xa1/0x160 [ 2404.054264] ? do_recvmmsg+0x6d0/0x6d0 [ 2404.055117] ? __lock_acquire+0x1657/0x5b00 [ 2404.056095] ___sys_sendmsg+0xc6/0x170 [ 2404.056950] ? sendmsg_copy_msghdr+0x160/0x160 [ 2404.057937] ? vmacache_find+0x55/0x2a0 [ 2404.058810] ? __lockdep_reset_lock+0x180/0x180 [ 2404.059845] ? find_held_lock+0x2c/0x110 02:14:39 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) [ 2404.060740] ? __might_fault+0xd3/0x180 [ 2404.061749] ? lock_downgrade+0x6d0/0x6d0 [ 2404.062656] ? asm_exc_page_fault+0x1e/0x30 [ 2404.063636] __sys_sendmmsg+0x195/0x470 [ 2404.064516] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2404.065460] ? lock_downgrade+0x6d0/0x6d0 [ 2404.066390] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2404.067453] ? wait_for_completion+0x270/0x270 [ 2404.068499] ? rcu_read_lock_any_held+0x75/0xa0 [ 2404.069514] ? vfs_write+0x354/0xa30 [ 2404.070331] ? fput_many+0x2f/0x1a0 [ 2404.071130] ? ksys_write+0x1a9/0x260 [ 2404.071987] __x64_sys_sendmmsg+0x99/0x100 [ 2404.072915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2404.074042] do_syscall_64+0x33/0x40 [ 2404.074861] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2404.075999] RIP: 0033:0x7f867efe2b19 [ 2404.076818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2404.080858] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2404.082526] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2404.084169] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2404.085732] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2404.087291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2404.088861] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:14:39 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) 02:14:39 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) [ 2404.157828] blktrace: Concurrent blktraces are not allowed on loop6 [ 2404.166733] blktrace: Concurrent blktraces are not allowed on loop6 [ 2404.220990] blktrace: Concurrent blktraces are not allowed on loop12 [ 2420.240045] hpet: Lost 1 RTC interrupts [ 2420.940905] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2424.113413] hpet: Lost 1 RTC interrupts 02:15:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 2) 02:15:05 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:05 executing program 5: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000008c0)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8d05520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4"}, 0x48, 0xfffffffffffffffb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r3 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "fa3160a457e740b13be9d89dfab2c19c596198eb908e8e3d103f5df6a2a924e7c5b521feaba49762b19e9567c366e79a5f8bf72f141cfe28a075b8ef7258819d"}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, r4, r4) add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b4497be20b8067cafdf34cb20ae83c9e37d6fab475fe41086b612436146a5b432126033ddd8629f69fae0be69af2437da61f1ab6", 0x34, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r5, 0x1) keyctl$get_keyring_id(0x0, r3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 02:15:05 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101286, 0x0) 02:15:05 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101286, 0x0) 02:15:05 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 78) 02:15:05 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 78) 02:15:05 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) [ 2430.100783] blktrace: Concurrent blktraces are not allowed on loop6 [ 2430.102336] blktrace: Concurrent blktraces are not allowed on loop6 [ 2430.116668] FAULT_INJECTION: forcing a failure. [ 2430.116668] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.118786] CPU: 1 PID: 9730 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2430.120268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.121510] Call Trace: [ 2430.121922] dump_stack+0x107/0x167 [ 2430.122467] should_fail.cold+0x5/0xa [ 2430.122999] ? tcp_send_window_probe+0xc2/0x180 [ 2430.123835] ? __alloc_skb+0x6d/0x620 [ 2430.124447] should_failslab+0x5/0x20 [ 2430.125022] kmem_cache_alloc_node+0x55/0x370 [ 2430.125792] ? mark_held_locks+0x9e/0xe0 [ 2430.126411] __alloc_skb+0x6d/0x620 [ 2430.126974] tcp_xmit_probe_skb+0x63/0x360 [ 2430.127728] tcp_send_window_probe+0x130/0x180 [ 2430.128415] tcp_setsockopt+0x2315/0x2690 [ 2430.129017] ? tcp_sock_set_keepidle+0x40/0x40 [ 2430.129028] ieee802154 phy0 wpan0: encryption failed: -22 [ 2430.130671] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2430.131462] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2430.132417] ? __fget_files+0x296/0x480 [ 2430.133014] ? selinux_socket_setsockopt+0x6a/0x80 [ 2430.133838] ? sock_common_setsockopt+0x2b/0x100 [ 2430.134538] __sys_setsockopt+0x180/0x2b0 [ 2430.135191] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2430.135940] ? __ia32_sys_recv+0x100/0x100 [ 2430.136598] ? fput_many+0x2f/0x1a0 [ 2430.137241] ? ksys_write+0x1a9/0x260 [ 2430.137787] __x64_sys_setsockopt+0xba/0x160 [ 2430.138138] FAULT_INJECTION: forcing a failure. [ 2430.138138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2430.138449] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.140628] do_syscall_64+0x33/0x40 [ 2430.141112] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2430.141856] RIP: 0033:0x7f8f9b255b19 [ 2430.142399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.144791] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2430.145867] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2430.146995] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2430.148022] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2430.148987] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2430.150021] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 [ 2430.151089] CPU: 0 PID: 9735 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2430.151995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.153157] Call Trace: [ 2430.153537] dump_stack+0x107/0x167 [ 2430.154040] should_fail.cold+0x5/0xa [ 2430.154606] _copy_from_user+0x2e/0x1b0 [ 2430.154695] blktrace: Concurrent blktraces are not allowed on loop12 [ 2430.155189] __copy_msghdr_from_user+0x91/0x4b0 [ 2430.155208] ? __ia32_sys_shutdown+0x80/0x80 [ 2430.157410] ? ieee802154_sock_release+0xb0/0xb0 [ 2430.158114] ? sock_sendmsg+0x55/0x190 [ 2430.158693] sendmsg_copy_msghdr+0xa1/0x160 [ 2430.159323] ? do_recvmmsg+0x6d0/0x6d0 [ 2430.159915] ? __lock_acquire+0x1657/0x5b00 [ 2430.160553] ___sys_sendmsg+0xc6/0x170 [ 2430.161111] ? sendmsg_copy_msghdr+0x160/0x160 [ 2430.161805] ? __lockdep_reset_lock+0x180/0x180 [ 2430.162450] ? trace_hardirqs_on+0x5b/0x180 [ 2430.163106] ? find_held_lock+0x2c/0x110 [ 2430.163732] ? __might_fault+0xd3/0x180 [ 2430.164335] ? lock_downgrade+0x6d0/0x6d0 [ 2430.164937] ? io_schedule_timeout+0x140/0x140 [ 2430.165628] __sys_sendmmsg+0x195/0x470 [ 2430.166211] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2430.166824] ? lock_downgrade+0x6d0/0x6d0 [ 2430.167452] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2430.168223] ? wait_for_completion+0x270/0x270 [ 2430.168907] ? rcu_read_lock_any_held+0x75/0xa0 [ 2430.169553] ? vfs_write+0x354/0xa30 [ 2430.170112] ? fput_many+0x2f/0x1a0 [ 2430.170483] ieee802154 phy0 wpan0: encryption failed: -22 [ 2430.170648] ? ksys_write+0x1a9/0x260 [ 2430.170688] __x64_sys_sendmmsg+0x99/0x100 [ 2430.172654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.173390] do_syscall_64+0x33/0x40 [ 2430.173703] ieee802154 phy0 wpan0: encryption failed: -22 [ 2430.173929] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2430.175453] RIP: 0033:0x7f867efe2b19 [ 2430.176022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.178332] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2430.179519] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2430.180583] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2430.181335] FAULT_INJECTION: forcing a failure. [ 2430.181335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2430.181511] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.181525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.185013] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2430.186053] CPU: 1 PID: 9736 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2430.186166] hpet: Lost 1 RTC interrupts [ 2430.187117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.187127] Call Trace: [ 2430.188036] blktrace: Concurrent blktraces are not allowed on loop12 [ 2430.188843] dump_stack+0x107/0x167 [ 2430.188870] should_fail.cold+0x5/0xa [ 2430.191639] _copy_from_user+0x2e/0x1b0 [ 2430.192257] __copy_msghdr_from_user+0x91/0x4b0 [ 2430.193038] ? __ia32_sys_shutdown+0x80/0x80 [ 2430.193746] ? ieee802154_sock_release+0xb0/0xb0 [ 2430.194441] ? sock_sendmsg+0x55/0x190 [ 2430.195021] sendmsg_copy_msghdr+0xa1/0x160 [ 2430.195630] ? do_recvmmsg+0x6d0/0x6d0 [ 2430.196242] ? __lock_acquire+0x1657/0x5b00 [ 2430.196828] ___sys_sendmsg+0xc6/0x170 [ 2430.197386] ? sendmsg_copy_msghdr+0x160/0x160 [ 2430.198042] ? vmacache_find+0x55/0x2a0 [ 2430.198623] ? __lockdep_reset_lock+0x180/0x180 [ 2430.199317] ? find_held_lock+0x2c/0x110 [ 2430.199927] ? __might_fault+0xd3/0x180 [ 2430.200459] ? lock_downgrade+0x6d0/0x6d0 [ 2430.200992] ? asm_exc_page_fault+0x1e/0x30 [ 2430.201627] __sys_sendmmsg+0x195/0x470 [ 2430.202222] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2430.202855] ? lock_downgrade+0x6d0/0x6d0 [ 2430.203486] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2430.204223] ? wait_for_completion+0x270/0x270 [ 2430.204903] ? rcu_read_lock_any_held+0x75/0xa0 [ 2430.205596] ? vfs_write+0x354/0xa30 02:15:05 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101288, 0x0) [ 2430.206151] ? fput_many+0x2f/0x1a0 [ 2430.206899] ? ksys_write+0x1a9/0x260 [ 2430.207492] __x64_sys_sendmmsg+0x99/0x100 [ 2430.208131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.208939] do_syscall_64+0x33/0x40 [ 2430.209481] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2430.210340] RIP: 0033:0x7f8542659b19 [ 2430.210888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.213692] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2430.214817] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2430.215910] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2430.216981] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.218012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.219041] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2430.259092] blktrace: Concurrent blktraces are not allowed on loop6 [ 2430.263250] blktrace: Concurrent blktraces are not allowed on loop6 02:15:05 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1277, 0x0) 02:15:05 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101288, 0x0) [ 2430.282363] ieee802154 phy0 wpan0: encryption failed: -22 02:15:05 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) [ 2430.327844] blktrace: Concurrent blktraces are not allowed on loop12 [ 2430.336741] blktrace: Concurrent blktraces are not allowed on loop12 [ 2430.402196] blktrace: Concurrent blktraces are not allowed on loop6 [ 2430.407395] blktrace: Concurrent blktraces are not allowed on loop6 02:15:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 3) [ 2430.454915] FAULT_INJECTION: forcing a failure. [ 2430.454915] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.459384] CPU: 0 PID: 9755 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2430.461831] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.465083] Call Trace: [ 2430.466095] dump_stack+0x107/0x167 [ 2430.467460] should_fail.cold+0x5/0xa [ 2430.468910] ? create_object.isra.0+0x3a/0xa20 [ 2430.470654] should_failslab+0x5/0x20 [ 2430.472054] kmem_cache_alloc+0x5b/0x360 [ 2430.473513] ? find_held_lock+0x2c/0x110 [ 2430.475031] create_object.isra.0+0x3a/0xa20 [ 2430.476698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2430.478498] kmem_cache_alloc_node+0x169/0x370 [ 2430.480201] ? mark_held_locks+0x9e/0xe0 [ 2430.481677] __alloc_skb+0x6d/0x620 [ 2430.483025] tcp_xmit_probe_skb+0x63/0x360 [ 2430.484538] tcp_send_window_probe+0x130/0x180 [ 2430.486254] tcp_setsockopt+0x2315/0x2690 [ 2430.487695] ? tcp_sock_set_keepidle+0x40/0x40 [ 2430.489408] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2430.491140] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2430.492072] ? __fget_files+0x296/0x480 [ 2430.492698] ? selinux_socket_setsockopt+0x6a/0x80 [ 2430.493453] ? sock_common_setsockopt+0x2b/0x100 [ 2430.494191] __sys_setsockopt+0x180/0x2b0 [ 2430.494828] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2430.495532] ? __ia32_sys_recv+0x100/0x100 [ 2430.496201] ? fput_many+0x2f/0x1a0 [ 2430.496696] ? ksys_write+0x1a9/0x260 [ 2430.497226] __x64_sys_setsockopt+0xba/0x160 [ 2430.497822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.498515] do_syscall_64+0x33/0x40 [ 2430.499022] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2430.499706] RIP: 0033:0x7f8f9b255b19 [ 2430.500282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.503103] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2430.504192] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2430.505075] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2430.506031] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2430.506933] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2430.507828] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 [ 2430.511955] hpet: Lost 2 RTC interrupts [ 2446.496136] kmemleak: 71 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:15:31 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 79) 02:15:31 executing program 5: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000008c0)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8d05520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4"}, 0x48, 0xfffffffffffffffb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r3 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "fa3160a457e740b13be9d89dfab2c19c596198eb908e8e3d103f5df6a2a924e7c5b521feaba49762b19e9567c366e79a5f8bf72f141cfe28a075b8ef7258819d"}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, r4, r4) add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b4497be20b8067cafdf34cb20ae83c9e37d6fab475fe41086b612436146a5b432126033ddd8629f69fae0be69af2437da61f1ab6", 0x34, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r5, 0x1) keyctl$get_keyring_id(0x0, r3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 02:15:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 4) 02:15:31 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) 02:15:31 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:31 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) (fail_nth: 1) 02:15:31 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 79) 02:15:31 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) [ 2455.540092] blktrace: Concurrent blktraces are not allowed on loop12 [ 2455.542971] ieee802154 phy0 wpan0: encryption failed: -22 [ 2455.543380] blktrace: Concurrent blktraces are not allowed on loop12 [ 2455.556570] blktrace: Concurrent blktraces are not allowed on loop6 [ 2455.561093] blktrace: Concurrent blktraces are not allowed on loop6 [ 2455.571252] ieee802154 phy0 wpan0: encryption failed: -22 [ 2455.578289] ieee802154 phy0 wpan0: encryption failed: -22 [ 2455.580027] FAULT_INJECTION: forcing a failure. [ 2455.580027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2455.580619] FAULT_INJECTION: forcing a failure. [ 2455.580619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2455.581784] CPU: 0 PID: 9775 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2455.584566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2455.585837] Call Trace: [ 2455.586253] dump_stack+0x107/0x167 [ 2455.586855] should_fail.cold+0x5/0xa [ 2455.587446] _copy_from_user+0x2e/0x1b0 [ 2455.588069] __copy_msghdr_from_user+0x91/0x4b0 [ 2455.589491] ? __ia32_sys_shutdown+0x80/0x80 [ 2455.590946] ? ieee802154_sock_release+0xb0/0xb0 [ 2455.592492] ? sock_sendmsg+0x55/0x190 [ 2455.593972] sendmsg_copy_msghdr+0xa1/0x160 [ 2455.595338] ? do_recvmmsg+0x6d0/0x6d0 [ 2455.596426] ? __lock_acquire+0x1657/0x5b00 [ 2455.597121] ___sys_sendmsg+0xc6/0x170 [ 2455.597715] ? sendmsg_copy_msghdr+0x160/0x160 [ 2455.598389] ? vmacache_find+0x55/0x2a0 [ 2455.598986] ? __lockdep_reset_lock+0x180/0x180 [ 2455.599697] ? find_held_lock+0x2c/0x110 [ 2455.600328] ? __might_fault+0xd3/0x180 [ 2455.600928] ? lock_downgrade+0x6d0/0x6d0 [ 2455.601556] ? asm_exc_page_fault+0x1e/0x30 [ 2455.602240] __sys_sendmmsg+0x195/0x470 [ 2455.602847] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2455.603492] ? lock_downgrade+0x6d0/0x6d0 [ 2455.604144] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2455.608934] ? wait_for_completion+0x270/0x270 [ 2455.609615] ? rcu_read_lock_any_held+0x75/0xa0 [ 2455.610285] ? vfs_write+0x354/0xa30 [ 2455.610835] ? fput_many+0x2f/0x1a0 [ 2455.611357] ? ksys_write+0x1a9/0x260 [ 2455.611909] __x64_sys_sendmmsg+0x99/0x100 [ 2455.612561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.613325] do_syscall_64+0x33/0x40 [ 2455.613892] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2455.614636] RIP: 0033:0x7f8542659b19 [ 2455.615190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2455.617807] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2455.618916] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2455.619945] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2455.620985] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2455.621994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2455.622971] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2455.624011] CPU: 1 PID: 9778 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 2455.624535] hpet: Lost 2 RTC interrupts [ 2455.625159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2455.625170] Call Trace: [ 2455.627233] dump_stack+0x107/0x167 [ 2455.627687] should_fail.cold+0x5/0xa [ 2455.628239] _copy_from_user+0x2e/0x1b0 [ 2455.628809] blk_ioctl_discard+0x137/0x2f0 [ 2455.629421] ? blkdev_bszset+0x1e0/0x1e0 [ 2455.630000] ? perf_trace_lock+0xac/0x490 [ 2455.630567] ? SOFTIRQ_verbose+0x10/0x10 [ 2455.631125] blkdev_common_ioctl+0x53a/0x1870 [ 2455.631755] ? blk_ioctl_discard+0x2f0/0x2f0 [ 2455.632385] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2455.633212] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2455.633955] ? do_vfs_ioctl+0x283/0x10d0 [ 2455.634544] ? selinux_inode_getsecctx+0x90/0x90 [ 2455.635225] ? generic_block_fiemap+0x60/0x60 [ 2455.635584] FAULT_INJECTION: forcing a failure. [ 2455.635584] name failslab, interval 1, probability 0, space 0, times 0 [ 2455.635877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2455.635897] blkdev_ioctl+0x1dd/0x710 [ 2455.635920] ? blkdev_common_ioctl+0x1870/0x1870 [ 2455.639049] ? selinux_file_ioctl+0xb1/0x260 [ 2455.639624] block_ioctl+0xf9/0x140 [ 2455.640174] ? blkdev_read_iter+0x1c0/0x1c0 [ 2455.640759] __x64_sys_ioctl+0x19a/0x210 [ 2455.641363] do_syscall_64+0x33/0x40 [ 2455.641897] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2455.642613] RIP: 0033:0x7f68afc56b19 [ 2455.643142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2455.645674] RSP: 002b:00007f68ad1cc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2455.646885] RAX: ffffffffffffffda RBX: 00007f68afd69f60 RCX: 00007f68afc56b19 [ 2455.647884] RDX: 0000000000000000 RSI: 0000000000001277 RDI: 0000000000000003 [ 2455.648833] RBP: 00007f68ad1cc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2455.649832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2455.650848] R13: 00007fff3e35224f R14: 00007f68ad1cc300 R15: 0000000000022000 [ 2455.651775] CPU: 0 PID: 9777 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2455.652708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2455.653745] Call Trace: [ 2455.654105] dump_stack+0x107/0x167 [ 2455.654583] should_fail.cold+0x5/0xa [ 2455.654825] FAULT_INJECTION: forcing a failure. [ 2455.654825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2455.655086] should_failslab+0x5/0x20 [ 2455.657621] __kmalloc_node_track_caller+0x74/0x3f0 [ 2455.658392] ? tcp_xmit_probe_skb+0x63/0x360 [ 2455.658965] __alloc_skb+0xb1/0x620 [ 2455.659442] tcp_xmit_probe_skb+0x63/0x360 [ 2455.659994] tcp_send_window_probe+0x130/0x180 [ 2455.660706] tcp_setsockopt+0x2315/0x2690 [ 2455.661356] ? tcp_sock_set_keepidle+0x40/0x40 [ 2455.662083] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2455.662778] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2455.663513] ? __fget_files+0x296/0x480 [ 2455.664124] ? selinux_socket_setsockopt+0x6a/0x80 [ 2455.664953] ? sock_common_setsockopt+0x2b/0x100 [ 2455.665606] __sys_setsockopt+0x180/0x2b0 [ 2455.666168] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2455.666756] ? __ia32_sys_recv+0x100/0x100 [ 2455.667309] ? fput_many+0x2f/0x1a0 [ 2455.667795] ? ksys_write+0x1a9/0x260 [ 2455.668352] __x64_sys_setsockopt+0xba/0x160 [ 2455.668961] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.669627] do_syscall_64+0x33/0x40 [ 2455.670096] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2455.670761] RIP: 0033:0x7f8f9b255b19 [ 2455.671361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2455.673795] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2455.674926] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2455.676353] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2455.677490] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2455.678415] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2455.679289] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 [ 2455.680293] CPU: 1 PID: 9776 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2455.680538] hpet: Lost 1 RTC interrupts [ 2455.681400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2455.681411] Call Trace: [ 2455.683745] dump_stack+0x107/0x167 [ 2455.684412] should_fail.cold+0x5/0xa [ 2455.685032] _copy_from_user+0x2e/0x1b0 [ 2455.685645] __copy_msghdr_from_user+0x91/0x4b0 [ 2455.686367] ? __ia32_sys_shutdown+0x80/0x80 [ 2455.687060] ? ieee802154_sock_release+0xb0/0xb0 [ 2455.687802] ? sock_sendmsg+0x55/0x190 [ 2455.688412] sendmsg_copy_msghdr+0xa1/0x160 [ 2455.689061] ? do_recvmmsg+0x6d0/0x6d0 [ 2455.689669] ? __lock_acquire+0x1657/0x5b00 [ 2455.690330] ___sys_sendmsg+0xc6/0x170 [ 2455.690926] ? sendmsg_copy_msghdr+0x160/0x160 [ 2455.691625] ? __lockdep_reset_lock+0x180/0x180 [ 2455.692363] ? trace_hardirqs_on+0x5b/0x180 [ 2455.693026] ? find_held_lock+0x2c/0x110 [ 2455.693668] ? __might_fault+0xd3/0x180 [ 2455.694286] ? lock_downgrade+0x6d0/0x6d0 [ 2455.694944] ? io_schedule_timeout+0x140/0x140 [ 2455.695653] __sys_sendmmsg+0x195/0x470 [ 2455.700395] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2455.701039] ? lock_downgrade+0x6d0/0x6d0 [ 2455.701638] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2455.702365] ? wait_for_completion+0x270/0x270 [ 2455.703056] ? rcu_read_lock_any_held+0x75/0xa0 [ 2455.703778] ? vfs_write+0x354/0xa30 [ 2455.704391] ? fput_many+0x2f/0x1a0 [ 2455.704972] ? ksys_write+0x1a9/0x260 [ 2455.705543] __x64_sys_sendmmsg+0x99/0x100 [ 2455.706221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.707011] do_syscall_64+0x33/0x40 [ 2455.707536] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2455.708260] RIP: 0033:0x7f867efe2b19 [ 2455.712389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:15:31 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) [ 2455.715155] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2455.722393] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2455.724834] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2455.727094] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2455.729292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2455.731573] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2455.741990] ieee802154 phy0 wpan0: encryption failed: -22 02:15:31 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) [ 2455.759811] blktrace: Concurrent blktraces are not allowed on loop12 [ 2455.786092] blktrace: Concurrent blktraces are not allowed on loop6 [ 2455.797833] blktrace: Concurrent blktraces are not allowed on loop6 02:15:31 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:31 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) [ 2455.877299] ieee802154 phy0 wpan0: encryption failed: -22 [ 2455.901989] blktrace: Concurrent blktraces are not allowed on loop12 [ 2455.911796] blktrace: Concurrent blktraces are not allowed on loop12 [ 2455.952272] ieee802154 phy0 wpan0: encryption failed: -22 [ 2471.594692] kmemleak: 74 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:15:56 executing program 5: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000008c0)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8d05520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4"}, 0x48, 0xfffffffffffffffb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r3 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "fa3160a457e740b13be9d89dfab2c19c596198eb908e8e3d103f5df6a2a924e7c5b521feaba49762b19e9567c366e79a5f8bf72f141cfe28a075b8ef7258819d"}, 0x48, 0xfffffffffffffffe) keyctl$unlink(0x9, r4, r4) add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b4497be20b8067cafdf34cb20ae83c9e37d6fab475fe41086b612436146a5b432126033ddd8629f69fae0be69af2437da61f1ab6", 0x34, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r2, r4, r5, 0x1) keyctl$get_keyring_id(0x0, r3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 02:15:56 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) 02:15:56 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:56 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 80) 02:15:56 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) (fail_nth: 2) 02:15:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 5) 02:15:56 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 80) 02:15:56 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) [ 2480.810404] blktrace: Concurrent blktraces are not allowed on loop6 [ 2480.811617] blktrace: Concurrent blktraces are not allowed on loop12 [ 2480.814410] FAULT_INJECTION: forcing a failure. [ 2480.814410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2480.814907] ieee802154 phy0 wpan0: encryption failed: -22 [ 2480.816191] CPU: 1 PID: 9801 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 2480.817951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.818432] blktrace: Concurrent blktraces are not allowed on loop12 [ 2480.819226] Call Trace: [ 2480.819253] dump_stack+0x107/0x167 [ 2480.819271] should_fail.cold+0x5/0xa [ 2480.819295] _copy_to_user+0x2e/0x180 [ 2480.819318] simple_read_from_buffer+0xcc/0x160 [ 2480.819339] proc_fail_nth_read+0x198/0x230 [ 2480.819356] ? proc_sessionid_read+0x230/0x230 [ 2480.819371] ? security_file_permission+0x24e/0x570 [ 2480.819385] ? perf_trace_initcall_start+0x101/0x380 [ 2480.819407] ? proc_sessionid_read+0x230/0x230 [ 2480.819420] vfs_read+0x228/0x580 [ 2480.819440] ksys_read+0x12d/0x260 [ 2480.819454] ? vfs_write+0xa30/0xa30 [ 2480.819476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2480.819493] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2480.819513] do_syscall_64+0x33/0x40 [ 2480.819528] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2480.819539] RIP: 0033:0x7f68afc0969c [ 2480.819556] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2480.819565] RSP: 002b:00007f68ad1cc170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2480.819583] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68afc0969c [ 2480.819592] RDX: 000000000000000f RSI: 00007f68ad1cc1e0 RDI: 0000000000000004 [ 2480.819601] RBP: 00007f68ad1cc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.819611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2480.819620] R13: 00007fff3e35224f R14: 00007f68ad1cc300 R15: 0000000000022000 [ 2480.845759] ieee802154 phy0 wpan0: encryption failed: -22 [ 2480.847265] FAULT_INJECTION: forcing a failure. [ 2480.847265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2480.849010] CPU: 1 PID: 9810 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2480.852688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.853889] Call Trace: [ 2480.854318] FAULT_INJECTION: forcing a failure. [ 2480.854318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2480.856032] dump_stack+0x107/0x167 [ 2480.856588] should_fail.cold+0x5/0xa [ 2480.857151] _copy_from_user+0x2e/0x1b0 [ 2480.857763] __copy_msghdr_from_user+0x91/0x4b0 [ 2480.858436] ? __ia32_sys_shutdown+0x80/0x80 [ 2480.859101] ? ieee802154_sock_release+0xb0/0xb0 [ 2480.859746] ? sock_sendmsg+0x55/0x190 [ 2480.860279] sendmsg_copy_msghdr+0xa1/0x160 [ 2480.864950] ? do_recvmmsg+0x6d0/0x6d0 [ 2480.865510] ? __lock_acquire+0x1657/0x5b00 [ 2480.866094] ___sys_sendmsg+0xc6/0x170 [ 2480.866615] ? sendmsg_copy_msghdr+0x160/0x160 [ 2480.868186] ? vmacache_find+0x55/0x2a0 [ 2480.868785] ? __lockdep_reset_lock+0x180/0x180 [ 2480.869513] ? find_held_lock+0x2c/0x110 [ 2480.870098] ? __might_fault+0xd3/0x180 [ 2480.870674] ? lock_downgrade+0x6d0/0x6d0 [ 2480.871259] ? asm_exc_page_fault+0x1e/0x30 [ 2480.871895] __sys_sendmmsg+0x195/0x470 [ 2480.872471] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2480.873728] ? lock_downgrade+0x6d0/0x6d0 [ 2480.874375] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2480.875006] ? wait_for_completion+0x270/0x270 [ 2480.875600] ? rcu_read_lock_any_held+0x75/0xa0 [ 2480.876197] ? vfs_write+0x354/0xa30 [ 2480.876695] ? fput_many+0x2f/0x1a0 [ 2480.877168] ? ksys_write+0x1a9/0x260 [ 2480.877677] __x64_sys_sendmmsg+0x99/0x100 [ 2480.878230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2480.878904] do_syscall_64+0x33/0x40 [ 2480.879398] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2480.880075] RIP: 0033:0x7f867efe2b19 [ 2480.880581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.886540] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2480.889159] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2480.891382] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2480.893763] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.896232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2480.901454] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2480.902910] CPU: 0 PID: 9807 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2480.903952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.905126] Call Trace: [ 2480.905536] dump_stack+0x107/0x167 [ 2480.906075] should_fail.cold+0x5/0xa [ 2480.906658] _copy_from_user+0x2e/0x1b0 [ 2480.907213] __copy_msghdr_from_user+0x91/0x4b0 [ 2480.907912] ? __ia32_sys_shutdown+0x80/0x80 [ 2480.908539] ? ieee802154_sock_release+0xb0/0xb0 [ 2480.909268] ? sock_sendmsg+0x55/0x190 [ 2480.909858] sendmsg_copy_msghdr+0xa1/0x160 [ 2480.910475] ? do_recvmmsg+0x6d0/0x6d0 [ 2480.911045] ? __lock_acquire+0x1657/0x5b00 [ 2480.911721] ___sys_sendmsg+0xc6/0x170 [ 2480.911790] FAULT_INJECTION: forcing a failure. [ 2480.911790] name failslab, interval 1, probability 0, space 0, times 0 [ 2480.912347] ? sendmsg_copy_msghdr+0x160/0x160 [ 2480.912363] ? vmacache_find+0x55/0x2a0 [ 2480.912389] ? __lockdep_reset_lock+0x180/0x180 [ 2480.915942] ? find_held_lock+0x2c/0x110 [ 2480.916521] ? __might_fault+0xd3/0x180 [ 2480.917095] ? lock_downgrade+0x6d0/0x6d0 [ 2480.917669] ? asm_exc_page_fault+0x1e/0x30 [ 2480.918302] __sys_sendmmsg+0x195/0x470 [ 2480.918879] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2480.919512] ? lock_downgrade+0x6d0/0x6d0 [ 2480.920157] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2480.920909] ? wait_for_completion+0x270/0x270 [ 2480.921575] ? rcu_read_lock_any_held+0x75/0xa0 [ 2480.922259] ? vfs_write+0x354/0xa30 [ 2480.922782] ? fput_many+0x2f/0x1a0 [ 2480.923288] ? ksys_write+0x1a9/0x260 [ 2480.923839] __x64_sys_sendmmsg+0x99/0x100 [ 2480.924451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2480.925113] do_syscall_64+0x33/0x40 [ 2480.925602] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2480.926258] RIP: 0033:0x7f8542659b19 [ 2480.926744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.929053] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2480.929971] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2480.930857] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2480.931907] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.932848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2480.933700] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2480.934588] CPU: 1 PID: 9811 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2480.934771] hpet: Lost 1 RTC interrupts [ 2480.935664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.935677] Call Trace: [ 2480.937718] dump_stack+0x107/0x167 [ 2480.938207] should_fail.cold+0x5/0xa [ 2480.938716] ? create_object.isra.0+0x3a/0xa20 [ 2480.939255] ieee802154 phy0 wpan0: encryption failed: -22 [ 2480.939312] should_failslab+0x5/0x20 [ 2480.940498] kmem_cache_alloc+0x5b/0x360 [ 2480.941045] create_object.isra.0+0x3a/0xa20 [ 2480.941617] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2480.942277] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 2480.942946] ? tcp_xmit_probe_skb+0x63/0x360 [ 2480.943531] __alloc_skb+0xb1/0x620 [ 2480.944010] tcp_xmit_probe_skb+0x63/0x360 [ 2480.944728] tcp_send_window_probe+0x130/0x180 [ 2480.946198] tcp_setsockopt+0x2315/0x2690 [ 2480.947482] ? tcp_sock_set_keepidle+0x40/0x40 [ 2480.948810] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2480.950339] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2480.951713] ? __fget_files+0x296/0x480 [ 2480.952305] ? selinux_socket_setsockopt+0x6a/0x80 [ 2480.953593] ? sock_common_setsockopt+0x2b/0x100 [ 2480.955019] __sys_setsockopt+0x180/0x2b0 [ 2480.956316] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2480.957749] ? __ia32_sys_recv+0x100/0x100 [ 2480.959082] ? fput_many+0x2f/0x1a0 [ 2480.960358] ? ksys_write+0x1a9/0x260 [ 2480.961575] __x64_sys_setsockopt+0xba/0x160 [ 2480.962899] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2480.964451] do_syscall_64+0x33/0x40 [ 2480.965607] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2480.967163] RIP: 0033:0x7f8f9b255b19 [ 2480.968295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.973880] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2480.976317] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2480.978550] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2480.980890] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2480.983089] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2480.985319] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 02:15:56 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 2480.990523] blktrace: Concurrent blktraces are not allowed on loop6 [ 2481.003768] ieee802154 phy0 wpan0: encryption failed: -22 02:15:56 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) 02:15:56 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) 02:15:56 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 81) 02:15:56 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) 02:15:56 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 81) [ 2481.133886] blktrace: Concurrent blktraces are not allowed on loop6 [ 2481.138877] blktrace: Concurrent blktraces are not allowed on loop6 [ 2481.144658] blktrace: Concurrent blktraces are not allowed on loop12 [ 2481.147463] blktrace: Concurrent blktraces are not allowed on loop12 02:15:56 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2481.160124] ieee802154 phy0 wpan0: encryption failed: -22 [ 2481.162895] FAULT_INJECTION: forcing a failure. [ 2481.162895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.164284] CPU: 0 PID: 9830 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2481.165040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.165844] Call Trace: [ 2481.166150] dump_stack+0x107/0x167 [ 2481.166633] should_fail.cold+0x5/0xa [ 2481.167165] _copy_from_user+0x2e/0x1b0 [ 2481.167645] __copy_msghdr_from_user+0x91/0x4b0 [ 2481.168117] ? __ia32_sys_shutdown+0x80/0x80 [ 2481.168570] ? ieee802154_sock_release+0xb0/0xb0 [ 2481.169213] ? sock_sendmsg+0x55/0x190 [ 2481.169727] sendmsg_copy_msghdr+0xa1/0x160 [ 2481.170309] ? do_recvmmsg+0x6d0/0x6d0 [ 2481.170814] ? __lock_acquire+0x1657/0x5b00 [ 2481.171302] ___sys_sendmsg+0xc6/0x170 [ 2481.171810] ? sendmsg_copy_msghdr+0x160/0x160 [ 2481.172391] ? vmacache_find+0x55/0x2a0 [ 2481.172859] ? __lockdep_reset_lock+0x180/0x180 [ 2481.173322] ? irqentry_enter+0x26/0x60 [ 2481.173731] ? find_held_lock+0x2c/0x110 [ 2481.174144] ? __might_fault+0xd3/0x180 [ 2481.174539] ? lock_downgrade+0x6d0/0x6d0 [ 2481.174956] ? lock_is_held_type+0xd2/0x110 [ 2481.175402] __sys_sendmmsg+0x195/0x470 [ 2481.175807] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2481.176235] ? lock_downgrade+0x6d0/0x6d0 [ 2481.176759] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2481.177508] ? wait_for_completion+0x270/0x270 [ 2481.178071] ? rcu_read_lock_any_held+0x75/0xa0 [ 2481.178576] ? vfs_write+0x354/0xa30 [ 2481.179024] ? fput_many+0x2f/0x1a0 [ 2481.179440] ? ksys_write+0x1a9/0x260 [ 2481.179895] __x64_sys_sendmmsg+0x99/0x100 [ 2481.180366] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.180991] do_syscall_64+0x33/0x40 [ 2481.181423] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2481.182015] RIP: 0033:0x7f867efe2b19 [ 2481.182441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.184532] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2481.185436] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2481.186341] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2481.187166] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.188000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.188845] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2481.189844] ieee802154 phy0 wpan0: encryption failed: -22 [ 2481.191401] FAULT_INJECTION: forcing a failure. [ 2481.191401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.193209] CPU: 1 PID: 9832 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2481.194346] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.194959] ieee802154 phy0 wpan0: encryption failed: -22 [ 2481.195575] Call Trace: [ 2481.195599] dump_stack+0x107/0x167 [ 2481.195625] should_fail.cold+0x5/0xa [ 2481.197727] _copy_from_user+0x2e/0x1b0 [ 2481.198278] __copy_msghdr_from_user+0x91/0x4b0 [ 2481.198916] ? __ia32_sys_shutdown+0x80/0x80 [ 2481.199519] ? ieee802154_sock_release+0xb0/0xb0 [ 2481.200159] ? sock_sendmsg+0x55/0x190 [ 2481.200712] sendmsg_copy_msghdr+0xa1/0x160 [ 2481.201342] ? do_recvmmsg+0x6d0/0x6d0 [ 2481.201921] ? __lock_acquire+0x1657/0x5b00 [ 2481.202602] ___sys_sendmsg+0xc6/0x170 [ 2481.203180] ? sendmsg_copy_msghdr+0x160/0x160 [ 2481.203799] ? vmacache_find+0x55/0x2a0 [ 2481.204400] ? __lockdep_reset_lock+0x180/0x180 [ 2481.205029] ? find_held_lock+0x2c/0x110 [ 2481.205579] ? __might_fault+0xd3/0x180 [ 2481.206114] ? lock_downgrade+0x6d0/0x6d0 [ 2481.206662] ? asm_exc_page_fault+0x1e/0x30 [ 2481.207282] __sys_sendmmsg+0x195/0x470 [ 2481.207846] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2481.208429] ? lock_downgrade+0x6d0/0x6d0 [ 2481.209143] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2481.209818] ? wait_for_completion+0x270/0x270 [ 2481.210435] ? rcu_read_lock_any_held+0x75/0xa0 [ 2481.211063] ? vfs_write+0x354/0xa30 [ 2481.211573] ? fput_many+0x2f/0x1a0 [ 2481.212061] ? ksys_write+0x1a9/0x260 [ 2481.212609] __x64_sys_sendmmsg+0x99/0x100 [ 2481.213239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.214014] do_syscall_64+0x33/0x40 [ 2481.214571] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2481.215334] RIP: 0033:0x7f8542659b19 [ 2481.215896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.218536] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2481.219650] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2481.220697] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2481.221742] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.222781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.223809] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:15:56 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) [ 2481.254316] ieee802154 phy0 wpan0: encryption failed: -22 [ 2481.259586] blktrace: Concurrent blktraces are not allowed on loop6 [ 2481.264342] blktrace: Concurrent blktraces are not allowed on loop6 [ 2496.867446] kmemleak: 56 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:16:21 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 82) 02:16:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) 02:16:21 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) 02:16:21 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 82) 02:16:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) 02:16:21 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x29480, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x40000, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) r5 = syz_open_dev$sg(&(0x7f0000000180), 0x81, 0x20140) dup(r5) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'}) 02:16:21 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x40000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:16:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 6) [ 2506.048327] ieee802154 phy0 wpan0: encryption failed: -22 [ 2506.063062] blktrace: Concurrent blktraces are not allowed on loop6 [ 2506.067024] ieee802154 phy0 wpan0: encryption failed: -22 [ 2506.067705] FAULT_INJECTION: forcing a failure. [ 2506.067705] name failslab, interval 1, probability 0, space 0, times 0 [ 2506.068517] FAULT_INJECTION: forcing a failure. [ 2506.068517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2506.069592] CPU: 0 PID: 9850 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2506.075240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2506.076355] Call Trace: [ 2506.076821] dump_stack+0x107/0x167 [ 2506.077315] should_fail.cold+0x5/0xa [ 2506.077863] ? __skb_ext_alloc+0x19/0x90 [ 2506.078380] should_failslab+0x5/0x20 [ 2506.078927] kmem_cache_alloc+0x5b/0x360 [ 2506.079454] __skb_ext_alloc+0x19/0x90 [ 2506.080001] skb_ext_add+0x508/0x670 [ 2506.080474] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2506.081263] ? mark_held_locks+0x9e/0xe0 [ 2506.081849] __alloc_skb+0x3c1/0x620 [ 2506.082332] tcp_xmit_probe_skb+0x63/0x360 [ 2506.082994] tcp_send_window_probe+0x130/0x180 [ 2506.083580] tcp_setsockopt+0x2315/0x2690 [ 2506.084173] ? tcp_sock_set_keepidle+0x40/0x40 [ 2506.084910] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2506.085589] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2506.086361] ? __fget_files+0x296/0x480 [ 2506.086949] ? selinux_socket_setsockopt+0x6a/0x80 [ 2506.087578] ? sock_common_setsockopt+0x2b/0x100 [ 2506.088241] __sys_setsockopt+0x180/0x2b0 [ 2506.088895] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2506.089482] ? __ia32_sys_recv+0x100/0x100 [ 2506.090089] ? fput_many+0x2f/0x1a0 [ 2506.090549] ? ksys_write+0x1a9/0x260 [ 2506.091103] __x64_sys_setsockopt+0xba/0x160 [ 2506.091649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.092336] do_syscall_64+0x33/0x40 [ 2506.092946] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2506.093585] RIP: 0033:0x7f8f9b255b19 [ 2506.094110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.096636] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2506.097832] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2506.098833] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2506.099805] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2506.100827] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2506.101836] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 [ 2506.102867] CPU: 1 PID: 9844 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2506.103008] hpet: Lost 1 RTC interrupts [ 2506.113785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2506.113801] Call Trace: [ 2506.121094] dump_stack+0x107/0x167 [ 2506.121575] should_fail.cold+0x5/0xa [ 2506.122090] _copy_from_user+0x2e/0x1b0 [ 2506.122618] __copy_msghdr_from_user+0x91/0x4b0 [ 2506.123224] ? __ia32_sys_shutdown+0x80/0x80 [ 2506.123819] ? ieee802154_sock_release+0xb0/0xb0 [ 2506.124439] ? sock_sendmsg+0x55/0x190 [ 2506.124984] sendmsg_copy_msghdr+0xa1/0x160 [ 2506.125550] ? do_recvmmsg+0x6d0/0x6d0 [ 2506.126077] ? __lock_acquire+0x1657/0x5b00 [ 2506.126658] ___sys_sendmsg+0xc6/0x170 [ 2506.127169] ? sendmsg_copy_msghdr+0x160/0x160 [ 2506.127761] ? vmacache_find+0x55/0x2a0 [ 2506.128287] ? __lockdep_reset_lock+0x180/0x180 [ 2506.128926] ? find_held_lock+0x2c/0x110 [ 2506.129466] ? __might_fault+0xd3/0x180 [ 2506.129984] ? lock_downgrade+0x6d0/0x6d0 [ 2506.130496] blktrace: Concurrent blktraces are not allowed on loop12 [ 2506.130534] ? asm_exc_page_fault+0x1e/0x30 [ 2506.137505] __sys_sendmmsg+0x195/0x470 [ 2506.138030] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2506.138565] ? lock_downgrade+0x6d0/0x6d0 [ 2506.139122] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2506.139759] blktrace: Concurrent blktraces are not allowed on loop12 [ 2506.140558] ? wait_for_completion+0x270/0x270 [ 2506.141186] ? rcu_read_lock_any_held+0x75/0xa0 [ 2506.141779] ? vfs_write+0x354/0xa30 [ 2506.142247] ? fput_many+0x2f/0x1a0 [ 2506.142718] ? ksys_write+0x1a9/0x260 [ 2506.143206] __x64_sys_sendmmsg+0x99/0x100 [ 2506.143709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.144328] do_syscall_64+0x33/0x40 [ 2506.144784] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2506.145425] RIP: 0033:0x7f8542659b19 [ 2506.145887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.148570] ieee802154 phy0 wpan0: encryption failed: -22 [ 2506.154177] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2506.154197] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2506.154206] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2506.154216] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2506.154224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2506.154234] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2506.158638] blktrace: Concurrent blktraces are not allowed on loop6 [ 2506.186619] ieee802154 phy0 wpan0: encryption failed: -22 [ 2506.192569] FAULT_INJECTION: forcing a failure. [ 2506.192569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2506.194799] CPU: 0 PID: 9858 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2506.195801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2506.196859] Call Trace: [ 2506.197419] dump_stack+0x107/0x167 [ 2506.197899] should_fail.cold+0x5/0xa [ 2506.198398] _copy_from_user+0x2e/0x1b0 [ 2506.198925] __copy_msghdr_from_user+0x91/0x4b0 [ 2506.199514] ? __ia32_sys_shutdown+0x80/0x80 [ 2506.200097] ? ieee802154_sock_release+0xb0/0xb0 [ 2506.200705] ? sock_sendmsg+0x55/0x190 [ 2506.201264] sendmsg_copy_msghdr+0xa1/0x160 [ 2506.201821] ? do_recvmmsg+0x6d0/0x6d0 [ 2506.202338] ? __lock_acquire+0x1657/0x5b00 [ 2506.202934] ___sys_sendmsg+0xc6/0x170 [ 2506.203476] ? sendmsg_copy_msghdr+0x160/0x160 [ 2506.204064] ? vmacache_find+0x55/0x2a0 [ 2506.204593] ? __lockdep_reset_lock+0x180/0x180 [ 2506.205270] ? find_held_lock+0x2c/0x110 [ 2506.205822] ? __might_fault+0xd3/0x180 [ 2506.206348] ? lock_downgrade+0x6d0/0x6d0 [ 2506.206896] ? asm_exc_page_fault+0x1e/0x30 [ 2506.207499] __sys_sendmmsg+0x195/0x470 [ 2506.208039] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2506.208607] ? lock_downgrade+0x6d0/0x6d0 [ 2506.209209] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2506.213469] ? wait_for_completion+0x270/0x270 [ 2506.214066] ? rcu_read_lock_any_held+0x75/0xa0 [ 2506.214662] ? vfs_write+0x354/0xa30 [ 2506.215158] ? fput_many+0x2f/0x1a0 [ 2506.215638] ? ksys_write+0x1a9/0x260 [ 2506.216152] __x64_sys_sendmmsg+0x99/0x100 [ 2506.216691] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.217387] do_syscall_64+0x33/0x40 [ 2506.217863] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2506.218488] RIP: 0033:0x7f867efe2b19 [ 2506.218955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.221251] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2506.222225] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2506.223127] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2506.224014] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2506.237100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2506.238026] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2506.239181] hpet: Lost 1 RTC interrupts 02:16:21 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) 02:16:21 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) 02:16:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) 02:16:21 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x44000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2506.307052] blktrace: Concurrent blktraces are not allowed on loop12 02:16:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 7) [ 2506.323991] blktrace: Concurrent blktraces are not allowed on loop12 [ 2506.327555] blktrace: Concurrent blktraces are not allowed on loop6 [ 2506.339435] blktrace: Concurrent blktraces are not allowed on loop6 [ 2506.348990] ieee802154 phy0 wpan0: encryption failed: -22 02:16:21 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) [ 2506.385548] FAULT_INJECTION: forcing a failure. [ 2506.385548] name failslab, interval 1, probability 0, space 0, times 0 [ 2506.389254] CPU: 1 PID: 9874 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2506.391333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2506.394037] Call Trace: [ 2506.394843] dump_stack+0x107/0x167 [ 2506.395965] should_fail.cold+0x5/0xa [ 2506.397314] ? create_object.isra.0+0x3a/0xa20 [ 2506.397955] should_failslab+0x5/0x20 [ 2506.398496] kmem_cache_alloc+0x5b/0x360 [ 2506.399041] create_object.isra.0+0x3a/0xa20 [ 2506.399627] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2506.400313] kmem_cache_alloc+0x159/0x360 [ 2506.401285] __skb_ext_alloc+0x19/0x90 [ 2506.401878] skb_ext_add+0x508/0x670 [ 2506.402499] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2506.403308] __alloc_skb+0x3c1/0x620 [ 2506.403865] tcp_xmit_probe_skb+0x63/0x360 [ 2506.404801] tcp_send_window_probe+0x130/0x180 [ 2506.406274] tcp_setsockopt+0x2315/0x2690 [ 2506.406950] ? tcp_sock_set_keepidle+0x40/0x40 [ 2506.407083] ieee802154 phy0 wpan0: encryption failed: -22 [ 2506.407730] ? selinux_secmark_relabel_packet+0xd0/0xd0 [ 2506.407750] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 2506.407771] ? __fget_files+0x296/0x480 [ 2506.412083] ? selinux_socket_setsockopt+0x6a/0x80 [ 2506.413107] ? sock_common_setsockopt+0x2b/0x100 [ 2506.413976] __sys_setsockopt+0x180/0x2b0 [ 2506.414750] ? sock_common_recvmsg+0x1a0/0x1a0 [ 2506.415437] ? __ia32_sys_recv+0x100/0x100 [ 2506.416368] ? fput_many+0x2f/0x1a0 [ 2506.416909] ? ksys_write+0x1a9/0x260 [ 2506.417538] __x64_sys_setsockopt+0xba/0x160 [ 2506.418306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.419202] do_syscall_64+0x33/0x40 [ 2506.419753] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2506.420562] RIP: 0033:0x7f8f9b255b19 [ 2506.421241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.424465] RSP: 002b:00007f8f987cb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2506.425708] RAX: ffffffffffffffda RBX: 00007f8f9b368f60 RCX: 00007f8f9b255b19 [ 2506.427875] RDX: 0000000000000013 RSI: 0000000000000006 RDI: 0000000000000004 [ 2506.429030] RBP: 00007f8f987cb1d0 R08: 0000000000000004 R09: 0000000000000000 [ 2506.429949] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2506.430988] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 02:16:21 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) [ 2506.443384] blktrace: Concurrent blktraces are not allowed on loop12 02:16:22 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) [ 2506.458538] blktrace: Concurrent blktraces are not allowed on loop12 [ 2506.507862] blktrace: Concurrent blktraces are not allowed on loop6 [ 2506.515396] blktrace: Concurrent blktraces are not allowed on loop6 [ 2521.976989] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:16:46 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) 02:16:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r1 = fork() setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r1, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x93, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev2(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 2531.238671] blktrace: Concurrent blktraces are not allowed on loop12 [ 2531.240184] blktrace: Concurrent blktraces are not allowed on loop12 02:16:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) (fail_nth: 8) 02:16:46 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 83) 02:16:46 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) 02:16:46 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 83) 02:16:46 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x48000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:16:46 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) [ 2531.252196] blktrace: Concurrent blktraces are not allowed on loop6 [ 2531.262079] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.265131] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.266584] FAULT_INJECTION: forcing a failure. [ 2531.266584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2531.268189] CPU: 1 PID: 9909 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2531.269043] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.269082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.269093] Call Trace: [ 2531.271331] dump_stack+0x107/0x167 [ 2531.271836] should_fail.cold+0x5/0xa [ 2531.271852] FAULT_INJECTION: forcing a failure. [ 2531.271852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2531.274060] _copy_from_user+0x2e/0x1b0 [ 2531.274801] __copy_msghdr_from_user+0x91/0x4b0 [ 2531.275441] ? __ia32_sys_shutdown+0x80/0x80 [ 2531.276061] ? ieee802154_sock_release+0xb0/0xb0 [ 2531.276706] ? sock_sendmsg+0x55/0x190 [ 2531.277268] sendmsg_copy_msghdr+0xa1/0x160 [ 2531.277861] ? do_recvmmsg+0x6d0/0x6d0 [ 2531.278399] ? __lock_acquire+0x1657/0x5b00 [ 2531.279013] ___sys_sendmsg+0xc6/0x170 [ 2531.279549] ? sendmsg_copy_msghdr+0x160/0x160 [ 2531.280160] ? vmacache_find+0x55/0x2a0 [ 2531.280710] ? __lockdep_reset_lock+0x180/0x180 [ 2531.281613] ? find_held_lock+0x2c/0x110 [ 2531.282185] ? __might_fault+0xd3/0x180 [ 2531.282738] ? lock_downgrade+0x6d0/0x6d0 [ 2531.283286] ? asm_exc_page_fault+0x1e/0x30 [ 2531.283917] __sys_sendmmsg+0x195/0x470 [ 2531.284471] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2531.285074] ? lock_downgrade+0x6d0/0x6d0 [ 2531.285779] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2531.286443] ? wait_for_completion+0x270/0x270 [ 2531.287066] ? rcu_read_lock_any_held+0x75/0xa0 [ 2531.287697] ? vfs_write+0x354/0xa30 [ 2531.288414] ? fput_many+0x2f/0x1a0 [ 2531.288915] ? ksys_write+0x1a9/0x260 [ 2531.291895] __x64_sys_sendmmsg+0x99/0x100 [ 2531.292482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2531.293179] do_syscall_64+0x33/0x40 [ 2531.293710] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2531.294411] RIP: 0033:0x7f8542659b19 [ 2531.294923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2531.297553] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2531.298574] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2531.299528] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2531.300661] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.301631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2531.302574] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2531.303580] CPU: 0 PID: 9897 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2531.304603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.305731] Call Trace: [ 2531.306105] dump_stack+0x107/0x167 [ 2531.306602] should_fail.cold+0x5/0xa [ 2531.307132] _copy_from_user+0x2e/0x1b0 [ 2531.307688] __copy_msghdr_from_user+0x91/0x4b0 [ 2531.308319] ? __ia32_sys_shutdown+0x80/0x80 [ 2531.308932] ? ieee802154_sock_release+0xb0/0xb0 [ 2531.309600] ? sock_sendmsg+0x55/0x190 [ 2531.310143] sendmsg_copy_msghdr+0xa1/0x160 [ 2531.310726] ? do_recvmmsg+0x6d0/0x6d0 [ 2531.311259] ? __lock_acquire+0x1657/0x5b00 [ 2531.311871] ___sys_sendmsg+0xc6/0x170 [ 2531.312410] ? sendmsg_copy_msghdr+0x160/0x160 [ 2531.313023] ? vmacache_find+0x55/0x2a0 [ 2531.313608] ? __lockdep_reset_lock+0x180/0x180 [ 2531.314251] ? find_held_lock+0x2c/0x110 [ 2531.314808] ? __might_fault+0xd3/0x180 [ 2531.315349] ? lock_downgrade+0x6d0/0x6d0 [ 2531.315913] ? asm_exc_page_fault+0x1e/0x30 [ 2531.316536] __sys_sendmmsg+0x195/0x470 [ 2531.317087] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2531.317765] ? lock_downgrade+0x6d0/0x6d0 [ 2531.318358] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2531.319017] ? wait_for_completion+0x270/0x270 [ 2531.319646] ? rcu_read_lock_any_held+0x75/0xa0 [ 2531.320271] ? vfs_write+0x354/0xa30 [ 2531.320791] ? fput_many+0x2f/0x1a0 [ 2531.321306] ? ksys_write+0x1a9/0x260 [ 2531.321845] __x64_sys_sendmmsg+0x99/0x100 [ 2531.322422] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2531.323108] do_syscall_64+0x33/0x40 [ 2531.323625] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2531.324320] RIP: 0033:0x7f867efe2b19 [ 2531.324830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2531.327267] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2531.328290] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2531.329244] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2531.330191] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.331120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2531.332035] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2531.333173] hpet: Lost 1 RTC interrupts [ 2531.340857] blktrace: Concurrent blktraces are not allowed on loop6 02:16:46 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) [ 2531.349863] FAULT_INJECTION: forcing a failure. [ 2531.349863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2531.351606] CPU: 0 PID: 9914 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2531.352487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.353620] Call Trace: [ 2531.353993] dump_stack+0x107/0x167 [ 2531.354476] should_fail.cold+0x5/0xa [ 2531.354965] _copy_to_user+0x2e/0x180 [ 2531.355592] simple_read_from_buffer+0xcc/0x160 [ 2531.356195] proc_fail_nth_read+0x198/0x230 [ 2531.356753] ? proc_sessionid_read+0x230/0x230 [ 2531.357383] ? security_file_permission+0x24e/0x570 [ 2531.358140] ? perf_trace_initcall_start+0x101/0x380 [ 2531.358798] ? proc_sessionid_read+0x230/0x230 [ 2531.359387] vfs_read+0x228/0x580 [ 2531.359833] ksys_read+0x12d/0x260 [ 2531.360285] ? vfs_write+0xa30/0xa30 [ 2531.360772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2531.361496] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2531.362150] do_syscall_64+0x33/0x40 [ 2531.362635] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2531.363293] RIP: 0033:0x7f8f9b20869c [ 2531.363781] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2531.366157] RSP: 002b:00007f8f987cb170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2531.367132] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8f9b20869c [ 2531.368025] RDX: 000000000000000f RSI: 00007f8f987cb1e0 RDI: 0000000000000005 [ 2531.368931] RBP: 00007f8f987cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.369866] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2531.370775] R13: 00007ffc9cee395f R14: 00007f8f987cb300 R15: 0000000000022000 02:16:46 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) [ 2531.395403] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.423898] blktrace: Concurrent blktraces are not allowed on loop12 02:16:46 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) 02:16:47 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) 02:16:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:16:47 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) 02:16:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x2, 0x0, 0x0, 0x0, 0x2, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000000c0)="a3", 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x12, r3, 0x0) r4 = syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)="ae6643c9faba9852d4e632e7ad5cc995b84bce7404ed0b8fd87690a7e024d038471f6e4cdfe7d96dc33820d808023a8d9096707de8a54416fda1436061f6a39601f2557b5a9d4511", 0x48, 0x5}, {&(0x7f0000000280)="d234541aaed83aa958c1347fa068b21f7fe5afe1b3eeb99fdc942750835dca9bb257c0a3fb147da4212d1f4c04fad8e6c58f9f031b653b6eea185ededdc47a478e2464519fd1ee864ea7bdca01e3fb587c91ce498d8320e807aa36768361e3dcdfbef671402f6a3cbdd649f9d41d6ed2f57f23075df12ec48e5505690424db1395b1003f79b3f10744cd3d9a2efe380883d6be0c033c55f17db1d16c6e3ab4218c4c450ae16b7f24cce11fdf0a6c5c1c74e2498407a45c9a127c", 0xba, 0xea0}, {&(0x7f0000000340)="6ee08f9be8b16e68a82babb2c13f379e6d3fd18d77bf8af6a35f5fb6ea4a4489e26f13eed97c7ac6b0680e25fdd2160c1335dc00034af41108f9c5364f310291c19bf35f69827435d6fd5242e2d429c5de0950bce1748b7dcc5437ad3b5b7d96d8ca2e0792df3dbe299a462fd7f52a96db9a1aca8289e761b28c3bddb9b6d8b4b44ec79c5b1c522e2c3eecfc5703706c09067ebf6441038fab8f8cb871b8289417c257b890376b8e6a8b225b27427f121a3957b0ee19624d7763473f751ec5190f4a32dd63b4d054620c4e02345d8c816ee67e589e8f6b54b4a483ae4713904e3a38f49b2abe0821", 0xe8, 0x1}], 0x30000, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, '+\xa3,'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@dont_hash}, {@uid_gt={'uid>', 0xee01}}, {@euid_lt}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x3e, 0x37, 0x34, 0x35, 0x7, 0x61, 0x39], 0x2d, [0x50, 0x61, 0x0, 0x34], 0x2d, [0x65, 0x38, 0x32, 0x3], 0x2d, [0x36, 0x63, 0x67, 0x66], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x0, 0x62, 0x38, 0x66]}}}]}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r4, 0x5, 0xffffffff, 0x2, 0xffffffffffff06ca}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000c80)=ANY=[@ANYBLOB="01160000010000001800000020f3529eb21e2d1335a5910fe27ecc3c83b0b58ea410cc70f976d63fc117ca4824751208b58600ecfde3b51a46ed581ff42e722564e6eaa540878044da20edd4913811e31534202fe445a0e35218a9c39afffbbd8696fe5ce5c2537443e5ccef6f6f3dbc0e39892846684ea30346f29fb46224d455ccfd617b8fc3cc3353483d8ae39a40cfdd48708e1bf00e2a7c", @ANYRES32=r1, @ANYBLOB="040000008000653000"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r6, &(0x7f0000000100), &(0x7f0000000180)=0xc) io_submit(0x0, 0x6, &(0x7f0000000c40)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x5, 0x4, 0xffffffffffffffff, &(0x7f00000005c0)="836ffe12ffb6f8247f2111f5d14d5842d7726afc093c68618cd52365bb77bd666f241e59b01b751fa69d7c6e637adfb52011a5da4de787000e53e6eb6505d8adbdcc3d6d6d58393582170499a198a115faf0352324bc7e9d0444f7d0cd2f579bb74bf161c1907ce5e578b8800155220cb9c05e8e6706975dec174df4c98fdebacb41a4fa2b0abd19c01f837fd38e8cbab7620efcf656", 0x96, 0x1, 0x0, 0x2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000000700)="ced7e49c9795f45691fa7d2a791ec06db98bfa4a2f014163f7854d3c79b72a33f1816c9609d7234f7ccdbf79d411c958ce0b3ec8cf18907f0e45e3f27cd1bef542e971f574921cf5a93a563a5152a666bbb8cf03ca3d24e4e2d65bf53d23948dc7b89c47897d51c720159f2e3fb05900c39868df9a85408b0510a3c7219b0023f90f815578ec", 0x86, 0x70, 0x0, 0x3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x1b, 0x7, r1, &(0x7f0000000800)="4870956bc6e35cde0df530f35abed49905fa57b6aea14d189bfe0c355a063567640ed9fd644fa044ec29c016d62df509190cb00a5370e6de18379ce776066270b5610a2742f0b8818891db6c54656457cbac4bbdb5c07b35a0609ead03e3d4561916651de736fa2790ea73042f76c506a46513088115388d7873a0037c8aa5d41a403999bb54b64e1e2275ce91fad8210ad91e6ba3524a2d8df37e9fdae969344b47d6a4c13d8ca61b5a3976d25e1be5855835dcd4c1f194a9e217bcfd276b526c6cb36c3062298ec15ce2b046a1374797be8773aa608eca0566d05a86bcc5ab8c94566bc60817129543b58dc006c45f224b", 0xf2, 0x0, 0x0, 0x3}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000980)='6', 0x1, 0x401, 0x0, 0x1, r0}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xfffa, r3, &(0x7f0000000a00)="86921fb81b6fad1b4df50a653699823f966a7940df6d5b967833af04763671621db46917dabe0bb3386262bdd74a1189e2b620acb2849a29b8677610bb89a2f2d44f61b9c31a4fec7752bb957f3a", 0x4e, 0x3, 0x0, 0x2, r2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x1, 0x4, r5, &(0x7f0000000b00)="2db445cb157ef7bb03883c01a05b60085268c8d006e3480c30f894cb22f764bec1fd7d637380cff8793edf7c30628776e6dd499ecd16e313301a91522624c75c4e5bcd53b369282dfe0c7605582514b4d53074572a8acb90452cd797c1566dbc713a35d1480671ad63fb6312c47031d24bd6966d14f80a9d02fa229fd7cdd12d285d6b18bb5d964451fd256ea2f245f4d371ec939a02d46d12258ee7e9026742d52347fbe7131702c11bcb66d10e5f884977d2d37e7afda5b84b548506752158bd629d8bd817c2f225ebf0cee677d1ef162406f7fa0918", 0xd7, 0x97d, 0x0, 0x3, r6}]) dup2(r2, r1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r8, 0x0, r7, 0x0, 0x200f5ef, 0x0) [ 2531.519469] blktrace: Concurrent blktraces are not allowed on loop6 [ 2531.523792] blktrace: Concurrent blktraces are not allowed on loop6 02:16:47 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 84) 02:16:47 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2531.565021] blktrace: Concurrent blktraces are not allowed on loop12 02:16:47 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) [ 2531.572829] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.577394] blktrace: Concurrent blktraces are not allowed on loop12 [ 2531.585136] FAULT_INJECTION: forcing a failure. [ 2531.585136] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2531.589264] CPU: 1 PID: 9935 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2531.594525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.595693] Call Trace: [ 2531.596079] dump_stack+0x107/0x167 [ 2531.596554] should_fail.cold+0x5/0xa [ 2531.597094] _copy_from_user+0x2e/0x1b0 [ 2531.597645] __copy_msghdr_from_user+0x91/0x4b0 [ 2531.598241] ? __ia32_sys_shutdown+0x80/0x80 [ 2531.598810] ? ieee802154_sock_release+0xb0/0xb0 [ 2531.599424] ? sock_sendmsg+0x55/0x190 [ 2531.599988] sendmsg_copy_msghdr+0xa1/0x160 [ 2531.600753] ? do_recvmmsg+0x6d0/0x6d0 [ 2531.601406] ? __lock_acquire+0x1657/0x5b00 [ 2531.601979] ___sys_sendmsg+0xc6/0x170 [ 2531.602491] ? sendmsg_copy_msghdr+0x160/0x160 [ 2531.603085] ? __lockdep_reset_lock+0x180/0x180 [ 2531.603681] ? trace_hardirqs_on+0x5b/0x180 [ 2531.604271] ? find_held_lock+0x2c/0x110 [ 2531.604820] ? __might_fault+0xd3/0x180 [ 2531.605362] ? lock_downgrade+0x6d0/0x6d0 [ 2531.605911] ? io_schedule_timeout+0x140/0x140 [ 2531.606780] __sys_sendmmsg+0x195/0x470 [ 2531.607783] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2531.608903] ? lock_downgrade+0x6d0/0x6d0 [ 2531.609680] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2531.610320] ? wait_for_completion+0x270/0x270 [ 2531.610934] ? rcu_read_lock_any_held+0x75/0xa0 [ 2531.611541] ? vfs_write+0x354/0xa30 [ 2531.612052] ? fput_many+0x2f/0x1a0 [ 2531.612546] ? ksys_write+0x1a9/0x260 [ 2531.613058] __x64_sys_sendmmsg+0x99/0x100 [ 2531.613680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2531.614347] do_syscall_64+0x33/0x40 [ 2531.614846] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2531.615508] RIP: 0033:0x7f867efe2b19 [ 2531.615996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2531.622427] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2531.623410] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2531.624368] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2531.625511] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.627277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2531.629055] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2531.642485] ieee802154 phy0 wpan0: encryption failed: -22 02:16:47 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) [ 2531.664577] blktrace: Concurrent blktraces are not allowed on loop6 [ 2531.676802] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.685371] blktrace: Concurrent blktraces are not allowed on loop6 02:16:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x29, 0x13, &(0x7f0000000040), 0x4) 02:16:47 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 84) [ 2531.833175] ieee802154 phy0 wpan0: encryption failed: -22 [ 2531.844239] FAULT_INJECTION: forcing a failure. [ 2531.844239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2531.846911] CPU: 1 PID: 9951 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2531.847836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2531.850823] Call Trace: [ 2531.851683] dump_stack+0x107/0x167 [ 2531.852861] should_fail.cold+0x5/0xa [ 2531.854140] _copy_from_user+0x2e/0x1b0 [ 2531.855407] __copy_msghdr_from_user+0x91/0x4b0 [ 2531.856593] ? __ia32_sys_shutdown+0x80/0x80 [ 2531.857773] ? ieee802154_sock_release+0xb0/0xb0 [ 2531.859003] ? sock_sendmsg+0x55/0x190 [ 2531.860011] sendmsg_copy_msghdr+0xa1/0x160 [ 2531.861134] ? do_recvmmsg+0x6d0/0x6d0 [ 2531.862371] ? __lock_acquire+0x1657/0x5b00 [ 2531.863545] ___sys_sendmsg+0xc6/0x170 [ 2531.864595] ? sendmsg_copy_msghdr+0x160/0x160 [ 2531.865965] ? __lockdep_reset_lock+0x180/0x180 [ 2531.867215] ? trace_hardirqs_on+0x5b/0x180 [ 2531.868302] ? find_held_lock+0x2c/0x110 [ 2531.869300] ? __might_fault+0xd3/0x180 [ 2531.870372] ? lock_downgrade+0x6d0/0x6d0 [ 2531.871489] ? io_schedule_timeout+0x140/0x140 [ 2531.872831] __sys_sendmmsg+0x195/0x470 [ 2531.873549] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2531.874374] ? lock_downgrade+0x6d0/0x6d0 [ 2531.875791] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2531.876825] ? wait_for_completion+0x270/0x270 [ 2531.878372] ? rcu_read_lock_any_held+0x75/0xa0 [ 2531.879892] ? vfs_write+0x354/0xa30 [ 2531.881133] ? fput_many+0x2f/0x1a0 [ 2531.882575] ? ksys_write+0x1a9/0x260 [ 2531.886107] __x64_sys_sendmmsg+0x99/0x100 [ 2531.886739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2531.887490] do_syscall_64+0x33/0x40 [ 2531.888034] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2531.888785] RIP: 0033:0x7f8542659b19 [ 2531.889361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2531.892019] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2531.893155] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2531.894221] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2531.895296] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2531.896350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2531.897475] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2547.084537] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2556.259484] ieee802154 phy0 wpan0: encryption failed: -22 [ 2556.273397] blktrace: Concurrent blktraces are not allowed on loop6 [ 2556.277469] Restarting kernel threads ... [ 2556.278313] blktrace: Concurrent blktraces are not allowed on loop6 [ 2556.281389] done. 02:17:11 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x53120000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:17:11 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) 02:17:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)={0x80000000}) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000001180)=[{&(0x7f0000000100)="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", 0x1000, 0x5}, {&(0x7f0000001100)="3c996ace4b8c2be7bc7e83fdb7df45b17f619d7a201a0eb8fa6db7e63ee6ff7895083fddaaeac7265a892f92ce5ee7280f965c0445b66cda617fa1257526f0c1e1e6d88c3d56340cab6aec980d1f77491bc411a357a03102da9487c6075c04c4aa919b46b9ca8b", 0x67, 0x8}], 0x801000, &(0x7f00000011c0)=ANY=[@ANYBLOB='huge=always,huge=never,mpol=bind=static:7,6264-:7,mode=00000000000000000000006,gid=', @ANYRESHEX=0xee01, @ANYBLOB=',seclabel,seclabel,fsmagic=0x0000000000000000,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2cb4713aacb226c2ff6673757569643d35375536623039352d383638352d305739302d650200392d6306"]) lseek(r2, 0x6, 0x4) 02:17:11 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 85) 02:17:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) 02:17:11 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) 02:17:11 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 85) [ 2556.300488] ieee802154 phy0 wpan0: encryption failed: -22 [ 2556.305464] ieee802154 phy0 wpan0: encryption failed: -22 [ 2556.307547] Restarting kernel threads ... [ 2556.310952] blktrace: Concurrent blktraces are not allowed on loop12 [ 2556.311908] FAULT_INJECTION: forcing a failure. 02:17:11 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) [ 2556.311908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2556.314143] CPU: 0 PID: 9972 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2556.315250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.315531] FAULT_INJECTION: forcing a failure. [ 2556.315531] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2556.316389] Call Trace: [ 2556.316420] dump_stack+0x107/0x167 [ 2556.316457] should_fail.cold+0x5/0xa [ 2556.319334] _copy_from_user+0x2e/0x1b0 [ 2556.319912] __copy_msghdr_from_user+0x91/0x4b0 [ 2556.320537] ? __ia32_sys_shutdown+0x80/0x80 [ 2556.321151] ? ieee802154_sock_release+0xb0/0xb0 [ 2556.321873] ? sock_sendmsg+0x55/0x190 [ 2556.322439] sendmsg_copy_msghdr+0xa1/0x160 [ 2556.323039] ? do_recvmmsg+0x6d0/0x6d0 [ 2556.323563] ? __lock_acquire+0x1657/0x5b00 [ 2556.324169] ___sys_sendmsg+0xc6/0x170 [ 2556.324698] ? sendmsg_copy_msghdr+0x160/0x160 [ 2556.325312] ? vmacache_find+0x55/0x2a0 [ 2556.325876] ? __lockdep_reset_lock+0x180/0x180 [ 2556.326528] ? find_held_lock+0x2c/0x110 [ 2556.327093] ? __might_fault+0xd3/0x180 [ 2556.327628] ? lock_downgrade+0x6d0/0x6d0 [ 2556.328178] ? asm_exc_page_fault+0x1e/0x30 [ 2556.328791] __sys_sendmmsg+0x195/0x470 [ 2556.329339] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2556.334035] ? lock_downgrade+0x6d0/0x6d0 [ 2556.334638] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2556.335295] ? wait_for_completion+0x270/0x270 [ 2556.335956] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.336615] ? vfs_write+0x354/0xa30 [ 2556.337127] ? fput_many+0x2f/0x1a0 [ 2556.337689] ? ksys_write+0x1a9/0x260 [ 2556.338235] __x64_sys_sendmmsg+0x99/0x100 [ 2556.338846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.339544] do_syscall_64+0x33/0x40 [ 2556.340054] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2556.340786] RIP: 0033:0x7f867efe2b19 [ 2556.341299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.343818] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2556.344875] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2556.345844] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2556.346787] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.347730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.348729] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2556.349752] CPU: 1 PID: 9975 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2556.349949] hpet: Lost 1 RTC interrupts [ 2556.350919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.350930] Call Trace: [ 2556.353136] dump_stack+0x107/0x167 [ 2556.353637] should_fail.cold+0x5/0xa [ 2556.354251] _copy_from_user+0x2e/0x1b0 [ 2556.354964] __copy_msghdr_from_user+0x91/0x4b0 [ 2556.355563] ? __ia32_sys_shutdown+0x80/0x80 [ 2556.356193] ? ieee802154_sock_release+0xb0/0xb0 [ 2556.356869] ? sock_sendmsg+0x55/0x190 [ 2556.357354] sendmsg_copy_msghdr+0xa1/0x160 [ 2556.362562] ? do_recvmmsg+0x6d0/0x6d0 [ 2556.363094] ? __lock_acquire+0x1657/0x5b00 [ 2556.363658] ___sys_sendmsg+0xc6/0x170 [ 2556.364150] ? sendmsg_copy_msghdr+0x160/0x160 [ 2556.364719] ? vmacache_find+0x55/0x2a0 [ 2556.365220] ? __lockdep_reset_lock+0x180/0x180 [ 2556.365852] ? find_held_lock+0x2c/0x110 [ 2556.365860] done. [ 2556.366446] ? __might_fault+0xd3/0x180 [ 2556.366464] ? lock_downgrade+0x6d0/0x6d0 [ 2556.366484] ? asm_exc_page_fault+0x1e/0x30 [ 2556.366562] __sys_sendmmsg+0x195/0x470 [ 2556.366591] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2556.366614] ? lock_downgrade+0x6d0/0x6d0 [ 2556.370062] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2556.370684] ? wait_for_completion+0x270/0x270 [ 2556.371183] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.371669] ? vfs_write+0x354/0xa30 [ 2556.372083] ? fput_many+0x2f/0x1a0 [ 2556.372479] ? ksys_write+0x1a9/0x260 [ 2556.372949] __x64_sys_sendmmsg+0x99/0x100 [ 2556.373432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.374042] do_syscall_64+0x33/0x40 [ 2556.374444] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2556.374992] RIP: 0033:0x7f8542659b19 [ 2556.375392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.377381] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2556.378306] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2556.379426] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2556.380377] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.381160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.382273] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2556.387882] blktrace: Concurrent blktraces are not allowed on loop12 [ 2556.409813] ieee802154 phy0 wpan0: encryption failed: -22 02:17:12 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') writev(r0, &(0x7f0000002b80)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000040)="9a63ff7d13610113b760b2fcb1087ebc94684c3bc5bf82aad859bd91656ab5e019c704904a", 0x25}, {&(0x7f0000000080)="66a13e702ec048e5f3b3c55bbe905d5033f37063f737", 0x16}, {&(0x7f0000001880)="bd5bf29e670ee08446a3640b633d6d112ae3c0f3eb41d05ef0d89a2eeff6e7d3a36799aa2485428367089ccdb423fbb4064956db1f660d907b2343e0fb69be2a309c457f4da70846da74565e253d60159683cb29868628147fd89a12ba13ff05725f60c068dd56f72f6f614a3d79f4a09bc2862dc47f506f812dcf62121854998e811e8f8935f939126ae09d657918caf9953365b752a43e92607709a83f89aab6a25c993221f70c92f373d18f2d59a53d159a0ead0f6925f860daa8e14aec6d052b3fd518e4e1e4c995f4c266ead12d27b2ed5f2e62", 0xd6}, {&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="843ff111a70acf87a23f993841c210d4c5d8088d0095efbfff45408aabc3b9e2457f91df172f5d01fc2d33035c60199aaaf29c7cad4454c90187ef86bfef881f5095d695704a483b1d3e59e2beb0e1fba78a6a561d8bf795a74c83fa63775c0b5476e672f553cb30", 0x68}, {&(0x7f0000002a00)="5986af50c25f425f3f897d98133373c34bf94e2db32e51874af6fe3c17526da4787a580f0dd9812eaa2e019a76caec3ca4236a0e0e8482c858cd4a47f91ef97360", 0x41}, {&(0x7f0000002a80)="79fa1a657ff5b9c4879c6f57b82f299be9bbfde506176e540df915c80dd32e1a840da423250958f31892e1d897064ac038ee39b323ee559a80407bde77a94e070a3d8aeee7b9a93b6c7b218650da39003c871f8102475c3c5f7f9cf9103d64da9f29a5d2f745f570eb5cb357be571d25b9b60c1e4c12b3a97b82fed9982a5896dcc5456d57c69bed3e718b1245f80bf4ec8c191882061e73f6b32af01203e0b37b4ae9cc6ee552d13a504ba854310b1497182cba35688162dac75f43ae893ded298f024702075d72303e02cc1f59c436", 0xd0}], 0x8) read(r0, &(0x7f0000000000)=""/13, 0xd) r1 = openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000002c00)={0x8000, 0x259, 0x10}, 0x18) r2 = openat$cgroup_pressure(r0, &(0x7f0000002c40)='cpu.pressure\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000002c80)={0x0, r2, 0x1, 0x0, 0x8, 0x2}) write$binfmt_aout(r0, &(0x7f0000000140)={{0x10b, 0x20, 0xff, 0x10a, 0x33e, 0x9, 0x1ab, 0x400}, "fdeea62012ae84cf9cb9ea17a6c4eb73348e6db4e8d5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x736) 02:17:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 02:17:12 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 02:17:12 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) 02:17:12 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) [ 2556.483316] blktrace: Concurrent blktraces are not allowed on loop6 [ 2556.486247] blktrace: Concurrent blktraces are not allowed on loop6 02:17:12 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x60000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2556.526925] blktrace: Concurrent blktraces are not allowed on loop12 [ 2556.532116] blktrace: Concurrent blktraces are not allowed on loop12 02:17:12 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 02:17:12 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) 02:17:12 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) [ 2556.596764] ieee802154 phy0 wpan0: encryption failed: -22 02:17:12 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 86) 02:17:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x4, &(0x7f0000000040), 0x4) [ 2556.619760] blktrace: Concurrent blktraces are not allowed on loop6 [ 2556.623221] blktrace: Concurrent blktraces are not allowed on loop6 [ 2556.650229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2556.669358] blktrace: Concurrent blktraces are not allowed on loop12 [ 2556.682439] blktrace: Concurrent blktraces are not allowed on loop12 [ 2556.711430] ieee802154 phy0 wpan0: encryption failed: -22 [ 2556.712930] FAULT_INJECTION: forcing a failure. [ 2556.712930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2556.714591] CPU: 1 PID: 10014 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2556.715474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2556.716528] Call Trace: [ 2556.716879] dump_stack+0x107/0x167 [ 2556.717356] should_fail.cold+0x5/0xa [ 2556.717871] _copy_from_user+0x2e/0x1b0 [ 2556.718398] __copy_msghdr_from_user+0x91/0x4b0 [ 2556.719001] ? __ia32_sys_shutdown+0x80/0x80 [ 2556.719582] ? ieee802154_sock_release+0xb0/0xb0 [ 2556.720196] ? sock_sendmsg+0x55/0x190 [ 2556.720710] sendmsg_copy_msghdr+0xa1/0x160 [ 2556.721639] ? do_recvmmsg+0x6d0/0x6d0 [ 2556.722719] ? __lock_acquire+0x1657/0x5b00 [ 2556.723923] ___sys_sendmsg+0xc6/0x170 [ 2556.724999] ? sendmsg_copy_msghdr+0x160/0x160 [ 2556.726370] ? vmacache_find+0x55/0x2a0 [ 2556.727498] ? __lockdep_reset_lock+0x180/0x180 [ 2556.728791] ? find_held_lock+0x2c/0x110 [ 2556.730038] ? __might_fault+0xd3/0x180 [ 2556.731254] ? lock_downgrade+0x6d0/0x6d0 [ 2556.732697] ? asm_exc_page_fault+0x1e/0x30 [ 2556.734035] __sys_sendmmsg+0x195/0x470 [ 2556.735242] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2556.736516] ? lock_downgrade+0x6d0/0x6d0 [ 2556.737779] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2556.739194] ? wait_for_completion+0x270/0x270 [ 2556.740519] ? rcu_read_lock_any_held+0x75/0xa0 [ 2556.742011] ? vfs_write+0x354/0xa30 [ 2556.743044] ? fput_many+0x2f/0x1a0 [ 2556.744091] ? ksys_write+0x1a9/0x260 [ 2556.744986] __x64_sys_sendmmsg+0x99/0x100 [ 2556.746199] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2556.747719] do_syscall_64+0x33/0x40 [ 2556.748801] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2556.750345] RIP: 0033:0x7f867efe2b19 [ 2556.751442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2556.757121] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2556.759463] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2556.761666] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2556.763886] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2556.766162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2556.768366] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2572.336803] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2588.520021] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.526464] blktrace: Concurrent blktraces are not allowed on loop12 [ 2588.539199] blktrace: Concurrent blktraces are not allowed on loop12 02:17:44 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) 02:17:44 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 87) 02:17:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x5, &(0x7f0000000040), 0x4) 02:17:44 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) 02:17:44 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) 02:17:44 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 86) 02:17:44 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 02:17:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x68000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2588.563140] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.564068] blktrace: Concurrent blktraces are not allowed on loop6 [ 2588.564851] FAULT_INJECTION: forcing a failure. [ 2588.564851] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2588.566156] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.567388] CPU: 1 PID: 10038 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2588.567405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2588.570583] Call Trace: [ 2588.570959] dump_stack+0x107/0x167 [ 2588.571459] should_fail.cold+0x5/0xa [ 2588.571991] _copy_from_user+0x2e/0x1b0 [ 2588.572533] __copy_msghdr_from_user+0x91/0x4b0 [ 2588.573159] ? __ia32_sys_shutdown+0x80/0x80 [ 2588.573610] blktrace: Concurrent blktraces are not allowed on loop6 [ 2588.573747] ? ieee802154_sock_release+0xb0/0xb0 [ 2588.573769] ? sock_sendmsg+0x55/0x190 [ 2588.573798] sendmsg_copy_msghdr+0xa1/0x160 [ 2588.573814] ? do_recvmmsg+0x6d0/0x6d0 [ 2588.573839] ? __lock_acquire+0x1657/0x5b00 [ 2588.573882] ___sys_sendmsg+0xc6/0x170 [ 2588.577924] ? sendmsg_copy_msghdr+0x160/0x160 [ 2588.578553] ? vmacache_find+0x55/0x2a0 [ 2588.578755] FAULT_INJECTION: forcing a failure. [ 2588.578755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2588.579084] ? __lockdep_reset_lock+0x180/0x180 [ 2588.581287] ? find_held_lock+0x2c/0x110 [ 2588.581836] ? __might_fault+0xd3/0x180 [ 2588.582389] ? lock_downgrade+0x6d0/0x6d0 [ 2588.582939] ? asm_exc_page_fault+0x1e/0x30 [ 2588.583538] __sys_sendmmsg+0x195/0x470 [ 2588.584176] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2588.585242] ? lock_downgrade+0x6d0/0x6d0 [ 2588.590851] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2588.592018] ? wait_for_completion+0x270/0x270 [ 2588.592695] ? rcu_read_lock_any_held+0x75/0xa0 [ 2588.593560] ? vfs_write+0x354/0xa30 [ 2588.594102] ? fput_many+0x2f/0x1a0 [ 2588.594627] ? ksys_write+0x1a9/0x260 [ 2588.595222] __x64_sys_sendmmsg+0x99/0x100 [ 2588.595840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2588.596605] do_syscall_64+0x33/0x40 [ 2588.597164] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2588.597886] RIP: 0033:0x7f8542659b19 [ 2588.598437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2588.600888] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2588.603490] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2588.604487] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2588.605489] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.606472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2588.607465] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2588.608485] CPU: 0 PID: 10037 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2588.609583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2588.610918] Call Trace: [ 2588.611296] dump_stack+0x107/0x167 [ 2588.611858] should_fail.cold+0x5/0xa [ 2588.612379] _copy_from_user+0x2e/0x1b0 [ 2588.613012] __copy_msghdr_from_user+0x91/0x4b0 [ 2588.613839] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.614656] ? __ia32_sys_shutdown+0x80/0x80 [ 2588.614694] ? ieee802154_sock_release+0xb0/0xb0 [ 2588.616948] ? sock_sendmsg+0x55/0x190 [ 2588.617545] sendmsg_copy_msghdr+0xa1/0x160 [ 2588.618258] ? do_recvmmsg+0x6d0/0x6d0 [ 2588.618951] ? __lock_acquire+0x1657/0x5b00 [ 2588.619622] ___sys_sendmsg+0xc6/0x170 [ 2588.620345] ? sendmsg_copy_msghdr+0x160/0x160 [ 2588.621263] ? __lockdep_reset_lock+0x180/0x180 [ 2588.622034] ? trace_hardirqs_on+0x5b/0x180 [ 2588.622693] ? find_held_lock+0x2c/0x110 [ 2588.623383] ? __might_fault+0xd3/0x180 [ 2588.624084] ? lock_downgrade+0x6d0/0x6d0 [ 2588.624775] ? io_schedule_timeout+0x140/0x140 [ 2588.625493] __sys_sendmmsg+0x195/0x470 [ 2588.626155] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2588.626849] ? lock_downgrade+0x6d0/0x6d0 [ 2588.627487] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2588.628306] ? wait_for_completion+0x270/0x270 [ 2588.629062] ? rcu_read_lock_any_held+0x75/0xa0 [ 2588.629793] ? vfs_write+0x354/0xa30 [ 2588.630349] ? fput_many+0x2f/0x1a0 [ 2588.630950] ? ksys_write+0x1a9/0x260 [ 2588.631558] __x64_sys_sendmmsg+0x99/0x100 [ 2588.632297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2588.633135] do_syscall_64+0x33/0x40 [ 2588.633758] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2588.634518] RIP: 0033:0x7f867efe2b19 [ 2588.635190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2588.638396] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2588.639850] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2588.641185] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2588.642350] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.643454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2588.644657] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2588.646216] hpet: Lost 1 RTC interrupts 02:17:44 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) 02:17:44 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) 02:17:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000080000000c00018008000100", @ANYRES32=r0, @ANYBLOB="f64848f84fae2e8859ef4ea9f7263b7be0ffa549e9f16d0afa1fae6d4f6901cdfacca148a88ba27f32b400e5f70d1bedc0e4bb7fb1b9805912f82464732cbc37e49d5b6a3f2ebaecc18f3e123a791bb0977b93d98421e2efe84a1f0ffa233f6a542876eb77cc484837bb3cfa7478b5da737ae983e91642e0da7020babbca5841611f08e9ee72421f33a921e15f32655f6f5e72062980725ee16ade848a"], 0x24}}, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r1) 02:17:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6c000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:17:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000040), 0x4) 02:17:44 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) 02:17:44 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) [ 2588.774813] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.789257] blktrace: Concurrent blktraces are not allowed on loop12 [ 2588.823190] blktrace: Concurrent blktraces are not allowed on loop12 [ 2588.840372] blktrace: Concurrent blktraces are not allowed on loop6 [ 2588.844847] ieee802154 phy0 wpan0: encryption failed: -22 [ 2588.846484] blktrace: Concurrent blktraces are not allowed on loop6 [ 2604.342850] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:18:09 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 87) 02:18:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x7, &(0x7f0000000040), 0x4) 02:18:09 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010600)="024344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000180)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2380, 0x121) 02:18:09 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x74000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:18:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) 02:18:09 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 02:18:09 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) 02:18:09 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 88) [ 2613.667207] blktrace: Concurrent blktraces are not allowed on loop12 [ 2613.672368] ieee802154 phy0 wpan0: encryption failed: -22 [ 2613.680853] blktrace: Concurrent blktraces are not allowed on loop12 [ 2613.686509] blktrace: Concurrent blktraces are not allowed on loop6 [ 2613.689432] FAULT_INJECTION: forcing a failure. [ 2613.689432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2613.692741] CPU: 1 PID: 10079 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2613.693843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2613.694910] Call Trace: [ 2613.695409] dump_stack+0x107/0x167 [ 2613.696511] should_fail.cold+0x5/0xa [ 2613.697135] __alloc_pages_nodemask+0x182/0x680 [ 2613.697760] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2613.698585] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2613.699502] ? perf_trace_lock+0xac/0x490 [ 2613.700138] alloc_pages_vma+0xbb/0x410 [ 2613.700750] wp_page_copy+0xee7/0x1f00 [ 2613.701360] ? print_bad_pte+0x5a0/0x5a0 [ 2613.701983] ? lock_downgrade+0x6d0/0x6d0 [ 2613.702626] ? vm_normal_page+0x162/0x2e0 [ 2613.703269] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2613.704106] do_wp_page+0x27b/0x1390 [ 2613.704680] handle_mm_fault+0x1ce6/0x3520 [ 2613.705265] ? __lock_acquire+0x1657/0x5b00 [ 2613.705953] ? __pmd_alloc+0x5e0/0x5e0 [ 2613.706619] ? vmacache_find+0x55/0x2a0 [ 2613.707260] do_user_addr_fault+0x56e/0xc00 [ 2613.707965] exc_page_fault+0xa2/0x1a0 [ 2613.708587] asm_exc_page_fault+0x1e/0x30 [ 2613.709234] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2613.710004] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 b1 02 1f 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 92 02 1f 02 66 90 48 bb f9 ef ff ff ff 7f [ 2613.715159] RSP: 0018:ffff88804ae17cf0 EFLAGS: 00050293 [ 2613.716843] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020006038 [ 2613.719051] RDX: 0000000000040000 RSI: ffffffff830c9222 RDI: ffff8880084fa220 [ 2613.721226] RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000 [ 2613.723541] R10: 0000000000000001 R11: 0000000000000001 R12: 000000000000004c [ 2613.725821] R13: 0000000020006000 R14: 0000000000000400 R15: 00000000000003ff [ 2613.727010] ? __sys_sendmmsg+0x1c2/0x470 [ 2613.727617] __sys_sendmmsg+0x1cf/0x470 [ 2613.728402] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2613.729053] ? lock_downgrade+0x6d0/0x6d0 [ 2613.729701] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2613.730429] ? wait_for_completion+0x270/0x270 [ 2613.731067] ? rcu_read_lock_any_held+0x75/0xa0 [ 2613.731776] ? vfs_write+0x354/0xa30 [ 2613.732794] ? fput_many+0x2f/0x1a0 [ 2613.733327] ? ksys_write+0x1a9/0x260 [ 2613.733916] __x64_sys_sendmmsg+0x99/0x100 [ 2613.734615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2613.735374] do_syscall_64+0x33/0x40 [ 2613.735924] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2613.736660] RIP: 0033:0x7f8542659b19 [ 2613.737210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2613.740876] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2613.741935] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2613.743868] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2613.744876] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2613.745875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2613.746985] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2613.754958] ieee802154 phy0 wpan0: encryption failed: -22 [ 2613.756496] FAULT_INJECTION: forcing a failure. [ 2613.756496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2613.758319] CPU: 1 PID: 10088 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2613.759294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2613.760464] Call Trace: [ 2613.760855] dump_stack+0x107/0x167 [ 2613.761386] should_fail.cold+0x5/0xa [ 2613.761994] _copy_from_user+0x2e/0x1b0 [ 2613.762589] __copy_msghdr_from_user+0x91/0x4b0 [ 2613.763286] ? __ia32_sys_shutdown+0x80/0x80 [ 2613.763972] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2613.764775] ? perf_trace_lock+0xac/0x490 [ 2613.765373] sendmsg_copy_msghdr+0xa1/0x160 [ 2613.766026] ? do_recvmmsg+0x6d0/0x6d0 [ 2613.766594] ? handle_mm_fault+0xa05/0x3520 [ 2613.767214] ? find_held_lock+0x2c/0x110 [ 2613.767800] ___sys_sendmsg+0xc6/0x170 [ 2613.768356] ? sendmsg_copy_msghdr+0x160/0x160 [ 2613.768998] ? vmacache_find+0x55/0x2a0 [ 2613.769559] ? do_user_addr_fault+0x5b0/0xc00 [ 2613.770201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2613.770972] ? exc_page_fault+0xca/0x1a0 [ 2613.771537] ? trace_hardirqs_on+0x5b/0x180 [ 2613.772135] ? exc_page_fault+0xca/0x1a0 [ 2613.772713] ? asm_exc_page_fault+0x1e/0x30 [ 2613.773356] __sys_sendmmsg+0x195/0x470 [ 2613.773924] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2613.774539] ? lock_downgrade+0x6d0/0x6d0 [ 2613.775136] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2613.775823] ? wait_for_completion+0x270/0x270 [ 2613.776467] ? rcu_read_lock_any_held+0x75/0xa0 [ 2613.777141] ? vfs_write+0x354/0xa30 [ 2613.777684] ? fput_many+0x2f/0x1a0 [ 2613.778216] ? ksys_write+0x1a9/0x260 [ 2613.778821] __x64_sys_sendmmsg+0x99/0x100 [ 2613.779409] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2613.780072] do_syscall_64+0x33/0x40 [ 2613.780584] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2613.781294] RIP: 0033:0x7f867efe2b19 [ 2613.781844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2613.784519] RSP: 002b:00007f867c537188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2613.785647] RAX: ffffffffffffffda RBX: 00007f867f0f6020 RCX: 00007f867efe2b19 [ 2613.786725] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2613.787777] RBP: 00007f867c5371d0 R08: 0000000000000000 R09: 0000000000000000 [ 2613.788816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2613.789961] R13: 00007fffb7ecc00f R14: 00007f867c537300 R15: 0000000000022000 [ 2613.791951] ieee802154 phy0 wpan0: encryption failed: -22 02:18:09 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:18:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) [ 2613.832421] blktrace: Concurrent blktraces are not allowed on loop12 [ 2613.835419] blktrace: Concurrent blktraces are not allowed on loop12 [ 2613.846351] hpet: Lost 1 RTC interrupts 02:18:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0401273, 0x0) [ 2613.870485] ieee802154 phy0 wpan0: encryption failed: -22 [ 2613.929327] blktrace: Concurrent blktraces are not allowed on loop12 [ 2613.932364] blktrace: Concurrent blktraces are not allowed on loop12 [ 2628.978293] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2632.158701] hpet: Lost 1 RTC interrupts 02:18:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0401273, 0x0) 02:18:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) 02:18:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 89) 02:18:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 88) 02:18:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x8, &(0x7f0000000040), 0x4) 02:18:33 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r1, 0x0) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="ecdc9b2a1ff87317a9e6d59d1d69738c8dc14196e088dee4067740a345e924dd644d8d6c4e203ebdf4745115743d4166f2c20ee4eb2a6948c35da63034a48642b841aa9c3395086a6a356f183b4ed99b5e709876ad4c390e891a33fadf81337fa2bc5286fb79b9474bac4853c8c63d77607bd2148d36c4294b7e25cbe3b5882cb901e4b3bd221f7707cc225756", 0x8d, 0x7}, {&(0x7f0000000240)="dba6e772dc8d344069e9a13627d2a8da073cfb97e78f6dcc6e73d3c360f9a11347081fe4791679a8fa", 0x29, 0x5}, {&(0x7f0000000280)="34755febfb82608aa8abe88eace9c58ca9ffde5dd301e622915a6dfcac705bb914b5817f03af98082d77ae655122b6d755b90905cc321b9adff158d3dd70c4b0db1d1d3416227a2e9849c8b98ff538751db99614be7725bf0e61f22132d6b14a0110f3d72d95011dac8f7ca83018a111d6c49471dd809fad79e8c8a56482fa63139a2d9099c0a964138e1d9f92e912745d1cee67f511539c74756ff6647af81246b7d182a3fe5e82a8f2f94469eaa064b634eb654093d63e9c10be8c258e042c04dbdfbc4f87fa06ca89fe721d260bded26c8f6fe008991c23f8a9477593a1b9dddc8bdf7fcd15c25c57aa85f1a683615b614ef4bc4c029989a658711fca", 0xfe, 0x800}, {&(0x7f0000000380)="f2c4abb71f64d4f5d9e0245daa0b0b7c84ca13ff1105986192d4f2369999ce765ed86bcde8e6305a71fbf58ff2a0bd6a63606ed9ce6e3a11281a74ecb226ae914d003e60b645e39945233aff87129bacb1", 0x51, 0x1ff}, {&(0x7f0000000400)="30a3cb8bfbb6aef2bac3ba28badf513469e7e83acd4117f14b815cb07e316cf14c8e7f8a6f011dd50ec26c49bb98e00906a972172a4773bb091b097b2d13316dd133984ecbae7005e801fcb7a610d99b259cd7f9e3a2a46bcdcf5d91f757ef84f4f1dfda92a94a7cdd77b14f3473f0566d24a319f6b82fab51cbb7b3c7c33f74dbd7faa45020d56bfd9307b80e094e0616ea15fab2c8f4448fd74c42432c7fda15a99aa0059fcb5fc61db9ecf2dfc606925c162d485635a74cd770214988b3fb009b65772d62d3e469fef0338cc13d38bc641327cd0ee048", 0xd8, 0x9}], 0x1000, &(0x7f0000000600)={[{@shortname_win95}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'cp866'}}], [{@pcr={'pcr', 0x3d, 0x5}}, {@uid_gt={'uid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, '8,'}}, {@fsname}, {@subj_user={'subj_user', 0x3d, 'release_agent'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '-'}}]}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000000)={[{@subsystem='freezer'}, {@release_agent={'release_agent', 0x3d, './file0'}}]}) 02:18:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7a000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:18:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) [ 2638.235683] blktrace: Concurrent blktraces are not allowed on loop12 [ 2638.245070] ieee802154 phy0 wpan0: encryption failed: -22 [ 2638.249310] blktrace: Concurrent blktraces are not allowed on loop12 [ 2638.256317] ieee802154 phy0 wpan0: encryption failed: -22 [ 2638.261576] FAULT_INJECTION: forcing a failure. [ 2638.261576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2638.266998] CPU: 0 PID: 10112 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2638.269725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2638.273157] Call Trace: [ 2638.274302] dump_stack+0x107/0x167 [ 2638.275604] should_fail.cold+0x5/0xa [ 2638.277098] _copy_from_user+0x2e/0x1b0 [ 2638.278763] __copy_msghdr_from_user+0x91/0x4b0 [ 2638.280779] ? __ia32_sys_shutdown+0x80/0x80 [ 2638.282581] ? ieee802154_sock_release+0xb0/0xb0 [ 2638.284481] ? sock_sendmsg+0x55/0x190 [ 2638.286065] sendmsg_copy_msghdr+0xa1/0x160 [ 2638.287837] ? do_recvmmsg+0x6d0/0x6d0 [ 2638.289460] ? __lock_acquire+0x1657/0x5b00 [ 2638.291207] ___sys_sendmsg+0xc6/0x170 [ 2638.292744] ? sendmsg_copy_msghdr+0x160/0x160 [ 2638.294567] ? vmacache_find+0x55/0x2a0 [ 2638.296303] ? __lockdep_reset_lock+0x180/0x180 [ 2638.297917] ? find_held_lock+0x2c/0x110 [ 2638.299548] ? __might_fault+0xd3/0x180 [ 2638.301362] ? lock_downgrade+0x6d0/0x6d0 [ 2638.302939] ? asm_exc_page_fault+0x1e/0x30 [ 2638.304663] __sys_sendmmsg+0x195/0x470 [ 2638.306350] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2638.308023] ? lock_downgrade+0x6d0/0x6d0 [ 2638.309720] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2638.311882] ? wait_for_completion+0x270/0x270 [ 2638.313733] ? rcu_read_lock_any_held+0x75/0xa0 [ 2638.315658] ? vfs_write+0x354/0xa30 [ 2638.317044] ? fput_many+0x2f/0x1a0 [ 2638.318411] ? ksys_write+0x1a9/0x260 [ 2638.319986] __x64_sys_sendmmsg+0x99/0x100 [ 2638.321634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2638.323645] do_syscall_64+0x33/0x40 [ 2638.325081] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2638.326889] RIP: 0033:0x7f867efe2b19 [ 2638.327377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2638.329802] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2638.330870] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2638.331799] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2638.332710] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2638.333654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2638.338707] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2638.342682] hpet: Lost 4 RTC interrupts [ 2638.347827] blktrace: Concurrent blktraces are not allowed on loop6 [ 2638.355038] blktrace: Concurrent blktraces are not allowed on loop6 [ 2638.358228] ieee802154 phy0 wpan0: encryption failed: -22 [ 2638.362178] ieee802154 phy0 wpan0: encryption failed: -22 [ 2638.365349] FAULT_INJECTION: forcing a failure. [ 2638.365349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2638.367080] CPU: 1 PID: 10127 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2638.368146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2638.369393] Call Trace: [ 2638.369800] dump_stack+0x107/0x167 [ 2638.370363] should_fail.cold+0x5/0xa [ 2638.370973] _copy_from_user+0x2e/0x1b0 [ 2638.371601] __copy_msghdr_from_user+0x91/0x4b0 [ 2638.372282] ? __ia32_sys_shutdown+0x80/0x80 [ 2638.372938] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2638.373726] ? perf_trace_lock+0xac/0x490 [ 2638.374383] sendmsg_copy_msghdr+0xa1/0x160 [ 2638.375069] ? do_recvmmsg+0x6d0/0x6d0 [ 2638.375700] ? handle_mm_fault+0xa05/0x3520 [ 2638.376437] ? find_held_lock+0x2c/0x110 [ 2638.377048] ___sys_sendmsg+0xc6/0x170 [ 2638.377614] ? sendmsg_copy_msghdr+0x160/0x160 [ 2638.378504] ? vmacache_find+0x55/0x2a0 [ 2638.379128] ? do_user_addr_fault+0x5b0/0xc00 [ 2638.379790] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2638.380550] ? exc_page_fault+0xca/0x1a0 [ 2638.381140] ? trace_hardirqs_on+0x5b/0x180 [ 2638.381766] ? exc_page_fault+0xca/0x1a0 [ 2638.382357] ? asm_exc_page_fault+0x1e/0x30 [ 2638.383089] __sys_sendmmsg+0x195/0x470 [ 2638.383702] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2638.384369] ? lock_downgrade+0x6d0/0x6d0 [ 2638.385095] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2638.385800] ? wait_for_completion+0x270/0x270 [ 2638.386458] ? rcu_read_lock_any_held+0x75/0xa0 [ 2638.387103] ? vfs_write+0x354/0xa30 [ 2638.387627] ? fput_many+0x2f/0x1a0 [ 2638.388137] ? ksys_write+0x1a9/0x260 [ 2638.388689] __x64_sys_sendmmsg+0x99/0x100 [ 2638.389301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2638.390033] do_syscall_64+0x33/0x40 [ 2638.390572] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2638.391306] RIP: 0033:0x7f8542659b19 [ 2638.391849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2638.394457] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2638.395553] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2638.396548] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2638.397554] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2638.398560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2638.399723] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:18:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x9, &(0x7f0000000040), 0x4) 02:18:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) 02:18:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x3}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000005080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000dad6bf0b90aae0f2dfc839000000000000000007000000890704ac1414bb00"], 0x18}}], 0x1, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) accept4$inet6(r0, 0x0, &(0x7f0000000140), 0x0) 02:18:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) 02:18:34 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 02:18:34 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7f000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2638.499095] blktrace: Concurrent blktraces are not allowed on loop6 [ 2638.503847] blktrace: Concurrent blktraces are not allowed on loop6 02:18:34 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) 02:18:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xa, &(0x7f0000000040), 0x4) 02:18:34 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ce4}}, './file0\x00'}) ioctl$BLKROGET(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) [ 2638.518984] blktrace: Concurrent blktraces are not allowed on loop12 [ 2638.564795] ieee802154 phy0 wpan0: encryption failed: -22 [ 2638.639136] ieee802154 phy0 wpan0: encryption failed: -22 [ 2653.818497] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:18:58 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 02:18:58 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 90) 02:18:58 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xeffdffff, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:18:58 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) 02:18:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0xb65, 0x200000) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/igmp6\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040), 0x4) copy_file_range(r1, &(0x7f0000000080)=0x7ff, r4, &(0x7f0000000100)=0xf0, 0x28, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 02:18:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3) 02:18:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xc, &(0x7f0000000040), 0x4) 02:18:58 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 89) [ 2662.754410] ieee802154 phy0 wpan0: encryption failed: -22 [ 2662.761579] FAULT_INJECTION: forcing a failure. [ 2662.761579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2662.769538] CPU: 0 PID: 10165 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2662.770413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2662.771529] Call Trace: [ 2662.771896] dump_stack+0x107/0x167 [ 2662.772393] should_fail.cold+0x5/0xa [ 2662.772923] _copy_from_user+0x2e/0x1b0 [ 2662.773474] __copy_msghdr_from_user+0x91/0x4b0 [ 2662.774104] ? __ia32_sys_shutdown+0x80/0x80 [ 2662.774716] ? ieee802154_sock_release+0xb0/0xb0 [ 2662.776394] ? sock_sendmsg+0x55/0x190 [ 2662.776935] sendmsg_copy_msghdr+0xa1/0x160 [ 2662.777518] ? do_recvmmsg+0x6d0/0x6d0 [ 2662.778034] ? __lock_acquire+0x1657/0x5b00 [ 2662.778631] ___sys_sendmsg+0xc6/0x170 [ 2662.779206] ? sendmsg_copy_msghdr+0x160/0x160 [ 2662.779815] ? vmacache_find+0x55/0x2a0 [ 2662.780390] ? __lockdep_reset_lock+0x180/0x180 [ 2662.781027] ? find_held_lock+0x2c/0x110 [ 2662.781581] ? __might_fault+0xd3/0x180 [ 2662.782111] ? lock_downgrade+0x6d0/0x6d0 [ 2662.782667] ? asm_exc_page_fault+0x1e/0x30 [ 2662.783377] __sys_sendmmsg+0x195/0x470 [ 2662.783945] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2662.784526] ? lock_downgrade+0x6d0/0x6d0 [ 2662.785128] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2662.785785] ? wait_for_completion+0x270/0x270 [ 2662.786420] ? rcu_read_lock_any_held+0x75/0xa0 [ 2662.787073] ? vfs_write+0x354/0xa30 [ 2662.787584] ? fput_many+0x2f/0x1a0 [ 2662.788065] ? ksys_write+0x1a9/0x260 [ 2662.788582] __x64_sys_sendmmsg+0x99/0x100 [ 2662.789156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2662.789848] do_syscall_64+0x33/0x40 [ 2662.790416] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2662.791187] RIP: 0033:0x7f8542659b19 [ 2662.791695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2662.794066] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2662.795117] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2662.796061] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2662.797024] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2662.797986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2662.799028] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2662.800189] hpet: Lost 1 RTC interrupts [ 2662.827572] ieee802154 phy0 wpan0: encryption failed: -22 [ 2662.829854] FAULT_INJECTION: forcing a failure. [ 2662.829854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2662.831541] CPU: 1 PID: 10175 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2662.832438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2662.833512] Call Trace: [ 2662.833871] dump_stack+0x107/0x167 [ 2662.834359] should_fail.cold+0x5/0xa [ 2662.834865] _copy_from_user+0x2e/0x1b0 [ 2662.835415] __copy_msghdr_from_user+0x91/0x4b0 [ 2662.836036] ? __ia32_sys_shutdown+0x80/0x80 [ 2662.838153] ? ieee802154_sock_release+0xb0/0xb0 [ 2662.839238] ? sock_sendmsg+0x55/0x190 [ 2662.839766] sendmsg_copy_msghdr+0xa1/0x160 [ 2662.840331] ? do_recvmmsg+0x6d0/0x6d0 [ 2662.840840] ? __lock_acquire+0x1657/0x5b00 [ 2662.841417] ___sys_sendmsg+0xc6/0x170 [ 2662.841936] ? sendmsg_copy_msghdr+0x160/0x160 [ 2662.842544] ? __lockdep_reset_lock+0x180/0x180 [ 2662.843175] ? trace_hardirqs_on+0x5b/0x180 [ 2662.843747] ? find_held_lock+0x2c/0x110 [ 2662.844309] ? __might_fault+0xd3/0x180 [ 2662.844836] ? lock_downgrade+0x6d0/0x6d0 [ 2662.845391] ? io_schedule_timeout+0x140/0x140 [ 2662.846020] __sys_sendmmsg+0x195/0x470 [ 2662.846548] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2662.847149] ? lock_downgrade+0x6d0/0x6d0 [ 2662.847722] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2662.848371] ? wait_for_completion+0x270/0x270 [ 2662.848980] ? rcu_read_lock_any_held+0x75/0xa0 [ 2662.849588] ? vfs_write+0x354/0xa30 [ 2662.850090] ? fput_many+0x2f/0x1a0 [ 2662.850575] ? ksys_write+0x1a9/0x260 [ 2662.851118] __x64_sys_sendmmsg+0x99/0x100 [ 2662.851689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2662.852366] do_syscall_64+0x33/0x40 [ 2662.852857] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2662.853547] RIP: 0033:0x7f867efe2b19 [ 2662.854202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2662.856802] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2662.857836] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2662.858778] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2662.859766] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2662.860732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2662.861747] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2662.863066] ieee802154 phy0 wpan0: encryption failed: -22 [ 2662.872819] blktrace: Concurrent blktraces are not allowed on loop6 02:18:58 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) [ 2662.904044] ieee802154 phy0 wpan0: encryption failed: -22 02:18:58 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3) 02:18:58 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4) 02:18:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xd, &(0x7f0000000040), 0x4) [ 2662.996010] blktrace: Concurrent blktraces are not allowed on loop6 02:18:58 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xff030000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:18:58 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 91) 02:18:58 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 90) 02:18:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file19']) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fspick(r1, &(0x7f0000000140)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, &(0x7f00000001c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x15c) copy_file_range(r5, 0x0, r3, 0x0, 0x200f5ef, 0x0) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$setstatus(r6, 0x4, 0x267d2412d439329) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) [ 2663.058008] blktrace: Concurrent blktraces are not allowed on loop12 [ 2663.071074] ieee802154 phy0 wpan0: encryption failed: -22 02:18:58 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) 02:18:58 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x6) [ 2663.123848] ieee802154 phy0 wpan0: encryption failed: -22 [ 2663.128789] ieee802154 phy0 wpan0: encryption failed: -22 [ 2663.138369] FAULT_INJECTION: forcing a failure. [ 2663.138369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2663.139926] CPU: 1 PID: 10205 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2663.140820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2663.141897] Call Trace: [ 2663.142258] dump_stack+0x107/0x167 [ 2663.142746] should_fail.cold+0x5/0xa [ 2663.143304] _copy_from_user+0x2e/0x1b0 [ 2663.143839] __copy_msghdr_from_user+0x91/0x4b0 [ 2663.144450] ? __ia32_sys_shutdown+0x80/0x80 [ 2663.145044] ? ieee802154_sock_release+0xb0/0xb0 [ 2663.145668] ? sock_sendmsg+0x55/0x190 [ 2663.146198] sendmsg_copy_msghdr+0xa1/0x160 [ 2663.147515] ? do_recvmmsg+0x6d0/0x6d0 [ 2663.148663] ? __lock_acquire+0x1657/0x5b00 [ 2663.150088] ___sys_sendmsg+0xc6/0x170 [ 2663.151332] ? sendmsg_copy_msghdr+0x160/0x160 [ 2663.152774] ? vmacache_find+0x55/0x2a0 [ 2663.154008] ? __lockdep_reset_lock+0x180/0x180 [ 2663.155533] ? find_held_lock+0x2c/0x110 [ 2663.156838] ? __might_fault+0xd3/0x180 [ 2663.158054] ? lock_downgrade+0x6d0/0x6d0 [ 2663.159362] ? asm_exc_page_fault+0x1e/0x30 [ 2663.160718] __sys_sendmmsg+0x195/0x470 [ 2663.162122] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2663.163427] ? lock_downgrade+0x6d0/0x6d0 [ 2663.164932] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2663.166393] ? wait_for_completion+0x270/0x270 [ 2663.167793] ? rcu_read_lock_any_held+0x75/0xa0 [ 2663.169190] ? vfs_write+0x354/0xa30 [ 2663.170317] ? fput_many+0x2f/0x1a0 [ 2663.171431] ? ksys_write+0x1a9/0x260 [ 2663.172603] __x64_sys_sendmmsg+0x99/0x100 [ 2663.173994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2663.175567] do_syscall_64+0x33/0x40 [ 2663.176756] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2663.178334] RIP: 0033:0x7f867efe2b19 [ 2663.179539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.185386] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2663.187739] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2663.189940] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2663.192155] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.194373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2663.196413] blktrace: Concurrent blktraces are not allowed on loop6 [ 2663.196706] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2663.198196] FAULT_INJECTION: forcing a failure. [ 2663.198196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2663.199165] ieee802154 phy0 wpan0: encryption failed: -22 [ 2663.201169] CPU: 1 PID: 10206 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2663.207173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2663.208616] Call Trace: [ 2663.209088] dump_stack+0x107/0x167 [ 2663.209755] should_fail.cold+0x5/0xa [ 2663.210458] _copy_from_user+0x2e/0x1b0 [ 2663.211173] __copy_msghdr_from_user+0x91/0x4b0 [ 2663.212094] ? __ia32_sys_shutdown+0x80/0x80 [ 2663.212933] ? ieee802154_sock_release+0xb0/0xb0 [ 2663.213785] ? sock_sendmsg+0x55/0x190 [ 2663.214503] sendmsg_copy_msghdr+0xa1/0x160 [ 2663.215303] ? do_recvmmsg+0x6d0/0x6d0 [ 2663.216005] ? __lock_acquire+0x1657/0x5b00 [ 2663.216797] ___sys_sendmsg+0xc6/0x170 [ 2663.217495] ? sendmsg_copy_msghdr+0x160/0x160 [ 2663.218308] ? vmacache_find+0x55/0x2a0 [ 2663.219043] ? __lockdep_reset_lock+0x180/0x180 [ 2663.219885] ? find_held_lock+0x2c/0x110 [ 2663.220527] ? __might_fault+0xd3/0x180 [ 2663.221107] ? lock_downgrade+0x6d0/0x6d0 [ 2663.221713] ? asm_exc_page_fault+0x1e/0x30 [ 2663.222430] __sys_sendmmsg+0x195/0x470 [ 2663.223060] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2663.223681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2663.224442] ? finish_task_switch+0x127/0x5d0 [ 2663.225106] ? __switch_to_asm+0x34/0x60 [ 2663.225691] ? __schedule+0x850/0x1e90 [ 2663.226325] ? io_schedule_timeout+0x140/0x140 [ 2663.227043] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2663.227859] __x64_sys_sendmmsg+0x99/0x100 [ 2663.228453] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2663.229198] do_syscall_64+0x33/0x40 [ 2663.229730] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2663.230464] RIP: 0033:0x7f8542659b19 [ 2663.231033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.233610] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2663.234707] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2663.235789] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2663.236751] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.237715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2663.238739] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:18:58 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) [ 2678.747605] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:19:23 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x400000, 0xeb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf252000000008008300", @ANYRES32=0x0, @ANYBLOB="0419ad000800008000000000"], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x4004000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x20, 0x40, 0x0, 0x9, 0x0, 0xd8, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000280), 0xe490e2930d7bc394}, 0x2200, 0x1, 0x8, 0x9, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0x6, r1, 0x8) io_setup(0x5, 0x0) sendmmsg(r1, &(0x7f0000000240)=[{{&(0x7f00000003c0)=@caif=@dbg={0x25, 0x1f, 0x57}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000440)="d931159c654efd610b63174e0b8abdbe84bf248ba9d3c9c0fd12081f40987f828aede15197c7b4e016100baf9b1d78e633140041bd7244f881d6ffd08dc3943575e6a460b3ba8f2f8d7eebf6030e274b05fe036eb8a33bdca42d602cbe980bf1cedbb0a4ac466c2f0fba1776d71bf3e6a70718104cf3b7aa7095d8dac68055aba86b7906fdf87cfe397446dcc07165fec456873545635ffa0046c94f54c005e6bd730fefd9313156ad0065b6b9e478435cda0416c58bbdc864a730445f5764f9f03120952196979570e0183ba54ce62030b2b2e141c2e79b1f9e", 0xda}, {&(0x7f0000000540)="ad0ca364d5ba5d83fd7a9f694494cb8ea0be35f6d6c336acb510099590d91aab8318073e39319fb52e149832b57be5c33765bbd269ebce4d1af105b57199431feec40bc9b278349c90a8d734c0f6f71919e0dd2622c21637263a0430b5c0fde4a714b85da54108950d193ad482acbbc8ecbd8ecadd7a404e2bf821827af0c2fcae5d59a0828ef77126674dd813c07029b6c57960c6a9fad109e3d123222e4358b13a3b2331", 0xa5}, {&(0x7f0000000600)="b923a518d9470b78819d3cd6b08b93ecf9334250588f287762191c1458820cff8d1cf5d76bd16ca6178d8c25a55b78f66d4f3b2eda2bc1ba60f36a54ae545be48eb4d19f15ba74530a471dfaeac705928649e68654bb287aa5cacedacf64d01b776d2e0bb26a5ef9e7bdda0f726c5c682ecd65347a7b2afba9fbbb78f6749af7e227ca11c4a9e38b3ca8", 0x8a}, {&(0x7f00000006c0)="417bf7ab8e002abb4a4447ef508d62686edee67cb661f02116fb80fc88967f22b3daefe3ac9e44e90a3a3a78e5baaf0830935bbc1257b33ea605a3cb911e152fa82b3a2c9c921ac6ba39d20ac696c0e079e08f4b8c038599c9fc4cb96ce119c40d37ca3ae76460e0330008a9395066421840c285eafae22ed1c961d0976e", 0x7e}, {&(0x7f0000000740)="7223cfb1a47b17aad4ce0db612227b103f4e7c29c0c03c4e92369ead1f1b18c73baf3b69c12237979004b1085b68d54908be629c5ff6465102dcad479b716dbfa04f9c38256678ef80f4a8b6ef8873f0c5fe0e84835acd307c99dfa48f256205a9347a716d74d501bf1efece7a4e1f62458e", 0x72}, {&(0x7f00000007c0)="669a30340e73ec58967d0d3a26b4ab8c724109083bf03599fdce1363128f40fee143f7f0902d0f813f1449afa0ce18d6ffa83cbba98c9fec6b3a8037d7698216e3d8b498dbf8addb91723edd496bc5a8e88d585188bbd3d05746ce5d594ec5ce4896ac7d7138c59900acaec7fa805141751edce8eb11c4369491", 0x7a}, {&(0x7f0000000840)="72121c2457d84d19e886607229585066fd8a1bafa22cb5717589f514912d07803c09862728d272c08b9c81ef9cbb5e6a469eab3bb1ff4a4093f84da2a9103961178942d5e2a7c147ca2b682211d01a12a134bf81248aa9b417e96acc261e4959724151feae83680191e48d9f1307ddbf3150d5dbe9f5a7dfb3fcb9e7a76e0437516f49d94641a8d6ab8bf31fa99758b3ddd6b355915bea9502de4006ead8f2c8db864aa22cb65c13820e3083c5d4a6e95c75c7529d6b71965bfce950a4e565260dfc24886a0635a3", 0xc8}, {&(0x7f0000000940)="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", 0x1000}], 0x8, &(0x7f00000019c0)=[{0x18, 0x107, 0x1f, "d78d5a5e"}, {0xa8, 0x103, 0x7e6, "1123a1116ec94eef53b052eba0e97b53ad21446abed70176706eed2b13b064f9b51d993a733f6d991cf3522b461a684eb9ebfd540273d3450af7dc048c59cd3e5baeeeb5931051da7baa6f2412a5b02922355966c0bf1093a58d36208927266e0086697d706e0350e2ae936da9900127a24c925d3fe33a0929f5b39f21b0d7105409cdffdb32a9d10b6b397d253c9311313077e514"}, {0xf8, 0x29, 0x6, "2a40dab3af660b156146f46bde6aac7a25a3baf24ae82c09fd4c4e1094ef64904e37f58adb9232f08e612c95c4c7e11faaad92f914d00f688c617fd72ed46de4c8fc85ac6fdaa2972ebf3a0b8d7afca6a71b2c7183529f3463ff45204d4b64979001c9a56828c0695c4a7a86ce9c212686113fe87f70bb0a7c3b5775f4b738aaa1caff595e11b499c60066d25a1cd0946507b2938af02c5d0a2c6128aa05f0377279197086f9e455e9341c80eda0cbbdad77b1b15f01064861d22ba9544e5a51cd79e6035c55361d3faf6ea43eaa02069434beb3094eed797a4775870a6c5e4dae493a98"}, {0xc0, 0x0, 0x47b2, "a4d0b4756ca48643ba902bb31b397fad323da303f440117bbdf15a6a34fd2b3f641f929de8dd1b32578dc6204ad739524248936e3e3767b316e1de10da48c499b36a16e8d300390cc5a746b918932b72795fb5cf103ac139f5496d1a4858f880b5e7aea3c86e852e2c917cb47e396d3d711134641dfd56353e280382b015321e541da46dbb50579eeb3534e3713f9341d03012236f1258c9715f090ee91edbd25ac16ff1656ee6308e"}, {0x108, 0x0, 0x400, "0cbac4ff45387870c60ac7c4cdd7b73a02d21d72064c5791316c60ced119c2202950f69c1124164a3dc9adfeeebd51c23457ad8dad9c9ab8ee0ffbbbb2cdf82748bc87966d9aa1cd25d4ac069a468e9bed404ccc4ffa5be2b2a98b0553be6a087df661bf64ff4fc6c1eaa9cf679609c4b350a4214b287bf35b239940eb880f0e56e16c15052134c9dad861f48fdbf1ad227271dd0c957d318b20d5eebc3716c306a90b1830e0c4df55273ca4aad79be40ffe5c70b7f3e64dc23c22c1909a5d0ad484e67521fc5b1f2ab493e02b037e4c490654818c38987214a6805549a880ffee41e6ff18caf8aa525f3eef632a27f47e7be42bf13738e3"}], 0x380}}], 0x1, 0x40040) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) io_submit(0x0, 0x0, &(0x7f0000000180)) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, r3, 0x0}, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:19:23 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 92) 02:19:23 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a) 02:19:23 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a) 02:19:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0xe, &(0x7f0000000040), 0x4) 02:19:23 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xffffe000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:19:23 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) 02:19:23 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 91) [ 2687.851048] ieee802154 phy0 wpan0: encryption failed: -22 [ 2687.864260] ieee802154 phy0 wpan0: encryption failed: -22 [ 2687.866607] ieee802154 phy0 wpan0: encryption failed: -22 [ 2687.872285] FAULT_INJECTION: forcing a failure. [ 2687.872285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2687.873926] CPU: 1 PID: 10240 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2687.874852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.876019] Call Trace: [ 2687.876409] dump_stack+0x107/0x167 [ 2687.876922] should_fail.cold+0x5/0xa [ 2687.877454] _copy_from_user+0x2e/0x1b0 [ 2687.877990] __copy_msghdr_from_user+0x91/0x4b0 [ 2687.878656] ? __ia32_sys_shutdown+0x80/0x80 [ 2687.883316] ? ieee802154_sock_release+0xb0/0xb0 [ 2687.883999] ? sock_sendmsg+0x55/0x190 [ 2687.884536] sendmsg_copy_msghdr+0xa1/0x160 [ 2687.885104] ? do_recvmmsg+0x6d0/0x6d0 [ 2687.885639] ? __lock_acquire+0x1657/0x5b00 [ 2687.886240] ___sys_sendmsg+0xc6/0x170 [ 2687.886771] ? sendmsg_copy_msghdr+0x160/0x160 [ 2687.895449] ? vmacache_find+0x55/0x2a0 [ 2687.895979] ? __lockdep_reset_lock+0x180/0x180 [ 2687.896599] ? find_held_lock+0x2c/0x110 [ 2687.897145] ? __might_fault+0xd3/0x180 [ 2687.897691] ? lock_downgrade+0x6d0/0x6d0 [ 2687.898249] ? asm_exc_page_fault+0x1e/0x30 [ 2687.898876] __sys_sendmmsg+0x195/0x470 [ 2687.903493] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2687.904074] ? lock_downgrade+0x6d0/0x6d0 [ 2687.904652] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2687.906052] ? wait_for_completion+0x270/0x270 [ 2687.911608] ? rcu_read_lock_any_held+0x75/0xa0 [ 2687.912991] ? vfs_write+0x354/0xa30 [ 2687.914165] ? fput_many+0x2f/0x1a0 [ 2687.919856] ? ksys_write+0x1a9/0x260 [ 2687.921063] __x64_sys_sendmmsg+0x99/0x100 [ 2687.922466] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2687.924042] do_syscall_64+0x33/0x40 [ 2687.925247] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.926901] RIP: 0033:0x7f8542659b19 [ 2687.928142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.933923] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2687.936277] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2687.938533] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2687.940728] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2687.942880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2687.945154] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:19:23 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) [ 2687.949379] FAULT_INJECTION: forcing a failure. [ 2687.949379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2687.953138] CPU: 1 PID: 10241 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2687.955300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2687.957908] Call Trace: [ 2687.958732] dump_stack+0x107/0x167 [ 2687.959860] should_fail.cold+0x5/0xa [ 2687.961019] _copy_from_user+0x2e/0x1b0 [ 2687.962233] __copy_msghdr_from_user+0x91/0x4b0 [ 2687.963676] ? __ia32_sys_shutdown+0x80/0x80 [ 2687.965068] ? ieee802154_sock_release+0xb0/0xb0 [ 2687.966505] ? sock_sendmsg+0x55/0x190 [ 2687.967764] sendmsg_copy_msghdr+0xa1/0x160 [ 2687.969064] ? do_recvmmsg+0x6d0/0x6d0 [ 2687.970261] ? __lock_acquire+0x1657/0x5b00 [ 2687.971634] ___sys_sendmsg+0xc6/0x170 [ 2687.972820] ? sendmsg_copy_msghdr+0x160/0x160 [ 2687.974198] ? vmacache_find+0x55/0x2a0 [ 2687.975387] ? __lockdep_reset_lock+0x180/0x180 [ 2687.976785] ? find_held_lock+0x2c/0x110 [ 2687.978045] ? __might_fault+0xd3/0x180 [ 2687.979313] ? lock_downgrade+0x6d0/0x6d0 [ 2687.980567] ? asm_exc_page_fault+0x1e/0x30 [ 2687.981895] __sys_sendmmsg+0x195/0x470 [ 2687.983121] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2687.984578] ? lock_downgrade+0x6d0/0x6d0 [ 2687.985773] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2687.987114] ? wait_for_completion+0x270/0x270 [ 2687.988556] ? rcu_read_lock_any_held+0x75/0xa0 [ 2687.989885] ? vfs_write+0x354/0xa30 [ 2687.990926] ? fput_many+0x2f/0x1a0 [ 2687.991978] ? ksys_write+0x1a9/0x260 [ 2687.993022] __x64_sys_sendmmsg+0x99/0x100 [ 2687.994190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2687.995689] do_syscall_64+0x33/0x40 [ 2687.996717] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2687.998231] RIP: 0033:0x7f867efe2b19 [ 2688.003372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2688.003385] hpet: Lost 4 RTC interrupts [ 2688.010336] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2688.013022] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2688.016681] blktrace: Concurrent blktraces are not allowed on loop6 [ 2688.019134] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2688.019145] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.019153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2688.019170] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2688.042849] ieee802154 phy0 wpan0: encryption failed: -22 02:19:23 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x6a) [ 2688.075282] blktrace: Concurrent blktraces are not allowed on loop12 02:19:23 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) 02:19:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x10, &(0x7f0000000040), 0x4) 02:19:23 executing program 5: sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LBT_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000890) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x1d012, r0, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000), 0x1f, 0x2) 02:19:23 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@access_any}]}}) 02:19:23 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xfffffdef, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:19:23 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300) 02:19:23 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xe4) [ 2688.202280] blktrace: Concurrent blktraces are not allowed on loop6 [ 2688.243290] blktrace: Concurrent blktraces are not allowed on loop12 [ 2688.249542] ieee802154 phy0 wpan0: encryption failed: -22 [ 2688.302836] ieee802154 phy0 wpan0: encryption failed: -22 02:19:23 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) 02:19:23 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 93) 02:19:23 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x600) 02:19:23 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x138) 02:19:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x11, &(0x7f0000000040), 0x4) [ 2688.344645] blktrace: Concurrent blktraces are not allowed on loop6 [ 2688.385018] blktrace: Concurrent blktraces are not allowed on loop12 [ 2688.446475] ieee802154 phy0 wpan0: encryption failed: -22 [ 2688.448518] FAULT_INJECTION: forcing a failure. [ 2688.448518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2688.450354] CPU: 0 PID: 10292 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2688.451281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2688.452421] Call Trace: [ 2688.452825] dump_stack+0x107/0x167 [ 2688.453380] should_fail.cold+0x5/0xa [ 2688.454049] _copy_from_user+0x2e/0x1b0 [ 2688.454747] __copy_msghdr_from_user+0x91/0x4b0 [ 2688.455541] ? __ia32_sys_shutdown+0x80/0x80 [ 2688.456194] ? ieee802154_sock_release+0xb0/0xb0 [ 2688.456881] ? sock_sendmsg+0x55/0x190 [ 2688.457474] sendmsg_copy_msghdr+0xa1/0x160 [ 2688.458098] ? do_recvmmsg+0x6d0/0x6d0 [ 2688.458670] ? __lock_acquire+0x1657/0x5b00 [ 2688.459347] ___sys_sendmsg+0xc6/0x170 [ 2688.459947] ? sendmsg_copy_msghdr+0x160/0x160 [ 2688.460767] ? vmacache_find+0x55/0x2a0 [ 2688.461456] ? __lockdep_reset_lock+0x180/0x180 [ 2688.462320] ? find_held_lock+0x2c/0x110 [ 2688.463031] ? __might_fault+0xd3/0x180 [ 2688.463691] ? lock_downgrade+0x6d0/0x6d0 [ 2688.464298] ? asm_exc_page_fault+0x1e/0x30 [ 2688.464977] __sys_sendmmsg+0x195/0x470 [ 2688.465589] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2688.466214] ? lock_downgrade+0x6d0/0x6d0 [ 2688.466889] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2688.467646] ? wait_for_completion+0x270/0x270 [ 2688.468323] ? rcu_read_lock_any_held+0x75/0xa0 [ 2688.469008] ? vfs_write+0x354/0xa30 [ 2688.469573] ? fput_many+0x2f/0x1a0 [ 2688.470096] ? ksys_write+0x1a9/0x260 [ 2688.470675] __x64_sys_sendmmsg+0x99/0x100 [ 2688.471266] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2688.471984] do_syscall_64+0x33/0x40 [ 2688.472512] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2688.473239] RIP: 0033:0x7f867efe2b19 [ 2688.473762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2688.476357] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2688.477533] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2688.478561] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2688.479569] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.480569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2688.481574] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2688.482766] hpet: Lost 1 RTC interrupts [ 2694.183508] hpet: Lost 1 RTC interrupts [ 2703.577325] kmemleak: 36 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:19:48 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 92) 02:19:48 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) 02:19:48 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 94) 02:19:48 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1f9) 02:19:48 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) open(&(0x7f00000001c0)='./file1\x00', 0x101402, 0x1141819f688a6e08) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x1, 0x6, 0x3, 0x1, 0x0, 0x4, 0x10, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7b, 0x100}, 0x2060, 0x7f, 0x2, 0x7, 0x3, 0x818, 0x6, 0x0, 0x10001, 0x0, 0x26}, 0x0, 0xc, 0xffffffffffffffff, 0x3) 02:19:48 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a00) 02:19:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x12, &(0x7f0000000040), 0x4) 02:19:48 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xffffff7f, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2712.764108] blktrace: Concurrent blktraces are not allowed on loop12 [ 2712.768864] ieee802154 phy0 wpan0: encryption failed: -22 [ 2712.772584] FAULT_INJECTION: forcing a failure. [ 2712.772584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.774257] CPU: 1 PID: 10302 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2712.775391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2712.776563] Call Trace: [ 2712.777312] dump_stack+0x107/0x167 [ 2712.777844] should_fail.cold+0x5/0xa [ 2712.778353] _copy_from_user+0x2e/0x1b0 [ 2712.779532] __copy_msghdr_from_user+0x91/0x4b0 [ 2712.780922] ? __ia32_sys_shutdown+0x80/0x80 [ 2712.781519] ? ieee802154_sock_release+0xb0/0xb0 [ 2712.782162] ? sock_sendmsg+0x55/0x190 [ 2712.782721] sendmsg_copy_msghdr+0xa1/0x160 [ 2712.783310] ? do_recvmmsg+0x6d0/0x6d0 [ 2712.783862] ? __lock_acquire+0x1657/0x5b00 [ 2712.784431] ___sys_sendmsg+0xc6/0x170 [ 2712.784951] ? sendmsg_copy_msghdr+0x160/0x160 [ 2712.785536] ? vmacache_find+0x55/0x2a0 [ 2712.786064] ? __lockdep_reset_lock+0x180/0x180 [ 2712.786698] ? find_held_lock+0x2c/0x110 [ 2712.787229] ? __might_fault+0xd3/0x180 [ 2712.787815] ? lock_downgrade+0x6d0/0x6d0 [ 2712.788359] ? asm_exc_page_fault+0x1e/0x30 [ 2712.788931] __sys_sendmmsg+0x195/0x470 [ 2712.789495] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2712.790053] ieee802154 phy0 wpan0: encryption failed: -22 [ 2712.790973] ? lock_downgrade+0x6d0/0x6d0 [ 2712.791314] FAULT_INJECTION: forcing a failure. [ 2712.791314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.791582] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2712.794819] ? wait_for_completion+0x270/0x270 [ 2712.795495] ? rcu_read_lock_any_held+0x75/0xa0 [ 2712.796838] ? vfs_write+0x354/0xa30 [ 2712.797406] ? fput_many+0x2f/0x1a0 [ 2712.798379] ? ksys_write+0x1a9/0x260 [ 2712.799554] __x64_sys_sendmmsg+0x99/0x100 [ 2712.800815] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2712.801634] do_syscall_64+0x33/0x40 [ 2712.802145] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2712.802838] RIP: 0033:0x7f867efe2b19 [ 2712.803345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2712.805737] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2712.806865] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2712.807873] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2712.808840] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.809802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2712.810757] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2712.811785] CPU: 0 PID: 10312 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2712.812784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2712.813994] Call Trace: [ 2712.814363] dump_stack+0x107/0x167 [ 2712.814917] should_fail.cold+0x5/0xa [ 2712.815443] _copy_from_user+0x2e/0x1b0 [ 2712.816108] __copy_msghdr_from_user+0x91/0x4b0 [ 2712.816964] ? __ia32_sys_shutdown+0x80/0x80 [ 2712.818146] ? ieee802154_sock_release+0xb0/0xb0 [ 2712.819366] ? sock_sendmsg+0x55/0x190 [ 2712.820389] sendmsg_copy_msghdr+0xa1/0x160 [ 2712.821497] ? do_recvmmsg+0x6d0/0x6d0 [ 2712.822597] ? __lock_acquire+0x1657/0x5b00 [ 2712.823815] ___sys_sendmsg+0xc6/0x170 [ 2712.824804] ? sendmsg_copy_msghdr+0x160/0x160 [ 2712.825906] ? vmacache_find+0x55/0x2a0 [ 2712.826904] ? __lockdep_reset_lock+0x180/0x180 [ 2712.828048] ? find_held_lock+0x2c/0x110 [ 2712.829211] ? __might_fault+0xd3/0x180 [ 2712.830369] ? lock_downgrade+0x6d0/0x6d0 [ 2712.831369] ? asm_exc_page_fault+0x1e/0x30 [ 2712.832334] __sys_sendmmsg+0x195/0x470 [ 2712.833508] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2712.834748] ? lock_downgrade+0x6d0/0x6d0 [ 2712.835945] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2712.837136] ? wait_for_completion+0x270/0x270 [ 2712.838168] ? rcu_read_lock_any_held+0x75/0xa0 [ 2712.839415] ? vfs_write+0x354/0xa30 [ 2712.840338] ? fput_many+0x2f/0x1a0 [ 2712.840895] ? ksys_write+0x1a9/0x260 [ 2712.842005] __x64_sys_sendmmsg+0x99/0x100 [ 2712.843187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2712.844634] do_syscall_64+0x33/0x40 [ 2712.845505] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2712.846703] RIP: 0033:0x7f8542659b19 [ 2712.847589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2712.852813] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2712.854693] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2712.856854] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2712.858870] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.860917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2712.862945] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2712.865249] hpet: Lost 2 RTC interrupts [ 2712.868575] ieee802154 phy0 wpan0: encryption failed: -22 [ 2712.937841] ieee802154 phy0 wpan0: encryption failed: -22 [ 2728.363118] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:20:13 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) 02:20:13 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 93) 02:20:13 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x2}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:20:13 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 95) [ 2737.528966] ieee802154 phy0 wpan0: encryption failed: -22 [ 2737.542486] blktrace: Concurrent blktraces are not allowed on loop6 [ 2737.547036] ieee802154 phy0 wpan0: encryption failed: -22 02:20:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x20048081) syz_io_uring_setup(0x1c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff2000/0xc000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r2 = socket$inet(0x2, 0x1, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010100}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c010}, 0x44457c3bbb0f8b1e) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f00000003c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x1}, 0xfffffffe) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x1, @bearer=@udp='udp:syz2\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x400c054) 02:20:13 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000) 02:20:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 02:20:13 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x242) [ 2737.551980] ieee802154 phy0 wpan0: encryption failed: -22 [ 2737.553393] FAULT_INJECTION: forcing a failure. [ 2737.553393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2737.555196] CPU: 1 PID: 10333 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2737.557462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2737.559862] Call Trace: [ 2737.560262] dump_stack+0x107/0x167 [ 2737.560794] should_fail.cold+0x5/0xa [ 2737.561329] _copy_from_user+0x2e/0x1b0 [ 2737.562567] __copy_msghdr_from_user+0x91/0x4b0 [ 2737.563267] ? __ia32_sys_shutdown+0x80/0x80 [ 2737.563921] ? ieee802154_sock_release+0xb0/0xb0 [ 2737.565055] ? sock_sendmsg+0x55/0x190 [ 2737.565618] sendmsg_copy_msghdr+0xa1/0x160 [ 2737.566261] ? do_recvmmsg+0x6d0/0x6d0 [ 2737.566836] ? __lock_acquire+0x1657/0x5b00 [ 2737.567680] ___sys_sendmsg+0xc6/0x170 [ 2737.568303] ? sendmsg_copy_msghdr+0x160/0x160 [ 2737.568979] ? vmacache_find+0x55/0x2a0 [ 2737.569566] ? __lockdep_reset_lock+0x180/0x180 [ 2737.570223] ? find_held_lock+0x2c/0x110 [ 2737.570827] ? __might_fault+0xd3/0x180 [ 2737.571402] ? lock_downgrade+0x6d0/0x6d0 [ 2737.572148] ? asm_exc_page_fault+0x1e/0x30 [ 2737.572734] __sys_sendmmsg+0x195/0x470 [ 2737.573282] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2737.573869] ? lock_downgrade+0x6d0/0x6d0 [ 2737.574489] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2737.575216] ? wait_for_completion+0x270/0x270 [ 2737.576271] ? rcu_read_lock_any_held+0x75/0xa0 [ 2737.577419] ? vfs_write+0x354/0xa30 [ 2737.578349] ? fput_many+0x2f/0x1a0 [ 2737.579348] ? ksys_write+0x1a9/0x260 [ 2737.580547] __x64_sys_sendmmsg+0x99/0x100 [ 2737.581774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2737.583353] do_syscall_64+0x33/0x40 [ 2737.584488] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2737.586099] RIP: 0033:0x7f867efe2b19 [ 2737.587230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2737.593079] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2737.595327] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2737.597532] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2737.599579] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2737.601773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2737.604064] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2737.609385] FAULT_INJECTION: forcing a failure. [ 2737.609385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2737.613122] CPU: 1 PID: 10334 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2737.615433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2737.618058] Call Trace: [ 2737.618992] dump_stack+0x107/0x167 [ 2737.620125] should_fail.cold+0x5/0xa [ 2737.621320] _copy_from_user+0x2e/0x1b0 [ 2737.622548] __copy_msghdr_from_user+0x91/0x4b0 [ 2737.623985] ? __ia32_sys_shutdown+0x80/0x80 [ 2737.625344] ? ieee802154_sock_release+0xb0/0xb0 [ 2737.626834] ? sock_sendmsg+0x55/0x190 [ 2737.628064] sendmsg_copy_msghdr+0xa1/0x160 [ 2737.629343] ? do_recvmmsg+0x6d0/0x6d0 [ 2737.630569] ? __lock_acquire+0x1657/0x5b00 [ 2737.631917] ___sys_sendmsg+0xc6/0x170 [ 2737.633117] ? sendmsg_copy_msghdr+0x160/0x160 [ 2737.634580] ? vmacache_find+0x55/0x2a0 [ 2737.635765] ? __lockdep_reset_lock+0x180/0x180 [ 2737.637199] ? find_held_lock+0x2c/0x110 [ 2737.638488] ? __might_fault+0xd3/0x180 [ 2737.639726] ? lock_downgrade+0x6d0/0x6d0 [ 2737.640982] ? asm_exc_page_fault+0x1e/0x30 [ 2737.642378] __sys_sendmmsg+0x195/0x470 [ 2737.643593] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2737.644950] ? lock_downgrade+0x6d0/0x6d0 [ 2737.646311] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2737.647804] ? wait_for_completion+0x270/0x270 [ 2737.649264] ? rcu_read_lock_any_held+0x75/0xa0 [ 2737.650824] ? vfs_write+0x354/0xa30 [ 2737.651974] ? fput_many+0x2f/0x1a0 [ 2737.653020] ? ksys_write+0x1a9/0x260 [ 2737.654157] __x64_sys_sendmmsg+0x99/0x100 [ 2737.655373] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2737.656910] do_syscall_64+0x33/0x40 [ 2737.657966] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2737.659521] RIP: 0033:0x7f8542659b19 [ 2737.660716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2737.666382] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2737.668733] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2737.670822] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2737.673020] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2737.675123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2737.677242] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:20:13 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) 02:20:13 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) [ 2737.697543] ieee802154 phy0 wpan0: encryption failed: -22 02:20:13 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 96) [ 2737.784233] ieee802154 phy0 wpan0: encryption failed: -22 [ 2737.788371] FAULT_INJECTION: forcing a failure. [ 2737.788371] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2737.790036] CPU: 1 PID: 10355 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2737.791224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2737.792326] Call Trace: [ 2737.792691] dump_stack+0x107/0x167 [ 2737.793185] should_fail.cold+0x5/0xa [ 2737.793702] _copy_from_user+0x2e/0x1b0 [ 2737.794229] __copy_msghdr_from_user+0x91/0x4b0 [ 2737.794892] ? __ia32_sys_shutdown+0x80/0x80 [ 2737.795546] ? ieee802154_sock_release+0xb0/0xb0 [ 2737.796683] ? sock_sendmsg+0x55/0x190 [ 2737.797594] sendmsg_copy_msghdr+0xa1/0x160 [ 2737.798956] ? do_recvmmsg+0x6d0/0x6d0 [ 2737.800124] ? __lock_acquire+0x1657/0x5b00 [ 2737.801298] ___sys_sendmsg+0xc6/0x170 [ 2737.802345] ? sendmsg_copy_msghdr+0x160/0x160 [ 2737.803620] ? vmacache_find+0x55/0x2a0 [ 2737.804842] ? __lockdep_reset_lock+0x180/0x180 [ 2737.806332] ? find_held_lock+0x2c/0x110 [ 2737.807821] ? __might_fault+0xd3/0x180 [ 2737.809271] ? lock_downgrade+0x6d0/0x6d0 [ 2737.810662] ? asm_exc_page_fault+0x1e/0x30 [ 2737.812187] __sys_sendmmsg+0x195/0x470 [ 2737.813559] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2737.815047] ? lock_downgrade+0x6d0/0x6d0 [ 2737.816683] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2737.818211] ? wait_for_completion+0x270/0x270 [ 2737.819685] ? rcu_read_lock_any_held+0x75/0xa0 [ 2737.821138] ? vfs_write+0x354/0xa30 [ 2737.822499] ? fput_many+0x2f/0x1a0 [ 2737.823349] ? ksys_write+0x1a9/0x260 [ 2737.823920] __x64_sys_sendmmsg+0x99/0x100 [ 2737.824527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2737.825257] do_syscall_64+0x33/0x40 [ 2737.825795] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2737.826519] RIP: 0033:0x7f867efe2b19 [ 2737.827052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2737.829713] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2737.830791] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2737.831788] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2737.832726] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2737.833632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2737.834530] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2752.676056] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2760.416929] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:20:37 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) 02:20:37 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 97) 02:20:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) timerfd_settime(r0, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) readv(r1, 0x0, 0x0) tee(r2, 0xffffffffffffffff, 0x7fbc, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16=r4], 0xfdef) 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2a0) 02:20:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x15, &(0x7f0000000040), 0x4) 02:20:37 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfcff) 02:20:37 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 94) 02:20:37 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2761.549494] blktrace: Concurrent blktraces are not allowed on loop12 [ 2761.579519] ieee802154 phy0 wpan0: encryption failed: -22 [ 2761.603219] ieee802154 phy0 wpan0: encryption failed: -22 [ 2761.613337] FAULT_INJECTION: forcing a failure. [ 2761.613337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2761.619916] CPU: 1 PID: 10369 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2761.623618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2761.628000] Call Trace: [ 2761.629402] dump_stack+0x107/0x167 [ 2761.631265] should_fail.cold+0x5/0xa [ 2761.633266] _copy_from_user+0x2e/0x1b0 [ 2761.635397] __copy_msghdr_from_user+0x91/0x4b0 [ 2761.637863] ? __ia32_sys_shutdown+0x80/0x80 [ 2761.640131] ? ieee802154_sock_release+0xb0/0xb0 [ 2761.642616] ? sock_sendmsg+0x55/0x190 [ 2761.644686] sendmsg_copy_msghdr+0xa1/0x160 [ 2761.646913] ? do_recvmmsg+0x6d0/0x6d0 [ 2761.648971] ? __lock_acquire+0x1657/0x5b00 [ 2761.651247] ___sys_sendmsg+0xc6/0x170 [ 2761.653269] ? sendmsg_copy_msghdr+0x160/0x160 [ 2761.655708] ? vmacache_find+0x55/0x2a0 [ 2761.658020] ? __lockdep_reset_lock+0x180/0x180 [ 2761.659869] ? find_held_lock+0x2c/0x110 [ 2761.661994] ? __might_fault+0xd3/0x180 [ 2761.663370] ? lock_downgrade+0x6d0/0x6d0 [ 2761.664444] ? asm_exc_page_fault+0x1e/0x30 [ 2761.665568] __sys_sendmmsg+0x195/0x470 [ 2761.666614] hpet: Lost 2 RTC interrupts [ 2761.666757] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2761.668896] ? lock_downgrade+0x6d0/0x6d0 [ 2761.669962] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2761.671164] ? wait_for_completion+0x270/0x270 [ 2761.672427] ? rcu_read_lock_any_held+0x75/0xa0 [ 2761.673607] ? vfs_write+0x354/0xa30 [ 2761.674542] ? fput_many+0x2f/0x1a0 [ 2761.675451] ? ksys_write+0x1a9/0x260 [ 2761.676454] __x64_sys_sendmmsg+0x99/0x100 [ 2761.677503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2761.678775] do_syscall_64+0x33/0x40 [ 2761.679702] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2761.680977] RIP: 0033:0x7f867efe2b19 [ 2761.681903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2761.686404] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2761.688282] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2761.690025] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2761.691778] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2761.693541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2761.695297] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2761.708878] ieee802154 phy0 wpan0: encryption failed: -22 [ 2761.727495] FAULT_INJECTION: forcing a failure. [ 2761.727495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2761.732039] CPU: 0 PID: 10370 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2761.740250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2761.741941] Call Trace: [ 2761.742514] dump_stack+0x107/0x167 [ 2761.743270] should_fail.cold+0x5/0xa [ 2761.744071] _copy_from_user+0x2e/0x1b0 [ 2761.744926] __copy_msghdr_from_user+0x91/0x4b0 [ 2761.745880] ? __ia32_sys_shutdown+0x80/0x80 [ 2761.746798] ? ieee802154_sock_release+0xb0/0xb0 [ 2761.747771] ? sock_sendmsg+0x55/0x190 [ 2761.752049] sendmsg_copy_msghdr+0xa1/0x160 [ 2761.753292] ? do_recvmmsg+0x6d0/0x6d0 [ 2761.754479] ? __lock_acquire+0x1657/0x5b00 [ 2761.755848] ___sys_sendmsg+0xc6/0x170 [ 2761.757007] ? sendmsg_copy_msghdr+0x160/0x160 [ 2761.758332] ? vmacache_find+0x55/0x2a0 [ 2761.759477] ? __lockdep_reset_lock+0x180/0x180 [ 2761.760972] ? find_held_lock+0x2c/0x110 [ 2761.762215] ? __might_fault+0xd3/0x180 [ 2761.763347] ? lock_downgrade+0x6d0/0x6d0 [ 2761.764844] ? asm_exc_page_fault+0x1e/0x30 [ 2761.770468] __sys_sendmmsg+0x195/0x470 [ 2761.770998] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2761.771557] ? lock_downgrade+0x6d0/0x6d0 [ 2761.772124] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2761.772784] ? wait_for_completion+0x270/0x270 [ 2761.773384] ? rcu_read_lock_any_held+0x75/0xa0 [ 2761.773994] ? vfs_write+0x354/0xa30 [ 2761.774489] ? fput_many+0x2f/0x1a0 [ 2761.774972] ? ksys_write+0x1a9/0x260 [ 2761.775494] __x64_sys_sendmmsg+0x99/0x100 [ 2761.776050] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2761.776838] do_syscall_64+0x33/0x40 [ 2761.777323] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2761.777987] RIP: 0033:0x7f8542659b19 [ 2761.778475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2761.780819] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2761.781799] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2761.782679] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2761.783533] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2761.784393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2761.785249] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2761.786280] hpet: Lost 3 RTC interrupts 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2a5) 02:20:37 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) [ 2761.841296] blktrace: Concurrent blktraces are not allowed on loop12 [ 2761.877175] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 98) 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300) [ 2761.933200] blktrace: Concurrent blktraces are not allowed on loop12 02:20:37 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000) 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x351) 02:20:37 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x8}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:20:37 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 95) [ 2762.037007] blktrace: Concurrent blktraces are not allowed on loop6 [ 2762.046078] blktrace: Concurrent blktraces are not allowed on loop12 02:20:37 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) [ 2762.072133] ieee802154 phy0 wpan0: encryption failed: -22 [ 2762.084942] FAULT_INJECTION: forcing a failure. [ 2762.084942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2762.087967] CPU: 1 PID: 10399 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2762.089895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2762.091972] Call Trace: [ 2762.100785] dump_stack+0x107/0x167 [ 2762.101667] should_fail.cold+0x5/0xa [ 2762.102564] _copy_from_user+0x2e/0x1b0 [ 2762.103455] ieee802154 phy0 wpan0: encryption failed: -22 [ 2762.103519] __copy_msghdr_from_user+0x91/0x4b0 [ 2762.109986] ? __ia32_sys_shutdown+0x80/0x80 [ 2762.111069] ? ieee802154_sock_release+0xb0/0xb0 [ 2762.112242] ? sock_sendmsg+0x55/0x190 [ 2762.113223] sendmsg_copy_msghdr+0xa1/0x160 [ 2762.114290] ? do_recvmmsg+0x6d0/0x6d0 [ 2762.115279] ? __lock_acquire+0x1657/0x5b00 [ 2762.120473] ___sys_sendmsg+0xc6/0x170 [ 2762.121417] ? sendmsg_copy_msghdr+0x160/0x160 [ 2762.122501] ? __lockdep_reset_lock+0x180/0x180 [ 2762.123611] ? trace_hardirqs_on+0x5b/0x180 [ 2762.127464] FAULT_INJECTION: forcing a failure. [ 2762.127464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2762.132723] ? find_held_lock+0x2c/0x110 [ 2762.132757] ? __might_fault+0xd3/0x180 [ 2762.136280] ? lock_downgrade+0x6d0/0x6d0 [ 2762.137383] ? io_schedule_timeout+0x140/0x140 [ 2762.138592] __sys_sendmmsg+0x195/0x470 [ 2762.139639] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2762.140790] ? lock_downgrade+0x6d0/0x6d0 [ 2762.141904] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2762.143157] ? wait_for_completion+0x270/0x270 [ 2762.144422] ? rcu_read_lock_any_held+0x75/0xa0 [ 2762.145630] ? vfs_write+0x354/0xa30 [ 2762.146611] ? fput_many+0x2f/0x1a0 [ 2762.147563] ? ksys_write+0x1a9/0x260 [ 2762.148612] __x64_sys_sendmmsg+0x99/0x100 [ 2762.149722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2762.151041] do_syscall_64+0x33/0x40 [ 2762.151997] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2762.153422] RIP: 0033:0x7f867efe2b19 [ 2762.154413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2762.159059] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2762.161073] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2762.162886] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2762.168898] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.170739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.172633] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2762.176472] CPU: 0 PID: 10404 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2762.177377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2762.178414] Call Trace: [ 2762.178775] dump_stack+0x107/0x167 [ 2762.179249] should_fail.cold+0x5/0xa [ 2762.179763] _copy_from_user+0x2e/0x1b0 [ 2762.180302] __copy_msghdr_from_user+0x91/0x4b0 [ 2762.180911] ? __ia32_sys_shutdown+0x80/0x80 [ 2762.181487] ? ieee802154_sock_release+0xb0/0xb0 [ 2762.182103] ? sock_sendmsg+0x55/0x190 [ 2762.182638] sendmsg_copy_msghdr+0xa1/0x160 [ 2762.183227] ? do_recvmmsg+0x6d0/0x6d0 [ 2762.183755] ? __lock_acquire+0x1657/0x5b00 [ 2762.188360] ___sys_sendmsg+0xc6/0x170 [ 2762.188875] ? sendmsg_copy_msghdr+0x160/0x160 [ 2762.189459] ? vmacache_find+0x55/0x2a0 [ 2762.189975] ? __lockdep_reset_lock+0x180/0x180 [ 2762.190587] ? find_held_lock+0x2c/0x110 [ 2762.191120] ? __might_fault+0xd3/0x180 [ 2762.191636] ? lock_downgrade+0x6d0/0x6d0 [ 2762.192172] ? asm_exc_page_fault+0x1e/0x30 [ 2762.192795] __sys_sendmmsg+0x195/0x470 [ 2762.193333] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2762.193904] ? lock_downgrade+0x6d0/0x6d0 [ 2762.194480] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2762.195110] ? wait_for_completion+0x270/0x270 [ 2762.195708] ? rcu_read_lock_any_held+0x75/0xa0 [ 2762.196343] ? vfs_write+0x354/0xa30 [ 2762.196836] ? fput_many+0x2f/0x1a0 [ 2762.197318] ? ksys_write+0x1a9/0x260 [ 2762.197839] __x64_sys_sendmmsg+0x99/0x100 [ 2762.198396] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2762.199065] do_syscall_64+0x33/0x40 [ 2762.199551] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2762.200285] RIP: 0033:0x7f8542659b19 [ 2762.200786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2762.203101] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2762.204067] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2762.204982] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2762.205876] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.206775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.207675] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2762.208823] hpet: Lost 1 RTC interrupts 02:20:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040), 0x4) [ 2762.222340] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000) 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x39a) [ 2762.291347] blktrace: Concurrent blktraces are not allowed on loop12 [ 2762.301929] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) [ 2762.332349] blktrace: Concurrent blktraces are not allowed on loop6 02:20:37 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3d0) 02:20:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, 0x0, &(0x7f0000000300), 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fec000/0x11000)=nil, 0x11000, 0x1000005, 0x80010, 0xffffffffffffffff, 0x10000000) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/219, 0xdb}, {&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000200)=""/221, 0xdd}], 0x4, &(0x7f0000000340)=""/231, 0xe7}, 0x3}, {{0x0, 0x0, &(0x7f0000000440)}, 0xfffffffd}, {{&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f00000005c0)=""/86, 0x56}, {&(0x7f0000000640)=""/72, 0x48}, {&(0x7f00000006c0)=""/162, 0xa2}, {&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/172, 0xac}], 0x7, &(0x7f0000001900)=""/9, 0x9}}], 0x3, 0x2000, &(0x7f0000001a00)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000180)={r2, r3+60000000}, 0x1, 0x1, 0x1, {0x0, r4}}, 0x40) syz_io_uring_submit(0x0, r0, &(0x7f0000001a40)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0xaca) [ 2762.380688] blktrace: Concurrent blktraces are not allowed on loop12 02:20:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 02:20:37 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3000000) 02:20:38 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3f1) [ 2762.523565] blktrace: Concurrent blktraces are not allowed on loop12 [ 2762.532298] blktrace: Concurrent blktraces are not allowed on loop6 [ 2778.152546] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2779.316479] hpet: Lost 1 RTC interrupts [ 2779.543935] hpet: Lost 1 RTC interrupts [ 2785.455872] hpet: Lost 1 RTC interrupts 02:21:02 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 99) 02:21:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x200000cc}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:21:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3f9) 02:21:02 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x6000000) 02:21:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, 0x0, &(0x7f0000000300), 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fec000/0x11000)=nil, 0x11000, 0x1000005, 0x80010, 0xffffffffffffffff, 0x10000000) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/219, 0xdb}, {&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000200)=""/221, 0xdd}], 0x4, &(0x7f0000000340)=""/231, 0xe7}, 0x3}, {{0x0, 0x0, &(0x7f0000000440)}, 0xfffffffd}, {{&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f00000005c0)=""/86, 0x56}, {&(0x7f0000000640)=""/72, 0x48}, {&(0x7f00000006c0)=""/162, 0xa2}, {&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/172, 0xac}], 0x7, &(0x7f0000001900)=""/9, 0x9}}], 0x3, 0x2000, &(0x7f0000001a00)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000180)={r2, r3+60000000}, 0x1, 0x1, 0x1, {0x0, r4}}, 0x40) syz_io_uring_submit(0x0, r0, &(0x7f0000001a40)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0xaca) [ 2787.173600] blktrace: Concurrent blktraces are not allowed on loop6 02:21:02 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 96) 02:21:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x18, &(0x7f0000000040), 0x4) 02:21:02 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) [ 2787.204842] ieee802154 phy0 wpan0: encryption failed: -22 [ 2787.207253] blktrace: Concurrent blktraces are not allowed on loop12 [ 2787.213286] FAULT_INJECTION: forcing a failure. [ 2787.213286] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2787.213343] ieee802154 phy0 wpan0: encryption failed: -22 [ 2787.214772] CPU: 0 PID: 10460 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2787.216334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2787.217113] FAULT_INJECTION: forcing a failure. [ 2787.217113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2787.217461] Call Trace: [ 2787.219215] dump_stack+0x107/0x167 [ 2787.219699] should_fail.cold+0x5/0xa [ 2787.220209] _copy_from_user+0x2e/0x1b0 [ 2787.220748] __copy_msghdr_from_user+0x91/0x4b0 [ 2787.221355] ? __ia32_sys_shutdown+0x80/0x80 [ 2787.221950] ? ieee802154_sock_release+0xb0/0xb0 [ 2787.222572] ? sock_sendmsg+0x55/0x190 [ 2787.223098] sendmsg_copy_msghdr+0xa1/0x160 [ 2787.223665] ? do_recvmmsg+0x6d0/0x6d0 [ 2787.224182] ? __lock_acquire+0x1657/0x5b00 [ 2787.224767] ___sys_sendmsg+0xc6/0x170 [ 2787.225278] ? sendmsg_copy_msghdr+0x160/0x160 [ 2787.225885] ? __lockdep_reset_lock+0x180/0x180 [ 2787.226490] ? trace_hardirqs_on+0x5b/0x180 [ 2787.227069] ? find_held_lock+0x2c/0x110 [ 2787.227612] ? __might_fault+0xd3/0x180 [ 2787.228137] ? lock_downgrade+0x6d0/0x6d0 [ 2787.228729] ? io_schedule_timeout+0x140/0x140 [ 2787.229352] __sys_sendmmsg+0x195/0x470 [ 2787.229883] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2787.230430] ? lock_downgrade+0x6d0/0x6d0 [ 2787.231000] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2787.231634] ? wait_for_completion+0x270/0x270 [ 2787.232235] ? rcu_read_lock_any_held+0x75/0xa0 [ 2787.232857] ? vfs_write+0x354/0xa30 [ 2787.233352] ? fput_many+0x2f/0x1a0 [ 2787.233834] ? ksys_write+0x1a9/0x260 [ 2787.234351] __x64_sys_sendmmsg+0x99/0x100 [ 2787.234910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2787.235582] do_syscall_64+0x33/0x40 [ 2787.236054] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2787.236734] RIP: 0033:0x7f8542659b19 [ 2787.237223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2787.239615] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2787.240707] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2787.242435] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2787.244149] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2787.245813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2787.246975] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2787.248185] CPU: 1 PID: 10461 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2787.248343] hpet: Lost 1 RTC interrupts [ 2787.249005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2787.249013] Call Trace: [ 2787.250870] dump_stack+0x107/0x167 [ 2787.251267] should_fail.cold+0x5/0xa [ 2787.251682] _copy_from_user+0x2e/0x1b0 [ 2787.252114] __copy_msghdr_from_user+0x91/0x4b0 [ 2787.252629] ? __ia32_sys_shutdown+0x80/0x80 [ 2787.253108] ? ieee802154_sock_release+0xb0/0xb0 [ 2787.253622] ? sock_sendmsg+0x55/0x190 [ 2787.254028] sendmsg_copy_msghdr+0xa1/0x160 [ 2787.254490] ? do_recvmmsg+0x6d0/0x6d0 [ 2787.254903] ? __lock_acquire+0x1657/0x5b00 [ 2787.255381] ___sys_sendmsg+0xc6/0x170 [ 2787.255802] ? sendmsg_copy_msghdr+0x160/0x160 [ 2787.256291] ? vmacache_find+0x55/0x2a0 [ 2787.256729] ? __lockdep_reset_lock+0x180/0x180 [ 2787.257236] ? find_held_lock+0x2c/0x110 [ 2787.257681] ? __might_fault+0xd3/0x180 [ 2787.258109] ? lock_downgrade+0x6d0/0x6d0 [ 2787.258562] ? asm_exc_page_fault+0x1e/0x30 [ 2787.259039] __sys_sendmmsg+0x195/0x470 [ 2787.259473] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2787.259938] ? lock_downgrade+0x6d0/0x6d0 [ 2787.260394] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2787.260935] ? wait_for_completion+0x270/0x270 [ 2787.261425] ? rcu_read_lock_any_held+0x75/0xa0 [ 2787.261921] ? vfs_write+0x354/0xa30 [ 2787.262319] ? fput_many+0x2f/0x1a0 [ 2787.262710] ? ksys_write+0x1a9/0x260 [ 2787.263130] __x64_sys_sendmmsg+0x99/0x100 [ 2787.263586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2787.264144] do_syscall_64+0x33/0x40 [ 2787.264558] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2787.265105] RIP: 0033:0x7f867efe2b19 [ 2787.265503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2787.267461] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2787.268273] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2787.269055] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2787.269818] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2787.270576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2787.271332] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 02:21:02 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x7ffff000}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2787.311018] hpet: Lost 1 RTC interrupts 02:21:02 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a00) [ 2787.349232] hpet: Lost 1 RTC interrupts [ 2787.365858] blktrace: Concurrent blktraces are not allowed on loop12 [ 2799.528023] hpet: Lost 1 RTC interrupts [ 2799.562780] hpet: Lost 1 RTC interrupts [ 2802.364432] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2810.560025] hpet: Lost 1 RTC interrupts 02:21:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 100) 02:21:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3801) 02:21:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0xfffffdef}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:21:27 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) 02:21:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1100003c) 02:21:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="fa", 0x1}], 0x209881, &(0x7f00000000c0)=ANY=[@ANYBLOB="657569643c5c1eef8c6c865cd230a32db328497e4efe3c691310a5ea02d4e0e968cf6837dc72c97a320fbea559f2fcb0e95e646269783f7f0e06155b9bbf05c02c7ec8de2a59c96ddd5c4b75d1878ad63a948955a39ac7dfb3efd2", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = syz_io_uring_setup(0x1c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ff2000/0xc000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}}, 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000200)={0x0, 0x223e, 0x11, 0x3, 0x2d2, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000280)) syz_io_uring_submit(r5, r3, 0x0, 0x1) syz_genetlink_get_family_id$batadv(0x0, r0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_setup(0xc39, &(0x7f00000002c0)={0x0, 0x391e, 0x0, 0x2, 0x278, 0x0, r1}, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)=0x0) r7 = socket$inet_icmp(0x2, 0x2, 0x1) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r9, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040), 0x4) syz_io_uring_submit(r2, r6, &(0x7f0000000400)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r7, 0x0, 0x0, 0x6, 0x4, 0x1, {0x0, r8, r9}}, 0x80000001) 02:21:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x19, &(0x7f0000000040), 0x4) [ 2811.477909] ieee802154 phy0 wpan0: encryption failed: -22 [ 2811.478940] blktrace: Concurrent blktraces are not allowed on loop6 [ 2811.479298] FAULT_INJECTION: forcing a failure. [ 2811.479298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2811.481748] CPU: 1 PID: 10480 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2811.482777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.484038] Call Trace: [ 2811.484457] dump_stack+0x107/0x167 [ 2811.485032] should_fail.cold+0x5/0xa [ 2811.485612] _copy_from_user+0x2e/0x1b0 [ 2811.486223] __copy_msghdr_from_user+0x91/0x4b0 02:21:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 97) [ 2811.486917] ? __ia32_sys_shutdown+0x80/0x80 [ 2811.487606] ? ieee802154_sock_release+0xb0/0xb0 [ 2811.488299] ? sock_sendmsg+0x55/0x190 [ 2811.488891] sendmsg_copy_msghdr+0xa1/0x160 [ 2811.489537] ? do_recvmmsg+0x6d0/0x6d0 [ 2811.490124] ? __lock_acquire+0x1657/0x5b00 [ 2811.490782] ___sys_sendmsg+0xc6/0x170 [ 2811.491366] ? sendmsg_copy_msghdr+0x160/0x160 [ 2811.492046] ? vmacache_find+0x55/0x2a0 [ 2811.492638] ? __lockdep_reset_lock+0x180/0x180 [ 2811.493345] ? find_held_lock+0x2c/0x110 [ 2811.493960] ? __might_fault+0xd3/0x180 [ 2811.494560] ? lock_downgrade+0x6d0/0x6d0 [ 2811.495244] ? asm_exc_page_fault+0x1e/0x30 [ 2811.495913] __sys_sendmmsg+0x195/0x470 [ 2811.496515] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2811.497175] ? lock_downgrade+0x6d0/0x6d0 [ 2811.497805] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2811.498525] ? wait_for_completion+0x270/0x270 [ 2811.499227] ? rcu_read_lock_any_held+0x75/0xa0 [ 2811.499912] ? vfs_write+0x354/0xa30 [ 2811.500480] ? fput_many+0x2f/0x1a0 [ 2811.501034] ? ksys_write+0x1a9/0x260 02:21:27 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x2}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2811.501612] __x64_sys_sendmmsg+0x99/0x100 [ 2811.502338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2811.503111] do_syscall_64+0x33/0x40 [ 2811.503677] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2811.504451] RIP: 0033:0x7f867efe2b19 [ 2811.505028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2811.507827] RSP: 002b:00007f867c558188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2811.509004] RAX: ffffffffffffffda RBX: 00007f867f0f5f60 RCX: 00007f867efe2b19 [ 2811.510084] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2811.511243] RBP: 00007f867c5581d0 R08: 0000000000000000 R09: 0000000000000000 [ 2811.512306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2811.513381] R13: 00007fffb7ecc00f R14: 00007f867c558300 R15: 0000000000022000 [ 2811.519347] ieee802154 phy0 wpan0: encryption failed: -22 [ 2811.519532] blktrace: Concurrent blktraces are not allowed on loop12 [ 2811.531365] FAULT_INJECTION: forcing a failure. [ 2811.531365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2811.532739] CPU: 0 PID: 10494 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2811.533526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.534439] Call Trace: [ 2811.534752] dump_stack+0x107/0x167 [ 2811.535173] should_fail.cold+0x5/0xa [ 2811.535612] _copy_from_user+0x2e/0x1b0 [ 2811.536067] __copy_msghdr_from_user+0x91/0x4b0 [ 2811.536592] ? __ia32_sys_shutdown+0x80/0x80 [ 2811.537116] ? ieee802154_sock_release+0xb0/0xb0 [ 2811.537651] ? sock_sendmsg+0x55/0x190 [ 2811.538093] sendmsg_copy_msghdr+0xa1/0x160 [ 2811.538577] ? do_recvmmsg+0x6d0/0x6d0 [ 2811.539020] ? __lock_acquire+0x1657/0x5b00 [ 2811.539525] ___sys_sendmsg+0xc6/0x170 [ 2811.539964] ? sendmsg_copy_msghdr+0x160/0x160 [ 2811.540477] ? vmacache_find+0x55/0x2a0 [ 2811.540944] ? __lockdep_reset_lock+0x180/0x180 [ 2811.541446] ? find_held_lock+0x2c/0x110 [ 2811.541900] ? __might_fault+0xd3/0x180 [ 2811.542324] ? lock_downgrade+0x6d0/0x6d0 [ 2811.542753] ? asm_exc_page_fault+0x1e/0x30 [ 2811.543228] __sys_sendmmsg+0x195/0x470 [ 2811.543652] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2811.544100] ? lock_downgrade+0x6d0/0x6d0 [ 2811.544552] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2811.545136] ? wait_for_completion+0x270/0x270 [ 2811.545657] ? rcu_read_lock_any_held+0x75/0xa0 [ 2811.546164] ? vfs_write+0x354/0xa30 [ 2811.546587] ? fput_many+0x2f/0x1a0 [ 2811.546988] ? ksys_write+0x1a9/0x260 [ 2811.547424] __x64_sys_sendmmsg+0x99/0x100 [ 2811.547895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2811.548464] do_syscall_64+0x33/0x40 [ 2811.548884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2811.549413] RIP: 0033:0x7f8542659b19 [ 2811.549842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2811.551867] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2811.552717] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2811.553477] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2811.554270] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2811.555070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2811.555859] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2811.565445] ieee802154 phy0 wpan0: encryption failed: -22 02:21:27 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000) 02:21:27 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101286, 0x0) [ 2811.610207] ieee802154 phy0 wpan0: encryption failed: -22 02:21:27 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 98) 02:21:27 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:21:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a000000) [ 2811.638241] blktrace: Concurrent blktraces are not allowed on loop12 02:21:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x1b, &(0x7f0000000040), 0x4) [ 2811.653142] ieee802154 phy0 wpan0: encryption failed: -22 02:21:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x9011, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001540)={[{@acl}]}) [ 2811.680208] ieee802154 phy0 wpan0: encryption failed: -22 [ 2811.685561] FAULT_INJECTION: forcing a failure. [ 2811.685561] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2811.687207] CPU: 1 PID: 10521 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2811.688157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.689313] Call Trace: [ 2811.689698] dump_stack+0x107/0x167 [ 2811.690225] should_fail.cold+0x5/0xa [ 2811.690761] _copy_from_user+0x2e/0x1b0 [ 2811.691323] __copy_msghdr_from_user+0x91/0x4b0 [ 2811.691972] ? __ia32_sys_shutdown+0x80/0x80 [ 2811.692636] ? ieee802154_sock_release+0xb0/0xb0 [ 2811.693305] ? sock_sendmsg+0x55/0x190 [ 2811.693854] sendmsg_copy_msghdr+0xa1/0x160 [ 2811.694450] ? do_recvmmsg+0x6d0/0x6d0 [ 2811.694994] ? __lock_acquire+0x1657/0x5b00 [ 2811.695609] ___sys_sendmsg+0xc6/0x170 [ 2811.696165] ? sendmsg_copy_msghdr+0x160/0x160 [ 2811.696811] ? vmacache_find+0x55/0x2a0 [ 2811.697401] ? __lockdep_reset_lock+0x180/0x180 [ 2811.698138] ? find_held_lock+0x2c/0x110 [ 2811.698713] ? __might_fault+0xd3/0x180 [ 2811.699261] ? lock_downgrade+0x6d0/0x6d0 [ 2811.699836] ? asm_exc_page_fault+0x1e/0x30 [ 2811.700470] __sys_sendmmsg+0x195/0x470 [ 2811.701064] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2811.701673] ? lock_downgrade+0x6d0/0x6d0 [ 2811.702274] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2811.702965] ? wait_for_completion+0x270/0x270 [ 2811.703628] ? rcu_read_lock_any_held+0x75/0xa0 [ 2811.704277] ? vfs_write+0x354/0xa30 [ 2811.704802] ? fput_many+0x2f/0x1a0 [ 2811.705334] ? ksys_write+0x1a9/0x260 [ 2811.705905] __x64_sys_sendmmsg+0x99/0x100 [ 2811.706491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2811.707200] do_syscall_64+0x33/0x40 [ 2811.707710] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2811.708417] RIP: 0033:0x7f8542659b19 [ 2811.708954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2811.711515] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2811.712597] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2811.713682] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2811.714673] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2811.715648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2811.716621] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:21:27 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3c000011) [ 2811.812484] hpet: Lost 1 RTC interrupts [ 2811.853554] hpet: Lost 1 RTC interrupts [ 2817.406758] hpet: Lost 1 RTC interrupts [ 2825.886380] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:21:52 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x40101288, 0x0) 02:21:52 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:21:52 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000000) 02:21:52 executing program 5: write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x20, 0x0, 0xfb, 0x4, @tick=0x7, {0xf9, 0x8}, {0x1, 0x1a}, @result={0x9, 0xdb}}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./file1\x00', 0x4) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000004000000000000000000000000000000000000000000000027aa887d00"/250]) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000080)) open(&(0x7f00000001c0)='./file1\x00', 0x802, 0x2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'gre0\x00', &(0x7f0000000180)={'syztnl1\x00', r3, 0x8000, 0x8000, 0x4, 0x6, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x67, 0x0, 0x3, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop]}}}}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x4, &(0x7f0000000080), 0x4) bind$packet(r4, &(0x7f0000000040)={0x11, 0x1, r3, 0x1, 0x9, 0x6, @remote}, 0x14) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={0x0, @phonet={0x23, 0x1f, 0x9, 0x4}, @phonet={0x23, 0x3, 0xff, 0x1}, @ethernet={0x1, @broadcast}, 0x20, 0x0, 0x0, 0x0, 0xcfd4, &(0x7f0000000200)='ipvlan0\x00', 0x180000000000, 0x4, 0x8}) 02:21:52 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x3}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:21:52 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4202) 02:21:52 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 99) 02:21:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x1d, &(0x7f0000000040), 0x4) [ 2836.786331] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.793754] blktrace: Concurrent blktraces are not allowed on loop12 [ 2836.808533] blktrace: Concurrent blktraces are not allowed on loop6 [ 2836.810125] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.812523] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.818387] FAULT_INJECTION: forcing a failure. [ 2836.818387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2836.820974] CPU: 1 PID: 10544 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2836.822433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2836.824240] Call Trace: [ 2836.824800] dump_stack+0x107/0x167 [ 2836.825598] should_fail.cold+0x5/0xa [ 2836.826407] _copy_from_user+0x2e/0x1b0 [ 2836.827249] __copy_msghdr_from_user+0x91/0x4b0 [ 2836.828218] ? __ia32_sys_shutdown+0x80/0x80 [ 2836.829195] ? perf_trace_lock+0xac/0x490 [ 2836.830080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2836.831195] sendmsg_copy_msghdr+0xa1/0x160 [ 2836.832114] ? do_recvmmsg+0x6d0/0x6d0 [ 2836.832945] ? find_held_lock+0x2c/0x110 [ 2836.833857] ___sys_sendmsg+0xc6/0x170 [ 2836.834687] ? sendmsg_copy_msghdr+0x160/0x160 [ 2836.835663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2836.836768] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2836.837729] ? trace_hardirqs_on+0x5b/0x180 [ 2836.838641] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2836.839677] ? finish_task_switch+0x126/0x5d0 [ 2836.840630] ? finish_task_switch+0xef/0x5d0 [ 2836.841560] ? __switch_to+0x572/0xff0 [ 2836.842384] ? __switch_to_asm+0x3a/0x60 [ 2836.843226] ? __switch_to_asm+0x34/0x60 [ 2836.844098] ? __schedule+0x850/0x1e90 [ 2836.844943] ? io_schedule_timeout+0x140/0x140 [ 2836.845946] __sys_sendmmsg+0x195/0x470 [ 2836.846802] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2836.847701] ? lock_downgrade+0x6d0/0x6d0 [ 2836.848642] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2836.849671] ? wait_for_completion+0x270/0x270 [ 2836.850624] ? rcu_read_lock_any_held+0x75/0xa0 [ 2836.851587] ? vfs_write+0x354/0xa30 [ 2836.852383] ? fput_many+0x2f/0x1a0 [ 2836.853145] ? ksys_write+0x1a9/0x260 [ 2836.853993] __x64_sys_sendmmsg+0x99/0x100 [ 2836.854966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2836.856050] do_syscall_64+0x33/0x40 [ 2836.856821] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2836.857901] RIP: 0033:0x7f8542659b19 [ 2836.858668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2836.862488] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2836.864069] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2836.865584] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2836.867058] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2836.868541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2836.870086] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 02:21:52 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) [ 2836.886344] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.897280] ieee802154 phy0 wpan0: encryption failed: -22 02:21:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x1e, &(0x7f0000000040), 0x4) 02:21:52 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) 02:21:52 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x5103) 02:21:52 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:21:52 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x4}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:21:52 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff) 02:21:52 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={{}, 0x101, 0x0, 0x5}) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) [ 2837.105203] blktrace: Concurrent blktraces are not allowed on loop12 02:21:52 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) 02:21:52 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) (fail_nth: 100) [ 2837.151131] ieee802154 phy0 wpan0: encryption failed: -22 [ 2837.169834] blktrace: Concurrent blktraces are not allowed on loop6 [ 2837.172058] ieee802154 phy0 wpan0: encryption failed: -22 [ 2837.208053] ieee802154 phy0 wpan0: encryption failed: -22 [ 2837.220872] FAULT_INJECTION: forcing a failure. [ 2837.220872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2837.223360] CPU: 0 PID: 10586 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 2837.224792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2837.226536] Call Trace: [ 2837.227106] dump_stack+0x107/0x167 [ 2837.227859] should_fail.cold+0x5/0xa [ 2837.228671] _copy_from_user+0x2e/0x1b0 [ 2837.229564] __copy_msghdr_from_user+0x91/0x4b0 [ 2837.230537] ? __ia32_sys_shutdown+0x80/0x80 [ 2837.231469] ? ieee802154_sock_release+0xb0/0xb0 [ 2837.232453] ? sock_sendmsg+0x55/0x190 [ 2837.233317] sendmsg_copy_msghdr+0xa1/0x160 [ 2837.234216] ? do_recvmmsg+0x6d0/0x6d0 [ 2837.235033] ? __lock_acquire+0x1657/0x5b00 [ 2837.235967] ___sys_sendmsg+0xc6/0x170 [ 2837.236778] ? sendmsg_copy_msghdr+0x160/0x160 [ 2837.237756] ? __lockdep_reset_lock+0x180/0x180 [ 2837.238702] ? trace_hardirqs_on+0x5b/0x180 [ 2837.239616] ? find_held_lock+0x2c/0x110 [ 2837.240462] ? __might_fault+0xd3/0x180 [ 2837.241318] ? lock_downgrade+0x6d0/0x6d0 [ 2837.242173] ? io_schedule_timeout+0x140/0x140 [ 2837.243153] __sys_sendmmsg+0x195/0x470 [ 2837.243981] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2837.244868] ? lock_downgrade+0x6d0/0x6d0 [ 2837.245803] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2837.246806] ? wait_for_completion+0x270/0x270 [ 2837.247757] ? rcu_read_lock_any_held+0x75/0xa0 [ 2837.248709] ? vfs_write+0x354/0xa30 [ 2837.249519] ? fput_many+0x2f/0x1a0 [ 2837.250284] ? ksys_write+0x1a9/0x260 [ 2837.251101] __x64_sys_sendmmsg+0x99/0x100 [ 2837.251982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2837.253050] do_syscall_64+0x33/0x40 [ 2837.253847] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2837.254897] RIP: 0033:0x7f8542659b19 [ 2837.255673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2837.259445] RSP: 002b:00007f853fbcf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2837.261006] RAX: ffffffffffffffda RBX: 00007f854276cf60 RCX: 00007f8542659b19 [ 2837.262498] RDX: 000000007ffff000 RSI: 0000000020004d00 RDI: 0000000000000004 [ 2837.263955] RBP: 00007f853fbcf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2837.265449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2837.266905] R13: 00007fffe8c5a6cf R14: 00007f853fbcf300 R15: 0000000000022000 [ 2837.268615] hpet: Lost 2 RTC interrupts [ 2837.287036] ieee802154 phy0 wpan0: encryption failed: -22 [ 2837.288969] ieee802154 phy0 wpan0: encryption failed: -22 [ 2851.845467] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:22:18 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x21, &(0x7f0000000040), 0x4) 02:22:18 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:18 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x5}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2862.635219] ieee802154 phy0 wpan0: encryption failed: -22 [ 2862.657723] ieee802154 phy0 wpan0: encryption failed: -22 02:22:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 02:22:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 02:22:20 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:20 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x6a00) 02:22:20 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) 02:22:20 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffc0000) [ 2864.754683] blktrace: Concurrent blktraces are not allowed on loop12 [ 2864.772556] ieee802154 phy0 wpan0: encryption failed: -22 [ 2864.793197] blktrace: Concurrent blktraces are not allowed on loop6 [ 2864.797064] ieee802154 phy0 wpan0: encryption failed: -22 02:22:20 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) [ 2864.843612] ieee802154 phy0 wpan0: encryption failed: -22 [ 2864.854447] ieee802154 phy0 wpan0: encryption failed: -22 02:22:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x24, &(0x7f0000000040), 0x4) 02:22:20 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000000c0)=[{0x0}], 0x0) kexec_load(0xfffffffffffffff8, 0x0, &(0x7f0000000000), 0xa0000) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(r0, &(0x7f0000000480)=""/55, 0x37, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000001140)=ANY=[@ANYBLOB="0100004001000000180000005f62a36030c54c2c11bb71066785e02100cd7ec7f83db1c2adf009675fe45c0c8311419e84d4", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) timerfd_create(0x4, 0x800) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000340), 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x8) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x220000, 0x2) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000000)={'\x00', 0x7, 0x3, 0x7}) [ 2864.980090] ieee802154 phy0 wpan0: encryption failed: -22 [ 2880.310213] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:22:44 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffffdfd) 02:22:44 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x9a03) 02:22:44 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r1, 0x0) getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x3de4, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) chmod(&(0x7f0000000100)='./file0\x00', 0x60) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000240)) 02:22:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x25, &(0x7f0000000040), 0x4) 02:22:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x8}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:22:44 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:44 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:44 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) [ 2888.932182] blktrace: Concurrent blktraces are not allowed on loop6 [ 2888.934271] blktrace: Concurrent blktraces are not allowed on loop12 [ 2888.958941] ieee802154 phy0 wpan0: encryption failed: -22 [ 2888.968816] ieee802154 phy0 wpan0: encryption failed: -22 [ 2888.971385] ieee802154 phy0 wpan0: encryption failed: -22 [ 2889.020074] ieee802154 phy0 wpan0: encryption failed: -22 02:22:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2889.049902] ieee802154 phy0 wpan0: encryption failed: -22 02:22:44 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfcffffffffff) 02:22:44 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xa002) 02:22:44 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) [ 2889.079102] ieee802154 phy0 wpan0: encryption failed: -22 [ 2889.130652] blktrace: Concurrent blktraces are not allowed on loop12 [ 2889.153965] blktrace: Concurrent blktraces are not allowed on loop6 02:22:44 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:22:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0xf}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2889.261486] ieee802154 phy0 wpan0: encryption failed: -22 [ 2889.280155] ieee802154 phy0 wpan0: encryption failed: -22 [ 2889.326981] ieee802154 phy0 wpan0: encryption failed: -22 [ 2889.328310] ieee802154 phy0 wpan0: encryption failed: -22 [ 2904.907815] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:23:09 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:09 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xa502) 02:23:09 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x12}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:23:09 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x100000000000000) 02:23:09 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 2914.342103] ieee802154 phy0 wpan0: encryption failed: -22 02:23:09 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) 02:23:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x2, 0x4) 02:23:09 executing program 5: open(&(0x7f00000001c0)='./file1\x00', 0x8002, 0x30) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x200, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x8000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x184) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000000c0), 0x4) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) ftruncate(r1, 0x1) creat(&(0x7f0000000200)='./file0\x00', 0x14b) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x6) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x1) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xef5) [ 2914.353782] blktrace: Concurrent blktraces are not allowed on loop12 [ 2914.365356] blktrace: Concurrent blktraces are not allowed on loop6 [ 2914.380882] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.387401] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.417186] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.444279] ieee802154 phy0 wpan0: encryption failed: -22 02:23:10 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) 02:23:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x3, 0x4) [ 2914.469516] ieee802154 phy0 wpan0: encryption failed: -22 02:23:10 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x200000000000000) 02:23:10 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xd003) 02:23:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x46833}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x7, 0x5, 0x0, 0x8000}, {0x6, 0xae, 0x3f}]}) r1 = syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) [ 2914.577442] blktrace: Concurrent blktraces are not allowed on loop6 02:23:10 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x25}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:23:10 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 2914.598113] blktrace: Concurrent blktraces are not allowed on loop12 02:23:10 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:10 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) [ 2914.676394] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.711576] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.715811] ieee802154 phy0 wpan0: encryption failed: -22 02:23:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x8, 0x4) 02:23:10 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300000000000000) 02:23:10 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xe400) [ 2914.756793] audit: type=1326 audit(1672712590.308:36): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10724 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7abc28db19 code=0x0 [ 2914.768171] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.795051] ieee802154 phy0 wpan0: encryption failed: -22 [ 2914.810015] audit: type=1326 audit(1672712590.374:37): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10724 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7abc28db19 code=0x0 [ 2914.816551] blktrace: Concurrent blktraces are not allowed on loop6 [ 2914.822991] blktrace: Concurrent blktraces are not allowed on loop12 02:23:10 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) [ 2914.836149] ieee802154 phy0 wpan0: encryption failed: -22 02:23:10 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:10 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x600000000000000) 02:23:10 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xa, 0x4) 02:23:10 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf103) [ 2914.966228] ieee802154 phy0 wpan0: encryption failed: -22 02:23:10 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x30}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2915.003182] blktrace: Concurrent blktraces are not allowed on loop6 [ 2915.014786] ieee802154 phy0 wpan0: encryption failed: -22 [ 2915.024952] blktrace: Concurrent blktraces are not allowed on loop12 [ 2915.032492] ieee802154 phy0 wpan0: encryption failed: -22 [ 2915.075482] ieee802154 phy0 wpan0: encryption failed: -22 [ 2915.101291] ieee802154 phy0 wpan0: encryption failed: -22 [ 2915.121277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2930.149881] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:23:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x3d}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:23:36 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:36 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf901) 02:23:36 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) 02:23:36 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a00000000000000) 02:23:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xe, 0x4) 02:23:36 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:36 executing program 5: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x0, @none}, &(0x7f0000000140)=0xe, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000180)={{r1}, "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"}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x8e) r3 = signalfd(r2, &(0x7f0000000080), 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x4b6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r4, r2) [ 2940.668579] ieee802154 phy0 wpan0: encryption failed: -22 [ 2940.670561] ieee802154 phy0 wpan0: encryption failed: -22 [ 2940.685754] ieee802154 phy0 wpan0: encryption failed: -22 [ 2940.691984] blktrace: Concurrent blktraces are not allowed on loop6 [ 2940.693416] blktrace: Concurrent blktraces are not allowed on loop12 [ 2940.726148] ieee802154 phy0 wpan0: encryption failed: -22 [ 2940.734371] ieee802154 phy0 wpan0: encryption failed: -22 02:23:36 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) 02:23:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x28, 0x4) 02:23:36 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3c00001100000000) [ 2940.796745] ieee802154 phy0 wpan0: encryption failed: -22 02:23:36 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:23:36 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf903) 02:23:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_io_uring_setup(0x5, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280), &(0x7f0000000540)) io_uring_enter(r1, 0x5c33, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000280)=0x2) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) r2 = clone3(0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000340)={0x89, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 2940.892127] blktrace: Concurrent blktraces are not allowed on loop6 [ 2940.915281] ieee802154 phy0 wpan0: encryption failed: -22 [ 2940.921311] blktrace: Concurrent blktraces are not allowed on loop12 02:23:36 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x324}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:23:36 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) [ 2941.008311] ieee802154 phy0 wpan0: encryption failed: -22 [ 2956.361309] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:24:01 executing program 5: chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) splice(r3, &(0x7f0000000080)=0xfffffffffffffffb, 0xffffffffffffffff, &(0x7f00000000c0), 0x7, 0xb) fchdir(r0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x200, 0x100000001) 02:24:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1f4, 0x4) 02:24:01 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 02:24:01 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:01 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000) 02:24:01 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000000) 02:24:01 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x3b3}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:24:01 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x44, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 2965.509499] blktrace: Concurrent blktraces are not allowed on loop12 [ 2965.515331] blktrace: Concurrent blktraces are not allowed on loop6 [ 2965.522252] ieee802154 phy0 wpan0: encryption failed: -22 [ 2965.534317] ieee802154 phy0 wpan0: encryption failed: -22 [ 2965.596314] ieee802154 phy0 wpan0: encryption failed: -22 [ 2965.611412] ieee802154 phy0 wpan0: encryption failed: -22 02:24:01 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff00000000) 02:24:01 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) 02:24:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x240, 0x4) 02:24:01 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000) 02:24:01 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x3d1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 2965.771333] blktrace: Concurrent blktraces are not allowed on loop6 [ 2965.791469] blktrace: Concurrent blktraces are not allowed on loop12 [ 2980.770289] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:24:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x80}, 0x4004084) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r2, 0xffffffffffffffff) write(r2, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=ANY=[@ANYBLOB="b6"], 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0xfffffffffffffe69) unshare(0x48020200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x8000, 0x4, 0x8, 0x6}) 02:24:26 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:26 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x3d6}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:24:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x300, 0x4) 02:24:26 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) 02:24:26 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x48, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:26 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000) 02:24:26 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffffffffffc0000) [ 2991.221306] blktrace: Concurrent blktraces are not allowed on loop6 [ 2991.223450] ieee802154 phy0 wpan0: encryption failed: -22 [ 2991.230271] ieee802154 phy0 wpan0: encryption failed: -22 [ 2991.235901] blktrace: Concurrent blktraces are not allowed on loop12 [ 2991.290836] ieee802154 phy0 wpan0: encryption failed: -22 [ 2991.292396] ieee802154 phy0 wpan0: encryption failed: -22 [ 3006.548945] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:24:51 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3000000) [ 3015.786040] blktrace: Concurrent blktraces are not allowed on loop6 [ 3015.798169] ieee802154 phy0 wpan0: encryption failed: -22 [ 3015.818038] blktrace: Concurrent blktraces are not allowed on loop12 02:24:51 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) 02:24:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000bb4bd2ee04", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3ef8472b46661f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000080)='./file0\x00') getgroups(0x1, &(0x7f0000000180)=[0xee01]) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f00000000c0)='./file1\x00', 0x30080, 0x18) fsetxattr$security_capability(r0, &(0x7f0000000340), &(0x7f0000000380)=@v2, 0x14, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x20000007) fsmount(r1, 0x0, 0x4) 02:24:51 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:51 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0xff03}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:24:51 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x40000, 0x100) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:24:51 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x3e8, 0x4) [ 3015.848997] ieee802154 phy0 wpan0: encryption failed: -22 [ 3015.877587] ieee802154 phy0 wpan0: encryption failed: -22 02:24:51 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x7ffffff2}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:24:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xa00, 0x4) 02:24:51 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000) 02:24:51 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) [ 3015.920041] ieee802154 phy0 wpan0: encryption failed: -22 02:24:51 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3015.986652] blktrace: Concurrent blktraces are not allowed on loop12 02:24:51 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x7ffffff9}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3016.019305] ieee802154 phy0 wpan0: encryption failed: -22 02:24:51 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:24:51 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1a000000) [ 3016.073517] ieee802154 phy0 wpan0: encryption failed: -22 02:24:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xe00, 0x4) 02:24:51 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x21) [ 3016.104638] ieee802154 phy0 wpan0: encryption failed: -22 [ 3016.109963] blktrace: Concurrent blktraces are not allowed on loop12 [ 3016.184097] ieee802154 phy0 wpan0: encryption failed: -22 [ 3024.251878] hpet: Lost 1 RTC interrupts [ 3031.979235] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:25:16 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x68, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3041.215033] ieee802154 phy0 wpan0: encryption failed: -22 [ 3041.229244] blktrace: Concurrent blktraces are not allowed on loop12 [ 3041.233990] ieee802154 phy0 wpan0: encryption failed: -22 02:25:16 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x900, 0x0) syz_io_uring_setup(0x1aa7, &(0x7f0000000080)={0x0, 0x6dfe, 0x8, 0x3, 0x141, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="ff43443030310100"/32, 0x20, 0x8800}, {&(0x7f0000010700)="01001700000001000000050018000000010046494c4530000000000000000000", 0x20, 0x9800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed00", 0x82, 0xb800}], 0x0, &(0x7f0000011700)) 02:25:16 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x400, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r1, 0x0) r2 = getegid() setresgid(0x0, 0xffffffffffffffff, r2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "3d899f75bf20b89277a0431d0dd6f94ad4e73813"}, 0x15, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {0x1, 0x4}, [{0x2, 0x1, r0}, {0x2, 0x0, r1}], {0x4, 0x1}, [{0x8, 0x4}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x4, r2}], {0x10, 0x3}, {0x20, 0x6}}, 0x54, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 02:25:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x2}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:25:16 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x60ff) 02:25:16 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x38010000) 02:25:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x2800, 0x4) 02:25:16 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x44, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3041.268142] ieee802154 phy0 wpan0: encryption failed: -22 02:25:16 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xf0ff1f) 02:25:16 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="010002f1e40d2441b9fc37", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0017e3a873a7ecd39cfae1b60509f7ae05eaee6de183b1201d9c5bae604bc32e0f12e270fd6ed8521a8404b33487788c4d91bf201ebc00df92f272bba71a3245570ee9baf37439b412dd174fa56beb26bd18cce95b94800b75df93162e43b71724c9475c7b3b3c235161bc81c0bed20ebeb6b09bb9d5ab016b71227eeff405df25c09f5994610829a5c94fb61765033df624e21bff46fa420aec6fcae7d97f6f40fa67d8fb"]) openat(r0, &(0x7f0000000100)='./file0\x00', 0x80000, 0x38) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file1\x00', 0x12) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000240), 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) sendfile(0xffffffffffffffff, r2, 0x0, 0x7) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) pread64(r3, &(0x7f0000000180)=""/78, 0x4e, 0x7fff) 02:25:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x4002, 0x4) 02:25:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) lseek(r0, 0x1, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)={0x24, 0x1e, 0xe21, 0x0, 0x0, {}, [@generic="d9153d1c3ae08c9cf14f60a0b6cd0cab", @generic]}, 0x24}}, 0x0) 02:25:16 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x3}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3041.343623] ieee802154 phy0 wpan0: encryption failed: -22 02:25:16 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000000) [ 3041.403320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3041.409043] blktrace: Concurrent blktraces are not allowed on loop12 02:25:16 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:25:17 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x1ffff000) 02:25:17 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x48, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3041.489135] ieee802154 phy0 wpan0: encryption failed: -22 [ 3041.557191] ieee802154 phy0 wpan0: encryption failed: -22 [ 3041.563058] ieee802154 phy0 wpan0: encryption failed: -22 [ 3041.610835] ieee802154 phy0 wpan0: encryption failed: -22 [ 3051.732229] hpet: Lost 1 RTC interrupts [ 3058.083213] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:25:42 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:25:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xe803, 0x4) 02:25:42 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x74, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:25:42 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x42020000) 02:25:42 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x410081, 0x1c) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:25:42 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xe720, 0x0) openat(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x1b1d, &(0x7f0000000040)={0x0, 0x563b, 0x10, 0x2, 0x210, 0x0, r0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r3, 0x0) setuid(r2) syz_mount_image$tmpfs(&(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000001a00)=[{&(0x7f0000001800)="f00b10ea27719a1fa74cea446fd3b87d46f807fa8f3f7e0ce691e50f05e4cd1ef9d56d98f376e26b51e8e3b736f030ae34ff262f8702674e08979096ae2b336056400968908244e3cbffc0b717fbfc54442ef66a34138b84072d3983e47f72a11afcebeb62672eca261728d26d17c1c826365bc2fd53def0c1c667fc30028bf3f7b278008555847e3ef48ddea7bcf83f10089b99c20b8f797f6d6d8f560a67c23538d01937cac8d29bf89f0114016421f4591637da231e5bf82889cfbc6c8b42b69a5d5a2f4747dbac30afb1ac8ea1f3b9f023e4c4d099", 0xd7, 0x2}, {&(0x7f0000001900)="edb36913529a38e60f5577b47ea2e4b3f916a8aca7fdacfd626f4f3e488bc64791eee2457fa9815370b4fd83add499b2d692107a2e5a009c81e749dad407f3def958f97d0b6adea4ce5ec2a83b96a521e0d543c7934a234f26224321d363e43f25ac042ef9645fb89ef4c6e02684f6a3e2a4036efd8cc90565827c933ea81632a9d251619e68c9dbc4fb25c14344708dad1443f4480415686102628e382e71108a9ff26e7922239bf447ebcf7e783bef73b815efb1cc7e7e9a0be996c353d9941f3d1f9215b35943", 0xc8, 0x1}], 0x280400, &(0x7f0000001a40)={[{@huge_advise}, {@uid={'uid', 0x3d, r2}}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0xd135, 0x2, &(0x7f00000002c0)=[{&(0x7f00000003c0)="5d51ceaf797a6c6b7cdb82cdcc272a781375874ecf1f672c607fc24ffd956486f186feb257a0c388225dbf59ad37083df974a43db698ce5cfa56a65a4c3fe961d1d855e5f4f33f8920b2a5b5919e1495d6b448e72a90b974afb5a5d29d6ebf307cadd0caf906063f9ff7beb19f6d2783794fb8fea4b5d7d3ac194def85db72a8c9baed0390b69d6fc90f6c1be4", 0x8d, 0x4}, {&(0x7f00000005c0)="46f2e0c9ec09053e58105d0a507916eabc29c03e744dbe1c6e5adef07880843818556ef0222628ccde17833a96db9ef51107924a9749703b09fd486ab62e9a81dc7c91938cdde50cf0d6977c15e84d1ff17e1fd794a3759280319a7fc7d808aadc092dbc148c691eedb885e90183a267e7ee2320a5d9eab50db2300862915b15b99f3168ab7c0b86515ab5edd0de6b5eb0876ea2336f25e9086ed0d404760befb6a469abe2a1c85c10699019264544e09cc742a90a16399dae416f3373110eb7821d1b1c5be9b39511e50f34a870132a93f9ca6525b841b02d7fd347d5b6db568c4bc6b3e0925db43f747aa8029cf3ff0f3af45f44f5d1780ceba708a66a7ff1726ff8dc45531ec9be7743d81310ed2e09d961b0c23335e68b67b07fc17a9c751aae7944c853fc984652f8b7eab5d9b19aa8b15e1edf43e9f3cacc294d6ce266fae2aad0ce53a8ec97e0bb39f7e30e8daba6c2d1d3db7af04568e59a634f6bb5edc8a4a6dc14a37f7318bda102b649a805beca85613873f2536910a0152a8d1c3587ec2b7d6cacde124a02d4c5a9c613a857751fed05c125f6a2ac05d1a7d41fd5e8bd336e9c487e19790184def0489b060901941f624f1faf3b056bdf02067a2dfaf6030a8a44d9811ccfcc8442c08731ee8897f8ddb680bd3c5e22a930bee249fa252ae5e7083f469106c4cdd36932f650d3e8119feb0aeb47b1741da7d9aa97de96efb5eb501eb7f54d78e0fc4f73e4b2f8198eea08b067d30d198c5cf718bfc34e11656706d3554a972c2c9244957b21ed183b86049c066dd57106a3b37d66727c5e776bcec9c5667296e43a6f731d985174e03b6f8c16fefbaf7e2bd9547f8c70afdad81ad201a3733614793a27deae0618f39b3112da5208352286ef61fd73aeecab8905520ad6a3a67cb31f9e23c8d28474eda8b6dc5bb4b803602ba38f3aea02fdd311b1fc8e1fc1ee1ec7c59df4bf52d7e42fc8afb3f8c95de69a25a534c6162088803dd8352407ef816aee68501a9bddf53f528cb125325ee0577a2663573414036407da732a2e01158e6e69b89d599a0bd110ad16650b3bd8c21fd760fbb68ad9fcfc737c61d8b961877572d988a105ef89fe602729c089eeb4d29000ce530242801a967607b68a9f868b11892973c9a718335228926de308e8d0e141d4cdab993b43108016d70efaa2c3b75bd1c15448e4dbb46c6e1901632be2e2157496c7ff042d0459d60fbf6c5ae22ee13c32e310bfa53ab12234b0b0ef54d657f2ce6cf0337764d20af3ebfb378a0aafd1ccccef73f81cd600f0135f191a80ce99a0d71cda3f969794ac9c11edd749520bbedd77c4571ae228821059d4b58d429b9c667a64a3e16d54fa80a78f9fe36fb9274e947bd3a6e9d539327c9da076547b97088ad3529d8f86ebdc25f300d19b82453ad6295baa8679fbd6d534645627eb0bf5e289ea89af9b43fc8374c928d9f41a18daf9ac3779e840dbc0dcb56f68dd922b4ac80a1b2ff4ad034a75e6c01998c631b9c23d56f499b1e64882d08537b30e5bd1e65ec559ec5f404d3adf21b52ae56d97a3268bc2f5347fe7a53aa24e4a86ada4679bd001e44e1550d60f95db2e0381d0af6c001273636bb78419a57cf2a29ae9e314f0d1de4fc7f4466b75c3702e55708c39e5394410969f799efc860d48389ab8385f8e6de52b82d236b2d2427adb47a9f13e924612d775656d63b901e697f74ac5fa8d183dfc4a80b363945b8f37988c3ef6eaa377806f088d13925b65b153e685aa4a8f52ed521ac16848d8f085b140b0ad5147894c07c9823abc9e7f184b8825e9ca47671a9e9ad2581679c3f025ab399d8178f92a96a919feeef015a39818d2e15c80d7c246af44058a04ba876b9d55bc4161528e5bc49c49184eadca95c19cb180239ac675b7ec8822904e192ce294752b642738036c123f1d6bb5bf6a9317a3ec9baf96065d18132aef507536a3c7c3fac26e3dc9226710632f314501ea46e308c8fe02f24296a2cef0bb49b31d363c823ec258afc527ac4a911bc790b49cbafc11520b396331f9cd4761911c756ca4cda76e485665b54c27690a79e075ad4a15a1067f3257944ea0ece5f6569d84771dc2c9edec9f560a5662c77f6b0ff01100dd8f73b7f9133ce45e2754254c025cab3ba2b2076c9b8f02e9b00c60f0d74741fde49a39de13d4457a7bf7dda3a207124d58c0ef532815f4b2e03d54c88ca7f27bf8a1ba368c88b8163fa91f6bbfbbb796b35360e6259981220c445bbd3ae4422d3e78815c9638cc5d8883f3f06c232a7cf96ffbd90d13742e8630a3166b43116f60abadcd95ec33388390b816cb908b2c766f72bbcd80f1bd1b9b3e41bff7b7a8c6b9b3afe380a82a60eb073f403a7db9ae4685c3c7cd56dd4b8d3012e28f29e27f0f928fe7ddd730ffb26bb73f5faf30903ab073057f4354f406f9b8466e891cbcbe1f66fa917b2aeada294d76c0be780dbe034cfd10414387cfda6a8d56556d89be3457151a7b85b8370ba4f52a5610742eec55f6994a2c96c20d5dac90c9906625853e1f6dd17cc4f7b6512f6a8e54d55900a742cdd62c117341a29d2f204f4aa341a2b7bd7083e978c993be764b6afc68aa47491ee41dc8938fa515094b0a83056e214e6d7271a7bd850b6b8c2ccc794541049653d64b75d40b18da366a9197970ace32248d371fabdcdcb4ecbc0b99f754c7cb83dc49dc1ca88af8271163eebc1fb6c15785ab44863894fd00590936217d4ff8fbcf55f4f6aca4f1c15d178023fd714bea5ea4f6776fc4870df4511b827ba5ce04498def6946825a2cfa5fc79797c887306f93ca2ba9c07b4130f85a86e187765ec0ad6febc46f307e88bc7aff0099efcb00fd8d3aec10a7109418c539845c0460ab964c48eba85ff13ba91cae911d4fc3e1abbeb3387a027a3837d9bd8a3a8b46d6dcf5a56d649c440b95d307b094f6e2b9bc236811c619baf2e93d364298ac0d1f37035488baa5bf54daddb362bd832e7d0c72eddf9201c045edbc8a7109b15157227e07ae5d53ad891066b32454d9dcce52435277ad20ed84c25286eb33e326d66e7574746984a768b5ac542de150849a1bf2fb876746afbdc4b64ea34450437991f0a0447378402d9782b87d1488c45957d8e8e719c71b3e57877bfc0b84c019e4d5998edb08997c54fdc8501191023dcd1ea7801113e65871cf3953644978ed8a2e096c68b832e9f6b10d35c5081f892198772b05aaae38360300c2c86745a84c8abd4ccea0d1f2132758c86b39dc90aa49b8ff2b080f22cbe3cc22969d9218d6b2b76b7fe88c97f5f6f82485cc0770c0b61ef2e3245abc1853d754ada53726418cfdd29f1c6f277ba8718d58b22892d76f0ef97de4fbd0c908ca095856ce5a14cf7f4b8c23cb51ac1341c9907682cd1c1a3559ddc7e2015f69665b6621b008e0c685f514dd403cce659328a2f054aac0e63e0733e0cf11641d569b770035a162ae82a09d7191b940c92570f2b2c2b5204f76acb0ffa50ca7ddc3bc14675e10ce2be401c15031add5ef914a2e3012f83890b27643c7c4a4164c518f1c946d4b19e9c63278392449472eeef014bcce243211679d6969113c1f182f5d2ec1d7747e17451b1cc608c5b85a01710eb3c5ea9fc4fa81d4dc94220d96a3fd977083697f148f3a5957026ee9637b95a9c60d26e2015b78e7c01985f17bd8809ae38cb4e0ac7b8e2362ac17371853704379a635b37b780e7aafb188ecb42ccd91b85ebedf205bb7586e20a4ec7899e7591c387919c707f94d065b032a699e7c54d74d5fc2c18799f522d377d5671afb5149db6c2c48d74b0fcfcf2a7a04a82cd5b0108cad156ff9adf234a9ef187f131fa57d41144f8e15a25eb67e76cb3b2e214309e43328fed3ff5d89b5725a011795f135b15421a29221afd4f4005bdac52e5506806dac041bfbea307a506a7a33e0a02f893e14712e7827f6e90096d1324057356015d256da15aa96a9bed89643e5f21a2e4d66fe5ee238055f4c33570df5cecca9c03953d5896d58e91fd6e7b48f99ae50872794a14d3fb0743d23b6e0df22b49854eb6ec43019a91037feb09d88ba6cae4d57d78038d19ae31b37da1cd78922f2c070c847ae4ba1c5b0447d98076d490908981f86bf6891ec88b89a3085eb340e2cd03387e2da9d50fa238d23485b470e15e1b46bbd50dfeccaacbbc8a1896f1cf8291b76687ff74bd2ec9201dffd42e8fbbc0eecdda9c2feb2b922d76aed009211939a1a386eb06391b795cca5a41025ff6882dc9be25fe81fd9b5673946f91577d917b76f61eca35a94837db582ffc767acb438fbcafc9597a705f13315429137c1b50fa009e137b32507c3e5030c56b08b7f06dabbb63e868294abab4303e95a3267c0af14e6da4fde7e863d08c6043a72af969d4e126e3571660349fce5c7394e590cda7289f8a22c14cb9cad47e6a9bc88d82d4256c929665bdf5f5f2feac59272f4474097523e1ca8e8cf9d74c1b7baf19d23436eaf5b534214098ad7c81e98d279dec2d67a4f034e44f79211161088481a47fb608ecbd2a32807d51027ba906fd8ce6a6716051e1dfe4247bf2298713895251907e300feb924ba3ebc22085673675bfe4eae764ca17bf3a267195a188de8209371dacc3034e9a3f203d2e7870277fe6f59344f3ad507b114b2255d4e2527873f8c66a803c0592dc50facdcd6a5612a3074ecad17ba2597b05656e1c5d6586e57875703ef542806eee7407fae5e7f6363702898889a2a9ce1f4570bfdc4886f8309e63529a3acdb448834b13e8dab81cec862d8afa446a3788624dcab7dd134d15c898e735e5423d10e5cb9ff979e82c4eb15a1bfaa41d2798e7c51c4f1552c4ca0e38695299eb79b4634fa0a907b0a7c2c8e854308d1aeb7da5fefb23920b88e36149e05e32d67ac2a66027e4c7934f10b978d7c702be274835d7f9211a8aa684e824edf3af588643a7f9360b9e7e1c7deb7287d97c1920347c4ba27dd33d0ecead667107d266628b093e98d9f6fc3bee46bfd5a537d45eb0119b49cf2c0c7dd5c24e10a0276912030ab4f79c58da67e8b5e523a05a05670ae0a69ebc3830bec2e26a5cfef2412974367ea7be00fc61eba190f98bbf9cd1614e7a9018afa61c24c90024ef0d37096f76c3123b433ea5b26647ab9a6582fdb0bf0e0657789757e635f0adea0d75be60abde692ba1dda16080faf953644573028bee83806715938037297366a5685d563e8aeb884a06a1326efc2051b67a77ea081a6aaa02dc91dea6100eb4652ce947e14ae48bf14924287d840b2d180dbae92d4228a567abb8bba34fde95bcf8b115f49f0f28658e841bb8c9ff7c80a92fc26f13984fedc2a50773a0b6b92a04b69cc665c8da0bbf5a76739dab55574b9783ec11b32a8e76a234cb03ea1835a525513bbaa2374c02a2ff46142fe0944be5043c91d870eeaa7ae628b5d0c5ebfde1292b661dc531e81599ba573464ae2c779b19d80786401a237f8874a43815fecd0e8fc6eac798869baf79bcad756a1e823bb55ba564a3b7376c2ce683b12d31e3e87e7c685c7a1b9ea6a1176c4033888b13deb83bcea2875626e0bfe03be3c323f70a76d46b769d5ca609bfa31610637792d6ee57341f42474f95c1965b1f6ab2fb251c0345522fc9180c311a431eacb54b85bbf2c1af4e5eecb154b9f07f451ea0b4bd4b929d83fa7a05cf4a82a2d49198eb00de148b3a589254221c99680a6d93021fcca00095956defc7d143c415726", 0xff0, 0xfffffffffffffff9}], 0x40000, &(0x7f00000015c0)={[{@abort}, {@usrjquota}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@discard}, {@block_validity}, {@nogrpid}, {@noauto_da_alloc}, {@usrjquota}], [{@measure}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000480), 0x206040, &(0x7f00000016c0)={'trans=unix,', {[{@loose}, {@fscache}, {@version_L}, {@nodevmap}, {@noextend}, {@cachetag={'cachetag', 0x3d, 'ext2\x00'}}, {@cachetag={'cachetag', 0x3d, 'fscontext'}}], [{@fsname}, {@smackfsdef={'smackfsdef', 0x3d, 'max_batch_time'}}, {@audit}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}}) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000000c0)=""/85, 0x55}], 0x2, 0x5267, 0x2) mount(&(0x7f0000001ac0)=@nullb, &(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)='iso9660\x00', 0x2040b, &(0x7f0000001b80)='@%*)\a\x94!\x00') ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f0000000300)) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 02:25:42 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x20000000) 02:25:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x4}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3067.285676] ieee802154 phy0 wpan0: encryption failed: -22 [ 3067.298184] ieee802154 phy0 wpan0: encryption failed: -22 [ 3067.376415] ieee802154 phy0 wpan0: encryption failed: -22 02:25:42 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x21000000) 02:25:42 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x5}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:25:42 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="4ba64b1bf761b2387a801202b2e15850234fa67a052ebefac75e454f159b862ab3f84e680b2b15421e6ac74110978e997c415c3f2ced9693fba6c24c6272ecd1a0f619a4c8ffe5e5549293c1263751", 0x4f, 0x2}, {&(0x7f00000001c0)="efe2691f22ecd97f39dc0d5c550e24e8a2a78ed8d95dfb81105ee8780fc742de144ab16a405bbeb4ade636e58dd17e76dffda0cf634de17dd1c95ffadb5b6b72a9a10b1337ce5a5917f55a6a1c53a8ef3b79a3ae98dbe0eaaf9e70fdba43f9668207584e2442387b8251357c950af5317a830e8589a9621167792c729d2dc47bf6c0bf61557fe95942586edd64ad489648b0b338a7168f307839ac5a49", 0x9d, 0x5}], 0x4020, &(0x7f0000000380)=ANY=[@ANYBLOB='defcontext=sysadsysadm_u,smackfsroot=-.(%).%-,uid<\x00'/66, @ANYRESDEC=r1, @ANYBLOB=',subj_type=\x00,obj_role=\x00,smackfsfloor=)\\,\x00']) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x4) 02:25:42 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x51030000) 02:25:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xf401, 0x4) [ 3067.465933] ieee802154 phy0 wpan0: encryption failed: -22 02:25:43 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3067.541974] blktrace: Concurrent blktraces are not allowed on loop12 [ 3067.582005] ieee802154 phy0 wpan0: encryption failed: -22 [ 3067.680976] ieee802154 phy0 wpan0: encryption failed: -22 [ 3083.191698] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:26:07 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7a, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:07 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x6}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3092.165919] ieee802154 phy0 wpan0: encryption failed: -22 [ 3092.195198] ieee802154 phy0 wpan0: encryption failed: -22 02:26:07 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x68, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xff0f, 0x4) 02:26:07 executing program 3: mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x4, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x4400, 0x10) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:26:07 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x6a000000) 02:26:07 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x20000000) 02:26:07 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xff600000) [ 3092.209125] blktrace: Concurrent blktraces are not allowed on loop12 [ 3092.245273] ieee802154 phy0 wpan0: encryption failed: -22 02:26:07 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x2000000000) 02:26:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_io_uring_setup(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280), &(0x7f0000000540)) io_uring_enter(r1, 0x5c33, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000280)=0x2) r2 = accept(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x80) sendmmsg$inet6(r2, &(0x7f0000000b00)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x60000, @local, 0x80000000}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000001c0)="1a5e1d73a53995fc5cd5b85181b0d2468320658ec44806619f7791122dab2b69777089366e2529fa9558a86e2bece317c875fb70646081e06ac34820132afc1bcadbd97756d776c4641ee25c85b9382b88924fb980ce88b358877f7e0b1c10a9f34ecdde6e84c48236bd6452bb9ca95a440e21c594f301f515ad048b7cfafd44a933106fb6bfc288bc9ce934dcce8ae831b062df879f340ee7b516389e729ef67228b4bbf3e518", 0xa7}], 0x1}}, {{&(0x7f00000003c0)={0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c, &(0x7f0000000a40)=[{&(0x7f0000000400)="810fe76e86fdce866968affba41cce7524832ca7b77f436d3e3272beca82f97649f5af6f0c29822319f59de5e9c51408d439e4e429feddc96e4ca77a0818ae5edcd5cde5a7b2609f4ce759a36d93fc76467f80225bf928f216bf124e6bdceb1ce0d05981247f81dee1eca6b0eecbb7", 0x6f}, {&(0x7f0000000580)="ac8fab0c0751b4f568e1c1b5a0d9025ec9400968ab1016e5439e131e278a775f3f934f5994d883652816aec1b791dabe4410a27c5e74bef99ba3ac487a140fd74c92045399b6ff3a0ea541ad27e07659703522facf102a30d8d05b1294f68d01a4f7d5a50bb9854e6d46be2025ac696ee74e7559927286b1ddf693035b7cbf031cf7537554f8856db9e7f7398e6bfbab6ca9b15d84ac4cb73c5919c6499d8250b8e9cea0fe80bb0d1bfe2aa95d194a733a933665e45550372feddf104454daf0d88bd63fa0f5a7ef5ee998494f6225e14c98a37f1f940c032245f3bedbb4f120e743ecae0469340507af178c4a1f65d71562738ab0dcfc54", 0xf8}, {&(0x7f0000000480)="d8ec1a58689f5e2614a463a39adf69914e05faf1f97a99272d821652cb5bf9c4cc996a302c8cf53802d876b831446012b857bc86d435f8e4d009671e06868ea4720abef27936d622d02889dd366924d91b6ea40ea430f4012f3f7ccec7af0915a50da8c1e11cb8553624cc2cf40bb147b2ea0bbaf12087535a5e43e50ee1bcff3feeae60c2f566cc8176a31b7a00abd4028820fff5c081490e12fe53c97cdaac8c2c8f", 0xa3}, {&(0x7f0000000680)="71352e5781f0f6ea4dc8cf850c263eeda21dab6e8968ecbd7dddb2489228312851ccd5d8834cc25fe3a8d2f65d0318fe4f616393015a7b36f4e0349744c81a6cbe47a4e7b65795ef9faab62e5dc3d88e6d40bb356dd2e301ab", 0x59}, {&(0x7f0000000700)="6ea2", 0x2}, {&(0x7f0000000740)="e2b7f7ef0e6e1392b39c4f351007d7ac87a938bd594180c92ea556da33d5dea39705f7f162fa456411732b7540fd1234a899a1245e12d4b1f30e2e9e3c06f690f20dc320263155f16a908fea8e4cfa5a56a4ae097584e657f09051779dbb34dc010880f47137a970beb67f10078a21262101473bb16f931ed06f3c616afa856fe0e833e2a90e24907eb7d1c96ca4d298e32af5349db61dacf44f1697f74b88c5d5e2c51138626fbe88d46da3e9d1467c6b053f81b2c9c746605dc5120dca36c2482865f4d7d6337b9e025eb200", 0xcd}, {&(0x7f0000000840)="aa5e475f3529b9f2e7044fb560201051c4b55c186f13622d2e6ea093f035c41e1ccb50346d94ef0866f354b0ad7cc15d0e3f3bf07aeee12b542aff4ce2dd25b532c60c48263e5bf3a2f8f12a26e893aeeb279fdfadb72a18137e087cbc806e8122b79a03f4853f3922ec271c952741ffe2ac02d52965c2eb3e3e2e94755169691aa2e9bf74ed62f8ca56aae7522eaa216ffa0852a455ed78a5f58b437017", 0x9e}, {&(0x7f0000000900)="831ed3bfcd306e3d57", 0x9}, {&(0x7f0000000940)="947f5a28f977ff6df5cfa5d7282bc236a0f26940ea4f52e82f9cc9028875c442a27bf5680bb4d36b06dbf6c862f3253b284089f4155f94d8e86b856396", 0x3d}, {&(0x7f0000000980)="06899cb290d16b76be7a0ff94a6880042e528a1da76c4a03b99332bb8db0be75f5764d1f200263d935d48ef56f244eab20a15a60d6b3b0e2ebee0fb95bfe00a44aa6f94c734d412b58e1b8d7ebff7aee9a1fdf087dc8a4dd386cbfdd9dbc277e0b2ef18a0b4a580b862204c69855f4432437f5127e29f95ae3ac0a4dabc3d196283eb5260a", 0x85}], 0xa}}], 0x2, 0xc000) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000340)={0x89, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40001, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) [ 3092.287811] ieee802154 phy0 wpan0: encryption failed: -22 02:26:07 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x7}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:26:07 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0x0, 0x0, 0x8, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:26:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1000000, 0x4) 02:26:07 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x9a030000) 02:26:07 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3092.450698] blktrace: Concurrent blktraces are not allowed on loop12 [ 3092.458249] ieee802154 phy0 wpan0: encryption failed: -22 02:26:08 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6c, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:08 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x2100000000) 02:26:08 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x8}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3092.534998] ieee802154 phy0 wpan0: encryption failed: -22 [ 3092.542776] ieee802154 phy0 wpan0: encryption failed: -22 [ 3092.622649] ieee802154 phy0 wpan0: encryption failed: -22 [ 3108.546494] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:26:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xa0020000) 02:26:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='-\\)^@\x00', 0x0, r1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:26:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x74, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0xe}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:26:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x60ffffffffff) [ 3117.758403] ieee802154 phy0 wpan0: encryption failed: -22 [ 3117.774063] blktrace: Concurrent blktraces are not allowed on loop12 02:26:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x500, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x2000000, 0x4) 02:26:33 executing program 5: r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000140)='[\x00', &(0x7f0000000180)='./file0\x00', r0) ftruncate(0xffffffffffffffff, 0x0) ftruncate(r0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x410101, 0x4) r1 = getpgrp(0xffffffffffffffff) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x7, 0x80, 0x8, 0x9, 0x0, 0x0, 0x4502, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffe00000, 0x0, @perf_config_ext={0x24be}, 0x11220, 0x0, 0x5, 0x2, 0x80000000, 0x8, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, r1, 0x5, r2, 0x3) stat(0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 3117.804905] ieee802154 phy0 wpan0: encryption failed: -22 [ 3117.844678] ieee802154 phy0 wpan0: encryption failed: -22 02:26:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x11}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3117.852166] ieee802154 phy0 wpan0: encryption failed: -22 02:26:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x3000000, 0x4) 02:26:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xa5020000) 02:26:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x7f68ad9ce000) [ 3117.929771] blktrace: Concurrent blktraces are not allowed on loop12 02:26:33 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='l'], 0xec, 0x0) msgsnd(r0, &(0x7f00000006c0)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000700)={0x0, ""/4096}, 0x1008, 0xde9a3e1aad67db98, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x2}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=""/95, &(0x7f0000000080)=0x5f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x20040000) 02:26:33 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x600, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x7a, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:33 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r3, &(0x7f0000000100), &(0x7f0000000180)=0xc) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {r3}}, './file1\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r5, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="01de03000000000000001900", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB='./file1\x00']) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 02:26:33 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x44}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3118.016688] blktrace: Concurrent blktraces are not allowed on loop6 [ 3118.017482] ieee802154 phy0 wpan0: encryption failed: -22 02:26:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x7f68adbce000) [ 3118.027033] ieee802154 phy0 wpan0: encryption failed: -22 [ 3118.043625] blktrace: Concurrent blktraces are not allowed on loop6 02:26:33 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xd0030000) [ 3118.063201] ieee802154 phy0 wpan0: encryption failed: -22 [ 3118.105549] ieee802154 phy0 wpan0: encryption failed: -22 [ 3133.980893] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:26:59 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xe4000000) 02:26:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xa0020000) 02:26:59 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:26:59 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x70) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:26:59 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x700, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:00 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x48}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:27:00 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x7f68afd4e000) 02:27:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x8000000, 0x4) [ 3144.469904] ieee802154 phy0 wpan0: encryption failed: -22 [ 3144.487331] blktrace: Concurrent blktraces are not allowed on loop6 [ 3144.502750] ieee802154 phy0 wpan0: encryption failed: -22 [ 3144.543741] ieee802154 phy0 wpan0: encryption failed: -22 [ 3144.564210] ieee802154 phy0 wpan0: encryption failed: -22 [ 3152.787422] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 3160.619390] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:27:26 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x500, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:26 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x7ffffffff000) 02:27:26 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:26 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x24ed, &(0x7f0000000100)={0x0, 0x2384, 0x4, 0x2, 0x123, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)) syz_io_uring_complete(r1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:27:26 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x4c}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3170.954889] ieee802154 phy0 wpan0: encryption failed: -22 02:27:26 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf1030000) 02:27:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xa000000, 0x4) 02:27:26 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x1c, 0x3f, 0x400, 0x70bd26, 0x25dfdbfe, {0x17}, [@typed={0x8, 0x94, 0x0, 0x0, @u32=0x6}]}, 0x1c}}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000000}, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) r4 = syz_genetlink_get_family_id$batadv(0x0, r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) sendmsg$NL80211_CMD_REGISTER_FRAME(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xd8, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x49d}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}, @NL80211_ATTR_FRAME_MATCH={0x52, 0x5b, "f45c0d0058481325f107eb038ce45fc692719b3d4268c7f448072e8a164850e194660ee624f234a4f9598cc4e34a30bc36ea5289c3ea7a4cede201e00a9c5a532ba227016d16e582951c7bf467a2"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xa75}, @NL80211_ATTR_FRAME_MATCH={0x30, 0x5b, "3aa280e7133a175a6f43511e32e6e01b50ac715eb5f3a9eb2947d34add47bc64249396303b1906e8a99e33f3"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1c00}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x3}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20000804}, 0x20008090) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340), 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x2c, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x4824) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x202, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r6, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xd4, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xd}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x401}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xbca}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xb124}]}]}]}, 0xd4}}, 0x40004) syz_io_uring_complete(0x0) dup3(r0, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) [ 3171.001709] blktrace: Concurrent blktraces are not allowed on loop6 [ 3171.029749] ieee802154 phy0 wpan0: encryption failed: -22 [ 3171.040146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11248 comm=syz-executor.5 02:27:26 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x60}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:27:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xe000000, 0x4) [ 3171.085131] ieee802154 phy0 wpan0: encryption failed: -22 [ 3171.096134] ieee802154 phy0 wpan0: encryption failed: -22 02:27:26 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xe09cad687f0000) 02:27:26 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf9010000) [ 3171.140015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11248 comm=syz-executor.5 02:27:26 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x800, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:27:26 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x68}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:27:26 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x600, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:26 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3171.244496] ieee802154 phy0 wpan0: encryption failed: -22 02:27:26 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3171.251326] blktrace: Concurrent blktraces are not allowed on loop12 02:27:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x28000000, 0x4) 02:27:26 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x6c}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 3171.297995] ieee802154 phy0 wpan0: encryption failed: -22 [ 3171.302350] ieee802154 phy0 wpan0: encryption failed: -22 [ 3171.303729] ieee802154 phy0 wpan0: encryption failed: -22 02:27:26 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xe0bcad687f0000) [ 3171.332028] ieee802154 phy0 wpan0: encryption failed: -22 02:27:26 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x804, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0x8, 0x0, 0x100000000, r1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) dup(r0) [ 3186.412778] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 3204.370340] blktrace: Concurrent blktraces are not allowed on loop6 02:27:59 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xf9030000) 02:27:59 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x700, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:59 executing program 5: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x400c010) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400c800}, 0x20004844) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_PHY(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000805) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44}, 0x8040) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000940), 0x540, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x74, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x36}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x8}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r6, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r3, 0x800, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x9}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8084) sendmsg$NL80211_CMD_RADAR_DETECT(r5, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x2, 0x2a}}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x14}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}]}, 0x48}, 0x1, 0x0, 0x0, 0x404c800}, 0x84) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000d00), 0x2000, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f0000000e00)={'syztnl2\x00', &(0x7f0000000d80)={'ip6tnl0\x00', 0x0, 0x4, 0x20, 0x20, 0xffffe1f7, 0x20, @loopback, @empty, 0x80, 0x8000, 0x10000, 0x10000}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r5, 0x89f9, &(0x7f0000000ec0)={'syztnl1\x00', &(0x7f0000000e40)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x2, 0x1f, 0x6c, @local, @local, 0x7, 0x8, 0xff, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000f80)={'syztnl2\x00', &(0x7f0000000f00)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x1, 0x800, 0x20, @private2, @private2, 0x10, 0x20, 0x7, 0x4}}) sendmsg$TEAM_CMD_NOOP(r7, &(0x7f0000001700)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000016c0)={&(0x7f00000011c0)={0x4f0, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [{{0x8}, {0x17c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x1bc, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x80, 0x1, 0xb6, 0x5}, {0xffe0, 0xa9, 0x2a, 0x7fff}]}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xfff, 0xfb}, {0x4, 0x0, 0x6, 0x1f}, {0x5, 0x99, 0x8}, {0x0, 0x4, 0xff, 0xffff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x4f0}}, 0x10) 02:27:59 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000180)=""/248, 0xf8}, {&(0x7f0000000280)=""/142, 0x8e}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000440)=""/24, 0x18}, {&(0x7f0000000480)=""/44, 0x2c}, {&(0x7f00000004c0)=""/38, 0x26}], 0x7) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000009c0)=0x1, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000000000000000080000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000078f6c82600000000020000000000000001010000000000000600000000000000020000000000000003000000000000000000000000000000000000000000000003000000fbffffff00000000000000000200000000000000001000000000000006000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800000000000000000000e56d293c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e07826df031a6ddebe1cde010cdde1c929f4388c89c02ca2e2a8ef9ea3e355c027aa8949b1a0bb5306c98b290f420c24e40425d2429ad4d5b97a3e395f93eb8154e5bd7cb79000000000000000000000000000000004b1dad7d76615f02ca6fd45714862880e19f3b483be88c869e4c4d58a1d176fc459a72f989052daab0dd6e4c70421da9099ff5024a7feb27b526d6850914f1a687f8d330447c0d592db22d4d26dcbd79a84e03c9c59bcba03566f6b7d5a59c3cc4f73a44e30121c69367", @ANYRES32=r0]) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) sendto$inet(r0, &(0x7f00000005c0)="b45501a9006a822633249f84aba3c11346dc4e89fb6ad92788e4fa45b5d028573f6e02e83aad6f76511593b19dc0b890057c20ac3f7c9a32e58b43b1f4fefa840f34362834d2892438865a4b5f149afca294ecde0b8dcc909dabba279440285aa564c66adb5f174bec29addfec61dfe8d479708110d0cdc1dc8ab8e1e0daf0d20cdd4e244756f39d0a80687c3cc86d1286e91ef8784212ff7e90ab1b124460eea125a3837b18f5589040774de2e11880c42337b7d06c", 0xb6, 0x4801, &(0x7f00000006c0)={0x2, 0x4e24, @loopback}, 0x10) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000580)) 02:27:59 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:27:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x40020000, 0x4) 02:27:59 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x74}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:27:59 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xe0d4af687f0000) [ 3204.386688] blktrace: Concurrent blktraces are not allowed on loop12 [ 3204.401461] ieee802154 phy0 wpan0: encryption failed: -22 [ 3204.405135] ieee802154 phy0 wpan0: encryption failed: -22 [ 3204.453713] ieee802154 phy0 wpan0: encryption failed: -22 02:28:00 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xf0ff1f00000000) 02:28:00 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x7a}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:28:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xe8030000, 0x4) [ 3204.553908] ieee802154 phy0 wpan0: encryption failed: -22 02:28:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000180)) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) 02:28:00 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:28:00 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:28:00 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff) 02:28:00 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xf0ffffff7f0000) [ 3204.655489] ieee802154 phy0 wpan0: encryption failed: -22 [ 3204.706417] ieee802154 phy0 wpan0: encryption failed: -22 [ 3220.013787] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:28:25 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xf4010000, 0x4) 02:28:25 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x300}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:28:25 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffffdfd) 02:28:25 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4400, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:28:25 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000240)={0x9be6, 0x81, 0x6, 0x101, 0x0, 0x401}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x20801) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'veth0_virt_wifi\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'veth0_vlan\x00'}) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5e, 0x143bacac12b5353, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 02:28:25 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0xffffffffff600000) 02:28:25 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)={{0x10b, 0xff, 0x80, 0x3b4, 0x239, 0x5d91db2b, 0x1f, 0x4}, "ceae69649f8a535e55878de92627a2859cc04875c8169f1cf582"}, 0x3a) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:28:25 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xe00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3229.509847] ieee802154 phy0 wpan0: encryption failed: -22 [ 3229.522859] ieee802154 phy0 wpan0: encryption failed: -22 [ 3229.585343] ieee802154 phy0 wpan0: encryption failed: -22 02:28:25 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x500}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:28:25 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xff0f0000, 0x4) [ 3229.623503] ieee802154 phy0 wpan0: encryption failed: -22 02:28:25 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x400000000) 02:28:25 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/59, 0x3b) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000440)=""/232, 0xe8}, {&(0x7f0000000540)=""/130, 0x82}], 0x3, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000006c0), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000740)=""/231, 0xe7}, {&(0x7f00000003c0)=""/43, 0x2b}, {&(0x7f0000000840)=""/200, 0xc8}, {&(0x7f0000000940)=""/23, 0x17}], 0x4, &(0x7f00000009c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x148}}, {{&(0x7f0000000b40), 0x6e, &(0x7f0000002040)=[{&(0x7f0000000bc0)=""/202, 0xca}, {&(0x7f0000000cc0)=""/29, 0x1d}, {&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000001d00)=""/222, 0xde}, {&(0x7f0000001e00)=""/159, 0x9f}, {&(0x7f0000001ec0)=""/251, 0xfb}, {&(0x7f00000054c0)=""/102, 0x66}], 0x7, &(0x7f00000020c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000002140), 0x6e, &(0x7f00000032c0)=[{&(0x7f00000021c0)=""/44, 0x2c}, {&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/9, 0x9}, {&(0x7f0000003240)=""/54, 0x36}, {&(0x7f0000003280)=""/35, 0x23}], 0x5, &(0x7f0000003340)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f00000033c0)=@abs, 0x6e, &(0x7f0000003480)=[{&(0x7f0000003440)=""/13, 0xd}], 0x1, &(0x7f00000034c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000003580)=@abs, 0x6e, &(0x7f0000004900)=[{&(0x7f0000003600)=""/188, 0xbc}, {&(0x7f00000036c0)=""/33, 0x21}, {&(0x7f0000003700)=""/4096, 0x1000}, {&(0x7f0000004700)=""/213, 0xd5}, {&(0x7f0000004800)=""/230, 0xe6}], 0x5}}, {{&(0x7f0000004980)=@abs, 0x6e, &(0x7f0000004b40)=[{&(0x7f0000004a00)=""/100, 0x64}, {&(0x7f0000004a80)=""/35, 0x23}, {&(0x7f0000004ac0)=""/114, 0x72}], 0x3, &(0x7f0000004b80)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004bc0)=""/188, 0xbc}, {&(0x7f0000004c80)=""/137, 0x89}, {&(0x7f0000004d40)=""/103, 0x67}, {&(0x7f0000004dc0)=""/121, 0x79}, {&(0x7f0000004e40)=""/22, 0x16}], 0x5, &(0x7f0000004f00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}], 0x8, 0x0, &(0x7f0000005240)={0x77359400}) sendmsg$unix(r0, &(0x7f0000005480)={&(0x7f0000005280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005440)=[{&(0x7f0000005300)="8d504af82f444035ac08fba3406e98b4576c449fdca1176c22ad4a39180843a70fd4e62e3c5b0d7f0ea19c5444823e278c6a06dd73ecfbab9876bb70ae84219da970c71bb225c4e6befa4f6ba7ce930ad0ba848720ef1d232c11c2fe7c97c60aa3e5d4cfde2a", 0x66}, {&(0x7f0000005380)="23342db20b54a11d1e26b501bce417cee73adb0210cd3841d5e0289038a1fe6843965d6c15ad7f87a51fb65648500de8b27e5394e1a838b5a5b38a6cd09e5476d37041fe9457e5486793abbe013ff1647e2ac42d4276b9873f9d0c380758f8013a652a9812be7ae3e3ec0b9b6fbac45b4fe8be13be0804b911d344a4bba1537b683a62b9aee48045f757af25b3da9bcf61532c6cc19eede05c9f3f17941d90454cea6a85b965a84daf30d2", 0xab}], 0x2, 0x0, 0x0, 0x40}, 0x40080) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 02:28:25 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x4, 0x6c, 0x81, 0x8001, 0x1, 0x21, 0x80, 0x141, 0x40, 0x3c1, 0x7, 0x3, 0x38, 0x1, 0x2, 0x101, 0x6}, [{0x2, 0x2f77, 0x7f, 0x0, 0x6cfdf1d9, 0x11, 0x0, 0x6}, {0x7, 0x5, 0x3be, 0xb63, 0x10000, 0x5, 0x5, 0xc1}], "79c84ddcc8e99f89bb1108f65fb0341ad2f3611bda78a7056fc6110f10d323d812c0acab63a4d3d10d95169d33116f3e1907d20928fc459662695f3d528922245ad0c5a7c0cec03f2c8a1536a1416a678d1428bf18e6ea74756c40953f051f8586d7ae2d105c8c1286bf64c91a3ddbbb260f220523bdf33639e9c8940b4bc2d8d0983b8c485cc11f0f69ee3d8ec0087988768b3834869aedce36f3f89b4657ff91b0b9c72bfb87a61304eadc67636caf312c30fc7e2d4d47c348f938dff118a769b490e577fca445582683afcf19e957ab1da70f91c73448546409c8e06217b75de8351a2af1a0a419270b508fc7e5f2"}, 0x1a0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) 02:28:25 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) preadv2(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/148, 0x94}, {0x0}, {&(0x7f00000001c0)=""/75, 0x4b}, {0x0}, {&(0x7f0000000140)=""/35, 0x23}], 0x5, 0x0, 0x8000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000440)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000240)=""/219, 0xdb}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r2, 0x9e46, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) ioctl$TIOCCBRK(r1, 0x5428) epoll_create(0x8) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000540)=0x1) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000180)={r3, r4+60000000}, 0x1, 0x1, 0x1, {0x0, r5}}, 0x40) 02:28:25 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4800, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3229.748413] ieee802154 phy0 wpan0: encryption failed: -22 [ 3229.794365] ieee802154 phy0 wpan0: encryption failed: -22 [ 3245.138610] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:28:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000380)='\"', 0x1, 0xf000}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00ab71ac0df597172042425b9c8d58c0b8fbc45c1cbddf5d106678bf55bd219218c5c657f095ba56b627524bad682c228893863d6e3fc80f9abc21c6a6a1cb84e077ddc10ef3aec4e1f1d750a6a8465d"]) 02:28:49 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x4c00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:28:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x3) 02:28:49 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000) 02:28:49 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:28:49 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x600}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:28:49 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 02:28:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000003c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) recvmmsg(r0, &(0x7f0000001fc0)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000100)=""/111, 0x73}, {&(0x7f0000000180)=""/37, 0x25}], 0x3, &(0x7f0000000200)=""/127, 0x7f}, 0xfffffff8}, {{&(0x7f0000000280)=@ax25={{}, [@null, @default, @rose, @netrom, @rose, @bcast, @rose]}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/35, 0x23}, 0xffffffff}, {{&(0x7f0000002180)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/163}, {&(0x7f0000000f40)=""/170}, {&(0x7f0000001000)=""/117}, {&(0x7f0000001080)=""/198}, {&(0x7f0000001180)=""/232}, {&(0x7f00000000c0)=""/2}], 0x0, &(0x7f00000004c0)=""/209, 0xd1}, 0x6}, {{&(0x7f0000002200)=@nl=@unspec, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)=""/212, 0xd4}, {&(0x7f0000000740)=""/25, 0x19}, {&(0x7f0000000780)=""/41, 0x29}, {&(0x7f00000007c0)=""/47, 0x2f}], 0x4, &(0x7f0000000840)=""/228, 0xe4}, 0x80000401}, {{&(0x7f0000000940)=@alg, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/26, 0x1a}, {&(0x7f0000000a00)=""/97, 0xffffffffffffff1f}, {&(0x7f0000000a80)=""/145, 0x91}], 0x3, &(0x7f0000000b80)=""/112, 0x70}, 0x81}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000c00)=""/85, 0x55}, {&(0x7f0000000c80)=""/147, 0x93}, {&(0x7f0000000d40)=""/150, 0x96}, {&(0x7f0000000e00)=""/82, 0x52}, {&(0x7f0000002280)=""/4098, 0xff5}, {&(0x7f0000001e80)=""/9, 0x9}], 0x6, &(0x7f00000005c0)=""/95, 0xfffffffffffffe26}, 0xba9}], 0x6, 0x40000100, &(0x7f0000002140)) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x9, 0x4) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x11) ioctl$BLKTRACETEARDOWN(r2, 0x1277, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) shutdown(0xffffffffffffffff, 0x1) [ 3254.457092] blktrace: Concurrent blktraces are not allowed on loop12 [ 3254.473419] ieee802154 phy0 wpan0: encryption failed: -22 [ 3254.479381] ieee802154 phy0 wpan0: encryption failed: -22 02:28:50 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x2, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40014}, 0xc010) dup2(r1, r0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x1031, &(0x7f0000001240)=""/4108}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000002c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x6, 0x3, 0x4, "8f85234ae88cee92880bbe7488d4881980f070b158c8f6767137fa007b0fdfad8e79cc1669cb0c1c59d8c2d47d7df126d137fc9312375aca7b212321ed6ef6"}}, 0x5) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x0) [ 3254.538058] ieee802154 phy0 wpan0: encryption failed: -22 02:28:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x20000044) 02:28:50 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1, 0x0, 0x700}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) 02:28:50 executing program 2: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000240)=""/143, &(0x7f0000000100)=0x8f) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) fallocate(r1, 0x2, 0xe5, 0x7fff) [ 3254.580030] ieee802154 phy0 wpan0: encryption failed: -22 02:28:50 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x2000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 02:28:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x28, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa38555f3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @private=0xa010101}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:28:50 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x6000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3254.773230] ieee802154 phy0 wpan0: encryption failed: -22 [ 3254.781263] ieee802154 phy0 wpan0: encryption failed: -22 [ 3254.804740] ieee802154 phy0 wpan0: encryption failed: -22 [ 3254.838177] ieee802154 phy0 wpan0: encryption failed: -22 [ 3258.707836] syz-executor.3: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 3258.711853] CPU: 0 PID: 11426 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 3258.713517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3258.713532] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3258.715059] Call Trace: [ 3258.715107] dump_stack+0x107/0x167 [ 3258.715129] warn_alloc.cold+0x95/0x18a [ 3258.715156] ? zone_watermark_ok_safe+0x260/0x260 [ 3258.715173] ? queue_oom_reaper+0x86/0x1e0 [ 3258.718870] ? wait_for_completion+0x270/0x270 [ 3258.719483] __alloc_pages_slowpath.constprop.0+0x1cc3/0x2220 [ 3258.720214] ? lock_acquire+0x187/0x490 [ 3258.720832] ? warn_alloc+0x190/0x190 [ 3258.721330] __alloc_pages_nodemask+0x553/0x680 [ 3258.721926] ? mark_held_locks+0x9e/0xe0 [ 3258.722426] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3258.723231] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3258.723905] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3258.724960] alloc_pages_current+0x187/0x280 [ 3258.725892] relay_open_buf.part.0+0x2a5/0xc00 [ 3258.726796] relay_open+0x531/0xa10 [ 3258.727238] do_blk_trace_setup+0x4db/0xbf0 [ 3258.727751] ? _copy_from_user+0xfb/0x1b0 [ 3258.728242] __blk_trace_setup+0xca/0x180 [ 3258.728740] ? do_blk_trace_setup+0xbf0/0xbf0 [ 3258.729267] ? perf_trace_lock+0xac/0x490 [ 3258.729781] blk_trace_ioctl+0x155/0x290 [ 3258.730261] ? blk_add_trace_bio_remap+0x560/0x560 [ 3258.730881] ? do_vfs_ioctl+0x283/0x10d0 [ 3258.731365] ? selinux_inode_getsecctx+0x90/0x90 [ 3258.731926] ? generic_block_fiemap+0x60/0x60 [ 3258.732471] ? do_sys_openat2+0xa1/0x420 [ 3258.732998] blkdev_ioctl+0xc1/0x710 [ 3258.733465] ? blkdev_common_ioctl+0x1870/0x1870 [ 3258.734041] ? selinux_file_ioctl+0xb1/0x260 [ 3258.734571] block_ioctl+0xf9/0x140 [ 3258.735046] ? blkdev_read_iter+0x1c0/0x1c0 [ 3258.735559] __x64_sys_ioctl+0x19a/0x210 [ 3258.736049] do_syscall_64+0x33/0x40 [ 3258.736494] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3258.737101] RIP: 0033:0x7f4c369d6b19 [ 3258.737552] Code: Unable to access opcode bytes at RIP 0x7f4c369d6aef. [ 3258.738315] RSP: 002b:00007f4c33f4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3258.739339] RAX: ffffffffffffffda RBX: 00007f4c36ae9f60 RCX: 00007f4c369d6b19 [ 3258.740369] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 3258.741355] RBP: 00007f4c36a30f6d R08: 0000000000000000 R09: 0000000000000000 [ 3258.742397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3258.743467] R13: 00007ffc907aa10f R14: 00007f4c33f4c300 R15: 0000000000022000 [ 3258.744523] CPU: 1 PID: 262 Comm: syz-fuzzer Not tainted 5.10.161 #1 [ 3258.744634] hpet: Lost 1 RTC interrupts [ 3258.745442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3258.747220] Call Trace: [ 3258.747621] dump_stack+0x107/0x167 [ 3258.748073] Mem-Info: [ 3258.748160] dump_header+0x106/0x613 [ 3258.748511] active_anon:10397 inactive_anon:50590 isolated_anon:0 [ 3258.748511] active_file:3 inactive_file:11 isolated_file:0 [ 3258.748511] unevictable:0 dirty:0 writeback:0 [ 3258.748511] slab_reclaimable:8582 slab_unreclaimable:64907 [ 3258.748511] mapped:69647 shmem:123 pagetables:3746 bounce:0 [ 3258.748511] free:2435 free_pcp:61 free_cma:0 [ 3258.748992] oom_kill_process.cold+0x10/0x15 [ 3258.749012] out_of_memory+0x110f/0x1410 [ 3258.749038] ? oom_killer_disable+0x280/0x280 [ 3258.749060] ? mutex_trylock+0x237/0x2b0 [ 3258.749077] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 3258.749102] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 3258.749140] ? lock_acquire+0x187/0x490 [ 3258.749166] ? warn_alloc+0x190/0x190 [ 3258.749213] __alloc_pages_nodemask+0x553/0x680 [ 3258.753739] Node 0 active_anon:41588kB inactive_anon:202360kB active_file:12kB inactive_file:44kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278588kB dirty:0kB writeback:0kB shmem:492kB writeback_tmp:0kB kernel_stack:7712kB all_unreclaimable? yes [ 3258.754197] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3258.754767] Node 0 [ 3258.755337] ? xas_load+0x66/0x2c0 [ 3258.755358] ? find_get_entry+0x2d9/0x6e0 [ 3258.755977] DMA free:6496kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3258.756732] alloc_pages_current+0x187/0x280 [ 3258.756752] __page_cache_alloc+0x2d2/0x360 [ 3258.757549] lowmem_reserve[]: [ 3258.758080] pagecache_get_page+0x2c7/0xc80 [ 3258.758103] filemap_fault+0x177d/0x21b0 [ 3258.758651] 0 [ 3258.759289] ? read_cache_page_gfp+0x30/0x30 [ 3258.762399] 1618 [ 3258.763164] ? replace_page_cache_page+0x1200/0x1200 [ 3258.763180] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 3258.763444] 1618 [ 3258.763874] ext4_filemap_fault+0x87/0xc0 [ 3258.763890] __do_fault+0x113/0x410 [ 3258.764376] 1618 [ 3258.767398] handle_mm_fault+0x1e72/0x3520 [ 3258.767420] ? find_held_lock+0x2c/0x110 [ 3258.767436] ? __pmd_alloc+0x5e0/0x5e0 [ 3258.767459] ? vmacache_find+0x55/0x2a0 [ 3258.767484] do_user_addr_fault+0x56e/0xc00 [ 3258.767511] exc_page_fault+0xa2/0x1a0 [ 3258.767526] ? asm_exc_page_fault+0x8/0x30 [ 3258.767544] asm_exc_page_fault+0x1e/0x30 [ 3258.768082] [ 3258.768578] RIP: 0033:0x40aaf0 [ 3258.768962] Node 0 [ 3258.769453] Code: Unable to access opcode bytes at RIP 0x40aac6. [ 3258.769968] DMA32 free:3244kB min:7168kB low:8824kB high:10480kB reserved_highatomic:0KB active_anon:41588kB inactive_anon:202360kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:14984kB bounce:0kB free_pcp:244kB local_pcp:244kB free_cma:0kB [ 3258.770145] RSP: 002b:000000c00003fed8 EFLAGS: 00010202 [ 3258.770769] lowmem_reserve[]: [ 3258.771002] RAX: 0000000001f4ba98 RBX: 000000c000030000 RCX: 000000c000000480 [ 3258.771013] RDX: 000000003a4da891 RSI: 000000c00003ff10 RDI: 0000000000000001 [ 3258.771634] 0 [ 3258.772305] RBP: 000000c00003ff28 R08: 0000000000000cb8 R09: 00007ffe5b967080 [ 3258.772316] R10: 00007ffe5b967090 R11: 00000000005c3714 R12: 0000000000438880 [ 3258.772611] 0 [ 3258.773135] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 3258.773201] Mem-Info: [ 3258.773658] 0 [ 3258.773929] active_anon:10397 inactive_anon:50590 isolated_anon:0 [ 3258.773929] active_file:3 inactive_file:11 isolated_file:0 [ 3258.773929] unevictable:0 dirty:0 writeback:0 [ 3258.773929] slab_reclaimable:8582 slab_unreclaimable:64907 [ 3258.773929] mapped:69647 shmem:123 pagetables:3746 bounce:0 [ 3258.773929] free:2435 free_pcp:61 free_cma:0 [ 3258.774412] 0 [ 3258.774989] Node 0 active_anon:41588kB inactive_anon:202360kB active_file:12kB inactive_file:44kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278588kB dirty:0kB writeback:0kB shmem:492kB writeback_tmp:0kB kernel_stack:7712kB all_unreclaimable? yes [ 3258.775484] Node 0 [ 3258.776033] Node 0 [ 3258.776681] DMA: 0*4kB [ 3258.777219] DMA free:6496kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3258.777820] 0*8kB 0*16kB [ 3258.778359] lowmem_reserve[]: [ 3258.778640] 1*32kB (U) 1*64kB [ 3258.779082] 0 [ 3258.779354] (U) 0*128kB [ 3258.780092] 1618 [ 3258.783844] 1*256kB [ 3258.784410] 1618 [ 3258.784844] (U) 0*512kB [ 3258.785839] 1618 [ 3258.786879] 0*1024kB 1*2048kB [ 3258.787122] [ 3258.788922] (M) [ 3258.789878] Node 0 [ 3258.790138] 1*4096kB [ 3258.791797] DMA32 free:3244kB min:7168kB low:8824kB high:10480kB reserved_highatomic:0KB active_anon:41588kB inactive_anon:202360kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:14984kB bounce:0kB free_pcp:244kB local_pcp:0kB free_cma:0kB [ 3258.792328] (M) [ 3258.792619] lowmem_reserve[]: [ 3258.798773] = 6496kB [ 3258.798900] 0 [ 3258.804632] Node 0 [ 3258.804944] 0 0 [ 3258.805413] DMA32: 466*4kB [ 3258.805810] 0 [ 3258.812189] (ME) 69*8kB [ 3258.812617] [ 3258.813268] (UME) [ 3258.813710] Node 0 [ 3258.813932] 22*16kB [ 3258.814240] DMA: 0*4kB [ 3258.814498] (UME) 9*32kB [ 3258.814847] 0*8kB 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6496kB [ 3258.814936] Node 0 DMA32: 466*4kB (ME) 69*8kB [ 3258.815443] (UM) [ 3258.815841] (UME) [ 3258.816275] 5*64kB (UM) [ 3258.816760] 22*16kB [ 3258.817108] 0*128kB [ 3258.817381] (UME) 9*32kB [ 3258.817946] 0*256kB [ 3258.818280] (UM) 5*64kB [ 3258.825255] 0*512kB [ 3258.825533] (UM) 0*128kB [ 3258.826207] 0*1024kB 0*2048kB [ 3258.826546] 0*256kB 0*512kB [ 3258.827026] 0*4096kB [ 3258.827335] 0*1024kB 0*2048kB [ 3258.827786] = 3376kB [ 3258.828194] 0*4096kB [ 3258.828419] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3258.828751] = 3376kB [ 3258.828987] 155 total pagecache pages [ 3258.829245] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3258.829509] 0 pages in swap cache [ 3258.829806] 155 total pagecache pages [ 3258.830361] Swap cache stats: add 0, delete 0, find 0/0 [ 3258.830369] Free swap = 0kB [ 3258.830803] 0 pages in swap cache [ 3258.834342] Total swap = 0kB [ 3258.834670] Swap cache stats: add 0, delete 0, find 0/0 [ 3258.834987] 524158 pages RAM [ 3258.835296] Free swap = 0kB [ 3258.835303] Total swap = 0kB [ 3258.835604] 0 pages HighMem/MovableOnly [ 3258.835611] 104482 pages reserved [ 3258.835886] 524158 pages RAM [ 3258.850700] 0 pages HighMem/MovableOnly [ 3258.851261] 104482 pages reserved [ 3258.851946] Unreclaimable slab info: [ 3258.853002] Name Used Total [ 3258.853801] pid_3 3KB 3KB [ 3258.854465] pid_2 90KB 90KB [ 3258.855229] IEEE-802.15.4-MAC 31KB 31KB [ 3258.855929] IEEE-802.15.4-RAW 63KB 63KB [ 3258.856620] p9_req_t 8KB 8KB [ 3258.857336] fib6_nodes 28KB 28KB [ 3258.858036] ip6_dst_cache 41KB 41KB [ 3258.858781] PINGv6 31KB 31KB [ 3258.859550] RAWv6 220KB 220KB [ 3258.860436] UDPLITEv6 62KB 62KB [ 3258.861239] UDPv6 62KB 62KB [ 3258.862041] tw_sock_TCPv6 15KB 15KB [ 3258.862848] request_sock_TCPv6 15KB 15KB [ 3258.863545] TCPv6 187KB 187KB [ 3258.864297] scsi_sense_cache 8KB 8KB [ 3258.865103] sd_ext_cdb 3KB 3KB [ 3258.865899] virtio_scsi_cmd 16KB 16KB [ 3258.867476] sgpool-128 59KB 59KB [ 3258.869011] sgpool-64 63KB 63KB [ 3258.869789] sgpool-32 78KB 78KB [ 3258.870574] sgpool-16 52KB 52KB [ 3258.871327] sgpool-8 56KB 56KB [ 3258.872037] mqueue_inode_cache 62KB 62KB [ 3258.872759] nfs_commit_data 15KB 15KB [ 3258.873444] nfs_write_data 47KB 47KB [ 3258.874159] jbd2_inode 7KB 7KB [ 3258.875159] ext4_system_zone 7KB 7KB [ 3258.876340] ext4_io_end_vec 7KB 7KB [ 3258.877146] ext4_bio_post_read_ctx 15KB 15KB [ 3258.877917] io_kiocb 26KB 26KB [ 3258.878641] kioctx 31KB 31KB [ 3258.879326] aio_kiocb 7KB 7KB [ 3258.880037] dnotify_mark 3KB 3KB [ 3258.880755] dnotify_struct 3KB 3KB [ 3258.881440] dio 46KB 46KB [ 3258.882202] bio-2 4KB 4KB [ 3258.883285] fasync_cache 11KB 11KB [ 3258.884788] pid_namespace 7KB 7KB [ 3258.886300] posix_timers_cache 15KB 15KB [ 3258.887840] rpc_buffers 31KB 31KB [ 3258.889352] rpc_tasks 3KB 3KB [ 3258.890860] UNIX 325KB 403KB [ 3258.892456] UDP-Lite 63KB 63KB [ 3258.894045] tcp_bind_bucket 16KB 16KB [ 3258.895600] xfrm_state 32KB 32KB [ 3258.897093] ip_fib_trie 8KB 8KB [ 3258.898610] ip_fib_alias 15KB 15KB [ 3258.900153] ip_dst_cache 70KB 112KB [ 3258.901700] PING 62KB 62KB [ 3258.903248] RAW 156KB 156KB [ 3258.904714] UDP 346KB 346KB [ 3258.906223] tw_sock_TCP 15KB 15KB [ 3258.907773] request_sock_TCP 7KB 7KB [ 3258.909339] TCP 180KB 180KB [ 3258.910104] hugetlbfs_inode_cache 30KB 30KB [ 3258.911433] bio-1 11KB 11KB [ 3258.912151] eventpoll_pwq 23KB 23KB [ 3258.912866] eventpoll_epi 47KB 47KB [ 3258.913550] inotify_inode_mark 35KB 35KB [ 3258.914272] request_queue 60KB 60KB [ 3258.915059] blkdev_ioc 18KB 18KB [ 3258.915782] bio-0 112KB 112KB [ 3258.916474] biovec-max 463KB 658KB [ 3258.917192] biovec-64 126KB 173KB [ 3258.917910] biovec-16 48KB 48KB [ 3258.918619] user_namespace 31KB 31KB [ 3258.920178] uid_cache 8KB 8KB [ 3258.921702] dmaengine-unmap-2 4KB 4KB [ 3258.923253] audit_buffer 7KB 7KB [ 3258.924825] skbuff_ext_cache 1132KB 1132KB [ 3258.926402] skbuff_fclone_cache 209KB 255KB [ 3258.928040] skbuff_head_cache 949KB 1376KB [ 3258.929655] file_lock_cache 74KB 74KB [ 3258.931217] file_lock_ctx 7KB 7KB [ 3258.932854] fsnotify_mark_connector 20KB 20KB [ 3258.934525] net_namespace 117KB 117KB [ 3258.936220] task_delay_info 135KB 135KB [ 3258.937760] taskstats 77KB 77KB [ 3258.939328] proc_dir_entry 377KB 386KB [ 3258.940891] pde_opener 31KB 31KB [ 3258.942423] seq_file 37KB 41KB [ 3258.943973] sigqueue 126KB 126KB [ 3258.945563] shmem_inode_cache 1252KB 1289KB [ 3258.947163] kernfs_iattrs_cache 243KB 243KB [ 3258.948787] kernfs_node_cache 5588KB 5607KB [ 3258.950322] mnt_cache 244KB 244KB [ 3258.951917] filp 1528KB 1620KB [ 3258.953599] names_cache 9745KB 9745KB [ 3258.955206] hashtab_node 274KB 274KB [ 3258.956639] ebitmap_node 1149KB 1149KB [ 3258.958039] avtab_node 4976KB 4976KB [ 3258.959443] avc_node 35KB 35KB [ 3258.960864] lsm_inode_cache 3271KB 3277KB [ 3258.962400] lsm_file_cache 169KB 192KB [ 3258.963892] key_jar 39KB 39KB [ 3258.965390] uts_namespace 15KB 15KB [ 3258.966910] nsproxy 15KB 15KB [ 3258.968416] vm_area_struct 1712KB 1856KB [ 3258.969996] mm_struct 369KB 409KB [ 3258.970823] fs_cache 68KB 68KB [ 3258.972355] files_cache 239KB 239KB [ 3258.973182] signal_cache 500KB 555KB [ 3258.974742] sighand_cache 545KB 571KB [ 3258.975541] task_struct 2116KB 2358KB [ 3258.977106] cred_jar 142KB 180KB [ 3258.977928] anon_vma_chain 497KB 507KB [ 3258.979493] anon_vma 621KB 621KB [ 3258.980320] pid 54KB 67KB [ 3258.981876] Acpi-Operand 184KB 213KB [ 3258.982716] Acpi-ParseExt 27KB 27KB [ 3258.984228] Acpi-Parse 162KB 177KB [ 3258.985167] Acpi-State 51KB 66KB [ 3258.986694] Acpi-Namespace 20KB 20KB [ 3258.987493] numa_policy 7KB 7KB [ 3258.989010] trace_event_file 163KB 163KB [ 3258.989848] ftrace_event_field 280KB 280KB [ 3258.991491] pool_workqueue 40KB 40KB [ 3258.992300] task_group 16KB 16KB [ 3258.993942] vmap_area 114KB 114KB [ 3258.994764] page->ptl 417KB 456KB [ 3258.996499] kmemleak_scan_area 91KB 91KB [ 3258.998180] kmemleak_object 151107KB 162772KB [ 3258.999230] kmalloc-8k 4992KB 5120KB [ 3258.999937] kmalloc-4k 6784KB 7488KB [ 3259.000677] kmalloc-2k 4992KB 5216KB [ 3259.001363] kmalloc-1k 3000KB 4160KB [ 3259.002112] kmalloc-512 4442KB 7616KB [ 3259.002845] kmalloc-256 1384KB 1384KB [ 3259.003546] kmalloc-192 539KB 548KB [ 3259.004313] kmalloc-128 581KB 604KB [ 3259.005119] kmalloc-96 465KB 928KB [ 3259.005894] kmalloc-64 1151KB 1732KB [ 3259.006686] kmalloc-32 771KB 836KB [ 3259.007917] kmalloc-16 348KB 368KB [ 3259.009072] kmalloc-8 318KB 318KB [ 3259.010714] kmem_cache_node 47KB 47KB [ 3259.012218] kmem_cache 78KB 78KB [ 3259.013391] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=262,uid=0 [ 3259.019620] Out of memory (oom_kill_allocating_task): Killed process 261 (syz-fuzzer) total-vm:1171016kB, anon-rss:198736kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:824kB oom_score_adj:0 [ 3260.709892] oom_reaper: reaped process 11426 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3260.752660] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 3260.757173] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.161 #1 [ 3260.759898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3260.763183] Call Trace: [ 3260.764238] dump_stack+0x107/0x167 [ 3260.765526] dump_header+0x106/0x613 [ 3260.767169] oom_kill_process.cold+0x10/0x15 [ 3260.768866] out_of_memory+0x110f/0x1410 [ 3260.770508] ? oom_killer_disable+0x280/0x280 [ 3260.772376] ? mutex_trylock+0x237/0x2b0 [ 3260.773984] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 3260.776392] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 3260.778558] ? lock_acquire+0x187/0x490 [ 3260.780162] ? warn_alloc+0x190/0x190 [ 3260.781664] __alloc_pages_nodemask+0x553/0x680 [ 3260.783521] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3260.785874] ? xas_load+0x66/0x2c0 [ 3260.787297] ? find_get_entry+0x2d9/0x6e0 [ 3260.788925] alloc_pages_current+0x187/0x280 [ 3260.790691] __page_cache_alloc+0x2d2/0x360 [ 3260.792112] pagecache_get_page+0x2c7/0xc80 [ 3260.793833] filemap_fault+0x177d/0x21b0 [ 3260.794437] ? read_cache_page_gfp+0x30/0x30 [ 3260.795240] ? replace_page_cache_page+0x1200/0x1200 [ 3260.796223] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 3260.796965] ext4_filemap_fault+0x87/0xc0 [ 3260.797668] __do_fault+0x113/0x410 [ 3260.798295] handle_mm_fault+0x1e72/0x3520 [ 3260.798936] ? find_held_lock+0x2c/0x110 [ 3260.799614] ? __pmd_alloc+0x5e0/0x5e0 [ 3260.800271] ? vmacache_find+0x55/0x2a0 [ 3260.800934] do_user_addr_fault+0x56e/0xc00 [ 3260.801653] exc_page_fault+0xa2/0x1a0 [ 3260.802265] ? asm_exc_page_fault+0x8/0x30 [ 3260.802943] asm_exc_page_fault+0x1e/0x30 [ 3260.803559] RIP: 0033:0x7f65837c0470 [ 3260.804054] Code: Unable to access opcode bytes at RIP 0x7f65837c0446. [ 3260.805049] RSP: 002b:00007ffdf4af1700 EFLAGS: 00010202 [ 3260.805857] RAX: 0000000000000001 RBX: 00000000001578e0 RCX: 00007ffdf4af1820 [ 3260.806918] RDX: 00007ffdf4af1708 RSI: 00007ffdf4af1708 RDI: 000055ef62aa43f0 [ 3260.807982] RBP: 00007ffdf4af1788 R08: 0000000000000001 R09: 00000000001578e0 [ 3260.809081] R10: 0000000000000002 R11: 00000000005c4eb2 R12: 00007f658217a8e0 [ 3260.810049] R13: 000055ef62aa3570 R14: 0000000000000006 R15: 00007ffdf4af1710 [ 3260.811282] hpet: Lost 2 RTC interrupts [ 3260.813289] Mem-Info: [ 3260.813852] active_anon:10330 inactive_anon:38616 isolated_anon:0 [ 3260.813852] active_file:210 inactive_file:216 isolated_file:25 [ 3260.813852] unevictable:0 dirty:0 writeback:0 [ 3260.813852] slab_reclaimable:8325 slab_unreclaimable:63362 [ 3260.813852] mapped:17104 shmem:122 pagetables:1826 bounce:0 [ 3260.813852] free:3205 free_pcp:0 free_cma:0 [ 3260.818442] Node 0 active_anon:41320kB inactive_anon:154464kB active_file:840kB inactive_file:1032kB unevictable:0kB isolated(anon):0kB isolated(file):100kB mapped:68416kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:5440kB all_unreclaimable? no [ 3260.821464] Node 0 DMA free:6492kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3260.825198] lowmem_reserve[]: 0 1618 1618 1618 [ 3260.825979] Node 0 DMA32 free:6328kB min:5120kB low:6776kB high:8432kB reserved_highatomic:0KB active_anon:41572kB inactive_anon:154464kB active_file:472kB inactive_file:1004kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:7304kB bounce:0kB free_pcp:264kB local_pcp:0kB free_cma:0kB [ 3260.830510] lowmem_reserve[]: 0 0 0 0 [ 3260.831103] Node 0 DMA: 1*4kB (M) 1*8kB (M) 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6492kB [ 3260.833422] Node 0 DMA32: 596*4kB (ME) 199*8kB (UME) 53*16kB (ME) 8*32kB (UME) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5400kB [ 3260.835471] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3260.836718] 556 total pagecache pages [ 3260.837236] 0 pages in swap cache [ 3260.837755] Swap cache stats: add 0, delete 0, find 0/0 [ 3260.838457] Free swap = 0kB [ 3260.838928] Total swap = 0kB [ 3260.839400] 524158 pages RAM [ 3260.839929] 0 pages HighMem/MovableOnly [ 3260.840603] 104482 pages reserved [ 3260.841160] Unreclaimable slab info: [ 3260.841776] Name Used Total [ 3260.842759] pid_3 3KB 3KB [ 3260.843507] pid_2 67KB 90KB [ 3260.844480] IEEE-802.15.4-MAC 31KB 31KB [ 3260.845258] IEEE-802.15.4-RAW 63KB 63KB [ 3260.846036] p9_req_t 8KB 8KB [ 3260.846912] fib6_nodes 28KB 28KB [ 3260.847757] ip6_dst_cache 41KB 41KB [ 3260.848498] PINGv6 31KB 31KB [ 3260.849279] RAWv6 220KB 220KB [ 3260.850067] UDPLITEv6 62KB 62KB [ 3260.851121] UDPv6 62KB 62KB [ 3260.851914] tw_sock_TCPv6 15KB 15KB [ 3260.852958] request_sock_TCPv6 15KB 15KB [ 3260.853852] TCPv6 187KB 187KB [ 3260.854745] scsi_sense_cache 8KB 8KB [ 3260.855619] sd_ext_cdb 3KB 3KB [ 3260.856441] virtio_scsi_cmd 16KB 16KB [ 3260.857268] sgpool-128 59KB 59KB [ 3260.858114] sgpool-64 63KB 63KB [ 3260.859003] sgpool-32 220KB 220KB [ 3260.860039] sgpool-16 75KB 75KB [ 3260.860898] sgpool-8 56KB 56KB [ 3260.861695] mqueue_inode_cache 62KB 62KB [ 3260.862543] nfs_commit_data 15KB 15KB [ 3260.863411] nfs_write_data 47KB 47KB [ 3260.864268] jbd2_inode 7KB 7KB [ 3260.865055] ext4_system_zone 7KB 7KB [ 3260.865827] ext4_io_end_vec 7KB 7KB [ 3260.866575] ext4_bio_post_read_ctx 15KB 15KB [ 3260.867522] io_kiocb 26KB 26KB [ 3260.868345] kioctx 31KB 31KB [ 3260.869239] aio_kiocb 7KB 7KB [ 3260.870024] dnotify_mark 3KB 3KB [ 3260.870818] dnotify_struct 3KB 3KB [ 3260.871620] dio 46KB 46KB [ 3260.872404] bio-2 4KB 4KB [ 3260.873314] fasync_cache 11KB 11KB [ 3260.874096] pid_namespace 7KB 7KB [ 3260.874906] posix_timers_cache 15KB 15KB [ 3260.875900] rpc_buffers 31KB 31KB [ 3260.876678] rpc_tasks 3KB 3KB [ 3260.877504] UNIX 325KB 403KB [ 3260.878703] UDP-Lite 63KB 63KB [ 3260.879447] tcp_bind_bucket 16KB 16KB [ 3260.880214] xfrm_state 32KB 32KB [ 3260.880994] ip_fib_trie 8KB 8KB [ 3260.881807] ip_fib_alias 15KB 15KB [ 3260.882556] ip_dst_cache 70KB 112KB [ 3260.883348] PING 62KB 62KB [ 3260.884117] RAW 156KB 156KB [ 3260.884888] UDP 346KB 346KB [ 3260.885700] tw_sock_TCP 15KB 15KB [ 3260.886446] request_sock_TCP 7KB 7KB [ 3260.887266] TCP 180KB 180KB [ 3260.888052] hugetlbfs_inode_cache 30KB 30KB [ 3260.888957] bio-1 11KB 11KB [ 3260.889782] eventpoll_pwq 23KB 23KB [ 3260.890629] eventpoll_epi 47KB 47KB [ 3260.891616] inotify_inode_mark 35KB 35KB [ 3260.892445] request_queue 60KB 60KB [ 3260.893282] blkdev_ioc 22KB 22KB [ 3260.894050] bio-0 200KB 200KB [ 3260.894832] biovec-max 522KB 658KB [ 3260.895562] biovec-64 299KB 299KB [ 3260.896335] biovec-16 48KB 48KB [ 3260.897128] user_namespace 31KB 31KB [ 3260.897903] uid_cache 8KB 8KB [ 3260.898691] dmaengine-unmap-2 4KB 4KB [ 3260.899423] audit_buffer 7KB 7KB [ 3260.900187] skbuff_ext_cache 1152KB 1152KB [ 3260.900951] skbuff_fclone_cache 209KB 255KB [ 3260.901729] skbuff_head_cache 706KB 896KB [ 3260.902445] file_lock_cache 74KB 74KB [ 3260.903285] file_lock_ctx 7KB 7KB [ 3260.904144] fsnotify_mark_connector 20KB 20KB [ 3260.905086] net_namespace 117KB 117KB [ 3260.905855] task_delay_info 135KB 135KB [ 3260.906682] taskstats 77KB 77KB [ 3260.907637] proc_dir_entry 377KB 386KB [ 3260.908375] pde_opener 31KB 31KB [ 3260.909117] seq_file 37KB 41KB [ 3260.909858] sigqueue 126KB 126KB [ 3260.910671] shmem_inode_cache 1252KB 1289KB [ 3260.911424] kernfs_iattrs_cache 243KB 243KB [ 3260.912233] kernfs_node_cache 5584KB 5604KB [ 3260.913029] mnt_cache 244KB 244KB [ 3260.913810] filp 1220KB 1590KB [ 3260.914561] names_cache 6018KB 6736KB [ 3260.915358] hashtab_node 274KB 274KB [ 3260.916132] ebitmap_node 1149KB 1149KB [ 3260.916899] avtab_node 4976KB 4976KB [ 3260.917671] avc_node 35KB 35KB [ 3260.918442] lsm_inode_cache 2770KB 3186KB [ 3260.919224] lsm_file_cache 66KB 184KB [ 3260.920000] key_jar 39KB 39KB [ 3260.920805] uts_namespace 15KB 15KB [ 3260.921538] nsproxy 15KB 15KB [ 3260.922329] vm_area_struct 1616KB 1812KB [ 3260.923280] mm_struct 369KB 409KB [ 3260.924052] fs_cache 68KB 68KB [ 3260.924867] files_cache 239KB 239KB [ 3260.925654] signal_cache 500KB 555KB [ 3260.926401] sighand_cache 474KB 571KB [ 3260.930286] task_struct 1893KB 2295KB [ 3260.931100] cred_jar 134KB 180KB [ 3260.931869] anon_vma_chain 497KB 507KB [ 3260.932649] anon_vma 401KB 601KB [ 3260.933384] pid 54KB 67KB [ 3260.934158] Acpi-Operand 184KB 213KB [ 3260.934947] Acpi-ParseExt 27KB 27KB [ 3260.935736] Acpi-Parse 162KB 177KB [ 3260.936475] Acpi-State 51KB 66KB [ 3260.937371] Acpi-Namespace 20KB 20KB [ 3260.938123] numa_policy 7KB 7KB [ 3260.939247] trace_event_file 163KB 163KB [ 3260.940027] ftrace_event_field 280KB 280KB [ 3260.940868] pool_workqueue 40KB 40KB [ 3260.941724] task_group 16KB 16KB [ 3260.942532] vmap_area 114KB 114KB [ 3260.943491] page->ptl 411KB 456KB [ 3260.944379] kmemleak_scan_area 91KB 91KB [ 3260.946045] kmemleak_object 146133KB 162316KB [ 3260.946964] kmalloc-8k 4992KB 5120KB [ 3260.947809] kmalloc-4k 7264KB 7456KB [ 3260.948697] kmalloc-2k 5008KB 5216KB [ 3260.949524] kmalloc-1k 3052KB 4160KB [ 3260.950406] kmalloc-512 3825KB 6384KB [ 3260.951260] kmalloc-256 1416KB 1416KB [ 3260.952096] kmalloc-192 543KB 548KB [ 3260.952946] kmalloc-128 583KB 604KB [ 3260.954033] kmalloc-96 422KB 912KB [ 3260.954985] kmalloc-64 1029KB 1692KB [ 3260.955846] kmalloc-32 773KB 836KB [ 3260.956712] kmalloc-16 348KB 368KB [ 3260.957460] kmalloc-8 318KB 318KB [ 3260.958276] kmem_cache_node 47KB 47KB [ 3260.959121] kmem_cache 78KB 78KB [ 3260.959916] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 3260.962788] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31940kB, anon-rss:864kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 3261.379221] oom_reaper: reaped process 261 (syz-fuzzer), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 3261.409951] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 3261.457719] systemd[1]: Stopped OpenBSD Secure Shell server. [ 3261.460088] systemd[1]: ssh.service: Consumed 46min 47.418s CPU time. [ 3261.476624] systemd[1]: ssh.service: Found left-over process 255 (sshd) in control group while starting unit. Ignoring. [ 3261.482230] systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies. [ 3261.763478] systemd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3261.766582] CPU: 1 PID: 1 Comm: systemd Not tainted 5.10.161 #1 [ 3261.771714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3261.773733] Call Trace: [ 3261.774118] dump_stack+0x107/0x167 [ 3261.774630] dump_header+0x106/0x613 [ 3261.775139] oom_kill_process.cold+0x10/0x15 [ 3261.775714] out_of_memory+0x358/0x1410 [ 3261.776282] ? oom_killer_disable+0x280/0x280 [ 3261.776893] ? mutex_trylock+0x237/0x2b0 [ 3261.777444] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 3261.778272] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 3261.779091] ? lock_acquire+0x187/0x490 [ 3261.779657] ? warn_alloc+0x190/0x190 [ 3261.780213] __alloc_pages_nodemask+0x553/0x680 [ 3261.780849] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3261.781678] ? xas_load+0x66/0x2c0 [ 3261.782891] ? find_get_entry+0x2d9/0x6e0 [ 3261.784160] alloc_pages_current+0x187/0x280 [ 3261.785547] __page_cache_alloc+0x2d2/0x360 [ 3261.787118] pagecache_get_page+0x2c7/0xc80 [ 3261.788609] filemap_fault+0x177d/0x21b0 [ 3261.789952] ? read_cache_page_gfp+0x30/0x30 [ 3261.791564] ? replace_page_cache_page+0x1200/0x1200 [ 3261.793262] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 3261.796102] ext4_filemap_fault+0x87/0xc0 [ 3261.797539] __do_fault+0x113/0x410 [ 3261.798839] handle_mm_fault+0x1e72/0x3520 [ 3261.800332] ? find_held_lock+0x2c/0x110 [ 3261.801748] ? __pmd_alloc+0x5e0/0x5e0 [ 3261.803090] ? vmacache_find+0x55/0x2a0 [ 3261.804636] ? vmacache_update+0xce/0x140 [ 3261.806055] do_user_addr_fault+0x56e/0xc00 [ 3261.807729] exc_page_fault+0xa2/0x1a0 [ 3261.809187] ? asm_exc_page_fault+0x8/0x30 [ 3261.810733] asm_exc_page_fault+0x1e/0x30 [ 3261.812186] RIP: 0033:0x7f722d94bee0 [ 3261.813506] Code: Unable to access opcode bytes at RIP 0x7f722d94beb6. [ 3261.814790] hpet: Lost 1 RTC interrupts [ 3261.816055] RSP: 002b:00007ffe3d378aa8 EFLAGS: 00010246 [ 3261.819272] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f722d615760 [ 3261.821943] RDX: 00007ffe3d378b38 RSI: 000056382d71f000 RDI: 0000000000000000 [ 3261.824549] RBP: 00007ffe3d378b40 R08: 0000000000000000 R09: 0000000000000003 [ 3261.827048] R10: 52e7a371e330bc39 R11: 0000000000000246 R12: 0000000000000000 [ 3261.829409] R13: 0000000000000000 R14: 00007ffe3d378b50 R15: 00007ffe3d378b38 [ 3261.831089] Mem-Info: [ 3261.831455] active_anon:58 inactive_anon:7446 isolated_anon:0 [ 3261.831455] active_file:61 inactive_file:158 isolated_file:0 [ 3261.831455] unevictable:0 dirty:0 writeback:0 [ 3261.831455] slab_reclaimable:7437 slab_unreclaimable:61795 [ 3261.831455] mapped:8732 shmem:122 pagetables:307 bounce:0 [ 3261.831455] free:2355 free_pcp:19 free_cma:0 [ 3261.835459] Node 0 active_anon:232kB inactive_anon:29784kB active_file:244kB inactive_file:632kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34928kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:2880kB all_unreclaimable? no [ 3261.838908] Node 0 DMA free:6492kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:4kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3261.842764] lowmem_reserve[]: 0 1618 1618 1618 [ 3261.843467] Node 0 DMA32 free:2928kB min:5120kB low:6776kB high:8432kB reserved_highatomic:0KB active_anon:484kB inactive_anon:30116kB active_file:312kB inactive_file:304kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1228kB bounce:0kB free_pcp:76kB local_pcp:0kB free_cma:0kB [ 3261.847968] lowmem_reserve[]: 0 0 0 0 [ 3261.848673] Node 0 DMA: 1*4kB (M) 1*8kB (M) 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6492kB [ 3261.851541] Node 0 DMA32: 489*4kB (UME) 106*8kB (UME) 29*16kB (UM) 1*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3300kB [ 3261.853772] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3261.855008] 336 total pagecache pages [ 3261.855521] 0 pages in swap cache [ 3261.856047] Swap cache stats: add 0, delete 0, find 0/0 [ 3261.856848] Free swap = 0kB [ 3261.857260] Total swap = 0kB [ 3261.857727] 524158 pages RAM [ 3261.858137] 0 pages HighMem/MovableOnly [ 3261.858798] 104482 pages reserved [ 3261.859265] Unreclaimable slab info: [ 3261.859850] Name Used Total [ 3261.860623] pid_3 3KB 3KB [ 3261.861386] pid_2 67KB 90KB [ 3261.862145] IEEE-802.15.4-MAC 31KB 31KB [ 3261.862973] IEEE-802.15.4-RAW 63KB 63KB [ 3261.863721] p9_req_t 8KB 8KB [ 3261.864340] fib6_nodes 28KB 28KB [ 3261.865080] ip6_dst_cache 41KB 41KB [ 3261.865825] PINGv6 31KB 31KB [ 3261.866613] RAWv6 220KB 220KB [ 3261.867438] UDPLITEv6 62KB 62KB [ 3261.868536] UDPv6 62KB 62KB [ 3261.869662] tw_sock_TCPv6 15KB 15KB [ 3261.870809] request_sock_TCPv6 15KB 15KB [ 3261.871736] TCPv6 187KB 187KB [ 3261.872470] scsi_sense_cache 8KB 8KB [ 3261.873219] sd_ext_cdb 3KB 3KB [ 3261.873965] virtio_scsi_cmd 16KB 16KB [ 3261.874730] sgpool-128 59KB 59KB [ 3261.878756] sgpool-64 63KB 63KB [ 3261.879827] sgpool-32 299KB 299KB [ 3261.880953] sgpool-16 82KB 82KB [ 3261.882013] sgpool-8 56KB 56KB [ 3261.883135] mqueue_inode_cache 62KB 62KB [ 3261.884293] nfs_commit_data 15KB 15KB [ 3261.885438] nfs_write_data 47KB 47KB [ 3261.886621] jbd2_inode 7KB 7KB [ 3261.887577] ext4_system_zone 7KB 7KB [ 3261.888292] ext4_io_end_vec 7KB 7KB [ 3261.889011] ext4_bio_post_read_ctx 15KB 15KB [ 3261.889780] io_kiocb 26KB 26KB [ 3261.890457] kioctx 31KB 31KB [ 3261.891197] aio_kiocb 7KB 7KB [ 3261.891914] dnotify_mark 3KB 3KB [ 3261.892631] dnotify_struct 3KB 3KB [ 3261.893314] dio 46KB 46KB [ 3261.894029] bio-2 4KB 4KB [ 3261.894720] fasync_cache 11KB 11KB [ 3261.895525] pid_namespace 7KB 7KB [ 3261.896145] posix_timers_cache 15KB 15KB [ 3261.896816] rpc_buffers 31KB 31KB [ 3261.897366] rpc_tasks 3KB 3KB [ 3261.897962] UNIX 325KB 403KB [ 3261.898542] UDP-Lite 63KB 63KB [ 3261.899154] tcp_bind_bucket 16KB 16KB [ 3261.899757] xfrm_state 32KB 32KB [ 3261.900347] ip_fib_trie 8KB 8KB [ 3261.900945] ip_fib_alias 15KB 15KB [ 3261.901619] ip_dst_cache 70KB 112KB [ 3261.902192] PING 62KB 62KB [ 3261.902841] RAW 156KB 156KB [ 3261.903397] UDP 346KB 346KB [ 3261.903972] tw_sock_TCP 15KB 15KB [ 3261.904553] request_sock_TCP 7KB 7KB [ 3261.905109] TCP 180KB 180KB [ 3261.905714] hugetlbfs_inode_cache 30KB 30KB [ 3261.906283] bio-1 11KB 11KB [ 3261.907099] eventpoll_pwq 23KB 23KB [ 3261.907781] eventpoll_epi 47KB 47KB [ 3261.908426] inotify_inode_mark 35KB 35KB [ 3261.909028] request_queue 60KB 60KB [ 3261.909672] blkdev_ioc 22KB 22KB [ 3261.910250] bio-0 228KB 228KB [ 3261.911181] biovec-max 450KB 629KB [ 3261.911905] biovec-64 393KB 393KB [ 3261.913265] biovec-16 52KB 52KB [ 3261.914858] user_namespace 31KB 31KB [ 3261.916408] uid_cache 8KB 8KB [ 3261.917972] dmaengine-unmap-2 4KB 4KB [ 3261.919548] audit_buffer 7KB 7KB [ 3261.921132] skbuff_ext_cache 1164KB 1164KB [ 3261.922832] skbuff_fclone_cache 209KB 255KB [ 3261.923654] skbuff_head_cache 732KB 817KB [ 3261.924456] file_lock_cache 74KB 74KB [ 3261.925247] file_lock_ctx 7KB 7KB [ 3261.926035] fsnotify_mark_connector 20KB 20KB [ 3261.926876] net_namespace 117KB 117KB [ 3261.927794] task_delay_info 135KB 135KB [ 3261.928519] taskstats 77KB 77KB [ 3261.929278] proc_dir_entry 377KB 386KB [ 3261.929988] pde_opener 31KB 31KB [ 3261.930704] seq_file 37KB 41KB [ 3261.931409] sigqueue 126KB 126KB [ 3261.932196] shmem_inode_cache 1252KB 1289KB [ 3261.933019] kernfs_iattrs_cache 243KB 243KB [ 3261.933837] kernfs_node_cache 5584KB 5604KB [ 3261.934631] mnt_cache 244KB 244KB [ 3261.935433] filp 822KB 1485KB [ 3261.936230] names_cache 2354KB 2792KB [ 3261.937030] hashtab_node 274KB 274KB [ 3261.937820] ebitmap_node 1149KB 1149KB [ 3261.938726] avtab_node 4976KB 4976KB [ 3261.939495] avc_node 35KB 35KB [ 3261.940320] lsm_inode_cache 2618KB 3051KB [ 3261.941098] lsm_file_cache 66KB 184KB [ 3261.941896] key_jar 39KB 39KB [ 3261.942711] uts_namespace 15KB 15KB [ 3261.943470] nsproxy 15KB 15KB [ 3261.944284] vm_area_struct 1616KB 1812KB [ 3261.945080] mm_struct 369KB 409KB [ 3261.945882] fs_cache 68KB 68KB [ 3261.946707] files_cache 239KB 239KB [ 3261.947467] signal_cache 500KB 555KB [ 3261.948256] sighand_cache 323KB 511KB [ 3261.949055] task_struct 1842KB 2295KB [ 3261.949844] cred_jar 106KB 180KB [ 3261.950636] anon_vma_chain 497KB 507KB [ 3261.951409] anon_vma 184KB 330KB [ 3261.952117] pid 54KB 67KB [ 3261.952859] Acpi-Operand 184KB 213KB [ 3261.953752] Acpi-ParseExt 27KB 27KB [ 3261.954520] Acpi-Parse 162KB 177KB [ 3261.955329] Acpi-State 51KB 66KB [ 3261.956121] Acpi-Namespace 20KB 20KB [ 3261.956917] numa_policy 7KB 7KB [ 3261.957723] trace_event_file 163KB 163KB [ 3261.958489] ftrace_event_field 280KB 280KB [ 3261.959305] pool_workqueue 40KB 40KB [ 3261.960111] task_group 16KB 16KB [ 3261.960946] vmap_area 114KB 114KB [ 3261.961771] page->ptl 411KB 456KB [ 3261.962524] kmemleak_scan_area 91KB 91KB [ 3261.964301] kmemleak_object 139806KB 161617KB [ 3261.965108] kmalloc-8k 4992KB 5120KB [ 3261.965908] kmalloc-4k 7256KB 7392KB [ 3261.966731] kmalloc-2k 5028KB 5216KB [ 3261.967495] kmalloc-1k 3134KB 4160KB [ 3261.968310] kmalloc-512 3813KB 5872KB [ 3261.969117] kmalloc-256 1404KB 1424KB [ 3261.970000] kmalloc-192 547KB 548KB [ 3261.970807] kmalloc-128 581KB 604KB [ 3261.971511] kmalloc-96 412KB 900KB [ 3261.972248] kmalloc-64 1009KB 1680KB [ 3261.972826] kmalloc-32 771KB 836KB [ 3261.973369] kmalloc-16 348KB 368KB [ 3261.974076] kmalloc-8 318KB 318KB [ 3261.974819] kmem_cache_node 47KB 47KB [ 3261.975674] kmem_cache 78KB 78KB [ 3261.976422] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-rfkill.service,task=systemd,pid=11474,uid=0 [ 3261.978717] Out of memory: Killed process 11474 (systemd) total-vm:114456kB, anon-rss:11104kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:100kB oom_score_adj:0 [ 3261.996749] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3261.998156] CPU: 1 PID: 255 Comm: sshd Not tainted 5.10.161 #1 [ 3261.999020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3262.000077] Call Trace: [ 3262.000438] dump_stack+0x107/0x167 [ 3262.000994] dump_header+0x106/0x613 [ 3262.001490] oom_kill_process.cold+0x10/0x15 [ 3262.002078] out_of_memory+0x110f/0x1410 [ 3262.002627] ? oom_killer_disable+0x280/0x280 [ 3262.003250] ? mutex_trylock+0x237/0x2b0 [ 3262.003789] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 3262.004557] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 3262.005347] ? lock_acquire+0x187/0x490 [ 3262.005878] ? warn_alloc+0x190/0x190 [ 3262.006394] __alloc_pages_nodemask+0x553/0x680 [ 3262.007019] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3262.007796] ? xas_load+0x66/0x2c0 [ 3262.008219] ? find_get_entry+0x2d9/0x6e0 [ 3262.008721] alloc_pages_current+0x187/0x280 [ 3262.009241] __page_cache_alloc+0x2d2/0x360 [ 3262.009756] pagecache_get_page+0x2c7/0xc80 [ 3262.010266] filemap_fault+0x177d/0x21b0 [ 3262.010766] ? read_cache_page_gfp+0x30/0x30 [ 3262.011284] ? replace_page_cache_page+0x1200/0x1200 [ 3262.011883] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 3262.012502] ext4_filemap_fault+0x87/0xc0 [ 3262.012987] __do_fault+0x113/0x410 [ 3262.013418] handle_mm_fault+0x1e72/0x3520 [ 3262.013918] ? find_held_lock+0x2c/0x110 [ 3262.014396] ? __pmd_alloc+0x5e0/0x5e0 [ 3262.015118] ? vmacache_find+0x55/0x2a0 [ 3262.015933] do_user_addr_fault+0x56e/0xc00 [ 3262.016916] exc_page_fault+0xa2/0x1a0 [ 3262.017717] ? asm_exc_page_fault+0x8/0x30 [ 3262.018456] asm_exc_page_fault+0x1e/0x30 [ 3262.018959] RIP: 0033:0x55fead76c830 [ 3262.019403] Code: Unable to access opcode bytes at RIP 0x55fead76c806. [ 3262.020759] RSP: 002b:00007ffc1fe1ed78 EFLAGS: 00010202 [ 3262.021883] RAX: 0000000000000000 RBX: 000055feaf4dfde0 RCX: 000055feaf4fbc50 [ 3262.022781] RDX: 00007ffc1fe1ed80 RSI: 00007ffc1fe1eeb0 RDI: 0000000000000011 [ 3262.024619] RBP: 000055feaf4e4ec0 R08: 0000000000000000 R09: 000000000000000a [ 3262.026362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc1fe1f433 [ 3262.028024] R13: 000055feaf4f7480 R14: 0000000000000000 R15: 0000000000000008 [ 3262.029557] Mem-Info: [ 3262.030042] active_anon:58 inactive_anon:7446 isolated_anon:0 [ 3262.030042] active_file:27 inactive_file:26 isolated_file:0 [ 3262.030042] unevictable:0 dirty:0 writeback:0 [ 3262.030042] slab_reclaimable:7416 slab_unreclaimable:61706 [ 3262.030042] mapped:8732 shmem:122 pagetables:307 bounce:0 [ 3262.030042] free:2348 free_pcp:18 free_cma:0 [ 3262.035843] Node 0 active_anon:232kB inactive_anon:29784kB active_file:108kB inactive_file:20kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34928kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:2880kB all_unreclaimable? no [ 3262.041684] Node 0 DMA free:6492kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:4kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3262.049284] lowmem_reserve[]: 0 1618 1618 1618 [ 3262.050514] Node 0 DMA32 free:2900kB min:7168kB low:8824kB high:10480kB reserved_highatomic:0KB active_anon:484kB inactive_anon:30116kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1228kB bounce:0kB free_pcp:568kB local_pcp:72kB free_cma:0kB [ 3262.054502] lowmem_reserve[]: 0 0 0 0 [ 3262.055086] Node 0 DMA: 1*4kB (M) 1*8kB (M) 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6492kB [ 3262.057122] Node 0 DMA32: 321*4kB (UME) 109*8kB (UME) 26*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 2572kB [ 3262.058974] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3262.060037] 189 total pagecache pages [ 3262.060505] 0 pages in swap cache [ 3262.060976] Swap cache stats: add 0, delete 0, find 0/0 [ 3262.061672] Free swap = 0kB [ 3262.062066] Total swap = 0kB [ 3262.062455] 524158 pages RAM [ 3262.063244] 0 pages HighMem/MovableOnly [ 3262.064223] 104482 pages reserved [ 3262.065069] Unreclaimable slab info: [ 3262.065972] Name Used Total [ 3262.067453] pid_3 3KB 3KB [ 3262.068740] pid_2 67KB 90KB [ 3262.069992] IEEE-802.15.4-MAC 31KB 31KB [ 3262.071436] IEEE-802.15.4-RAW 63KB 63KB [ 3262.072671] p9_req_t 8KB 8KB [ 3262.073941] fib6_nodes 28KB 28KB [ 3262.075237] ip6_dst_cache 41KB 41KB [ 3262.076469] PINGv6 31KB 31KB [ 3262.077722] RAWv6 220KB 220KB [ 3262.078488] UDPLITEv6 62KB 62KB [ 3262.079317] UDPv6 62KB 62KB [ 3262.080047] tw_sock_TCPv6 15KB 15KB [ 3262.080735] request_sock_TCPv6 15KB 15KB [ 3262.081402] TCPv6 187KB 187KB [ 3262.082105] scsi_sense_cache 8KB 8KB [ 3262.082830] sd_ext_cdb 3KB 3KB [ 3262.083505] virtio_scsi_cmd 16KB 16KB [ 3262.084220] sgpool-128 59KB 59KB [ 3262.084933] sgpool-64 63KB 63KB [ 3262.085648] sgpool-32 299KB 299KB [ 3262.086331] sgpool-16 82KB 82KB [ 3262.087056] sgpool-8 56KB 56KB [ 3262.087766] mqueue_inode_cache 62KB 62KB [ 3262.088440] nfs_commit_data 15KB 15KB [ 3262.089148] nfs_write_data 47KB 47KB [ 3262.089837] jbd2_inode 7KB 7KB [ 3262.090495] ext4_system_zone 7KB 7KB [ 3262.091217] ext4_io_end_vec 7KB 7KB [ 3262.091915] ext4_bio_post_read_ctx 15KB 15KB [ 3262.092671] io_kiocb 26KB 26KB [ 3262.093345] kioctx 31KB 31KB [ 3262.094035] aio_kiocb 7KB 7KB [ 3262.094850] dnotify_mark 3KB 3KB [ 3262.095531] dnotify_struct 3KB 3KB [ 3262.096227] dio 46KB 46KB [ 3262.096917] bio-2 4KB 4KB [ 3262.097601] fasync_cache 11KB 11KB [ 3262.098283] pid_namespace 7KB 7KB [ 3262.099018] posix_timers_cache 15KB 15KB [ 3262.099722] rpc_buffers 31KB 31KB [ 3262.100427] rpc_tasks 3KB 3KB [ 3262.101186] UNIX 325KB 403KB [ 3262.101893] UDP-Lite 63KB 63KB [ 3262.102567] tcp_bind_bucket 16KB 16KB [ 3262.103287] xfrm_state 32KB 32KB [ 3262.104028] ip_fib_trie 8KB 8KB [ 3262.104802] ip_fib_alias 15KB 15KB [ 3262.105732] ip_dst_cache 70KB 112KB [ 3262.106489] PING 62KB 62KB [ 3262.108077] RAW 156KB 156KB [ 3262.108893] UDP 346KB 346KB [ 3262.110597] tw_sock_TCP 15KB 15KB [ 3262.112115] request_sock_TCP 7KB 7KB [ 3262.113339] TCP 180KB 180KB [ 3262.114572] hugetlbfs_inode_cache 30KB 30KB [ 3262.115922] bio-1 11KB 11KB [ 3262.117157] eventpoll_pwq 23KB 23KB [ 3262.117857] eventpoll_epi 47KB 47KB [ 3262.118544] inotify_inode_mark 35KB 35KB [ 3262.119292] request_queue 60KB 60KB [ 3262.120000] blkdev_ioc 22KB 22KB [ 3262.120711] bio-0 228KB 228KB [ 3262.121396] biovec-max 450KB 629KB [ 3262.122105] biovec-64 393KB 393KB [ 3262.123038] biovec-16 52KB 52KB [ 3262.124604] user_namespace 31KB 31KB [ 3262.125865] uid_cache 8KB 8KB [ 3262.126569] dmaengine-unmap-2 4KB 4KB [ 3262.127943] audit_buffer 7KB 7KB [ 3262.128712] skbuff_ext_cache 1168KB 1168KB [ 3262.129469] skbuff_fclone_cache 209KB 255KB [ 3262.130277] skbuff_head_cache 751KB 817KB [ 3262.131045] file_lock_cache 74KB 74KB [ 3262.131730] file_lock_ctx 7KB 7KB [ 3262.132391] fsnotify_mark_connector 20KB 20KB [ 3262.133145] net_namespace 117KB 117KB [ 3262.133834] task_delay_info 135KB 135KB [ 3262.134653] taskstats 77KB 77KB [ 3262.135368] proc_dir_entry 377KB 386KB [ 3262.136038] pde_opener 31KB 31KB [ 3262.136850] seq_file 37KB 41KB [ 3262.137493] sigqueue 126KB 126KB [ 3262.138153] shmem_inode_cache 1252KB 1289KB [ 3262.138848] kernfs_iattrs_cache 243KB 243KB [ 3262.139513] kernfs_node_cache 5584KB 5604KB [ 3262.140198] mnt_cache 244KB 244KB [ 3262.140882] filp 818KB 1485KB [ 3262.141672] names_cache 2074KB 2511KB [ 3262.142339] hashtab_node 274KB 274KB [ 3262.143110] ebitmap_node 1149KB 1149KB [ 3262.143830] avtab_node 4976KB 4976KB [ 3262.144506] avc_node 35KB 35KB [ 3262.145247] lsm_inode_cache 2618KB 3051KB [ 3262.145948] lsm_file_cache 66KB 184KB [ 3262.146647] key_jar 39KB 39KB [ 3262.147354] uts_namespace 15KB 15KB [ 3262.148058] nsproxy 15KB 15KB [ 3262.148783] vm_area_struct 1616KB 1812KB [ 3262.149626] mm_struct 369KB 409KB [ 3262.150357] fs_cache 68KB 68KB [ 3262.151187] files_cache 239KB 239KB [ 3262.151985] signal_cache 500KB 555KB [ 3262.152722] sighand_cache 323KB 511KB [ 3262.153517] task_struct 1842KB 2295KB [ 3262.154311] cred_jar 106KB 180KB [ 3262.155101] anon_vma_chain 497KB 507KB [ 3262.155886] anon_vma 184KB 330KB [ 3262.156691] pid 54KB 67KB [ 3262.157479] Acpi-Operand 184KB 213KB [ 3262.158255] Acpi-ParseExt 27KB 27KB [ 3262.159055] Acpi-Parse 162KB 177KB [ 3262.159819] Acpi-State 51KB 66KB [ 3262.160556] Acpi-Namespace 20KB 20KB [ 3262.161376] numa_policy 7KB 7KB [ 3262.162149] trace_event_file 163KB 163KB [ 3262.162934] ftrace_event_field 280KB 280KB [ 3262.163722] pool_workqueue 40KB 40KB [ 3262.164464] task_group 16KB 16KB [ 3262.165229] vmap_area 114KB 114KB [ 3262.165997] page->ptl 411KB 456KB [ 3262.166784] kmemleak_scan_area 91KB 91KB [ 3262.168487] kmemleak_object 139904KB 161617KB [ 3262.169273] kmalloc-8k 4992KB 5120KB [ 3262.170023] kmalloc-4k 7256KB 7392KB [ 3262.170799] kmalloc-2k 5036KB 5216KB [ 3262.171544] kmalloc-1k 3158KB 4160KB [ 3262.172342] kmalloc-512 3852KB 5872KB [ 3262.173172] kmalloc-256 1404KB 1424KB [ 3262.173936] kmalloc-192 547KB 548KB [ 3262.174734] kmalloc-128 581KB 604KB [ 3262.175495] kmalloc-96 412KB 900KB [ 3262.176295] kmalloc-64 1009KB 1680KB [ 3262.177066] kmalloc-32 771KB 836KB [ 3262.177833] kmalloc-16 348KB 368KB [ 3262.178600] kmalloc-8 318KB 318KB [ 3262.179326] kmem_cache_node 47KB 47KB [ 3262.179941] kmem_cache 78KB 78KB [ 3262.180532] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=255,uid=0 [ 3262.182237] Out of memory (oom_kill_allocating_task): Killed process 255 (sshd) total-vm:13844kB, anon-rss:1224kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 3262.307160] systemd[1]: Starting OpenBSD Secure Shell server... [ 3262.322876] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 3262.336871] systemd[1]: systemd-rfkill.service: A process of this unit has been killed by the OOM killer. [ 3262.353886] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 3262.359991] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. Connection to localhost closed by remote host. [ 3262.426458] systemd[1]: systemd-journald.service: Consumed 9.550s CPU time. [ 3262.440334] systemd[1]: systemd-rfkill.service: Main process exited, code=killed, status=9/KILL [ 3262.447339] systemd[1]: systemd-rfkill.service: Failed with result 'oom-kill'. [ 3262.467875] systemd[1]: Failed to start Load/Save RF Kill Switch Status. [ 3262.514416] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 3262.550246] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 3262.609954] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 3262.639851] systemd[1]: ssh.service: Control process exited, code=killed, status=15/TERM [ 3262.642861] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 3262.658870] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 3262.705534] systemd[1]: Stopped target Bluetooth. [ 3262.931226] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 2. [ 3262.935174] systemd[1]: Stopped OpenBSD Secure Shell server. [ 3262.983004] systemd[1]: Starting OpenBSD Secure Shell server... [ 3262.989317] systemd[1]: Started Load/Save RF Kill Switch Status. [ 3263.009049] systemd[1]: systemd-journal-flush.service: Succeeded. [ 3263.024098] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 3263.027319] systemd[1]: Stopped Journal Service. [ 3263.029951] systemd[1]: systemd-journald.service: Consumed 9.550s CPU time. [ 3263.063941] systemd[1]: Starting Journal Service... [ 3263.221966] systemd-journald[11484]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 3263.266009] systemd[1]: Started OpenBSD Secure Shell server. [ 3263.858037] systemd[1]: Started Journal Service. [ 3263.950482] systemd-journald[11484]: Received client request to flush runtime journal. VM DIAGNOSIS: 02:28:58 Registers: info registers vcpu 0 RAX=0000000000002818 RBX=ffffc90000662818 RCX=ffffffff82b3a42f RDX=0000000000000000 RSI=ffffffff82b3a43d RDI=ffff888008a9a1b6 RBP=00000000000000c5 RSP=ffff88800851fa28 R8 =0000000000000000 R9 =ffffffff85670b0f R10=0000000000000000 R11=0000000000000001 R12=ffff88800d563c50 R13=ffffc90000777c60 R14=ffff888008a9a180 R15=00000000000000c6 RIP=ffffffff82b3a4a6 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f653817a42f CR3=00000000151aa000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=2037353a38323a3230203320206e614a XMM01=5d3930383037382e31363233205b203a XMM02=765043545f6b636f735f747365757165 XMM03=203a6c656e72656b2072656c6c616b7a XMM04=61706567756820303d707275735f7365 XMM05=656761706567756820303d6c61746f74 XMM06=4e205d3237373335382e31363233205b XMM07=79732037353a38323a3230203320206e XMM08=6e657365727020426b303a676e69646e XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=00007f65381e00f3 RCX=1ffffffff0acdae8 RDX=0000000000000000 RSI=00007f65381e00f3 RDI=ffffffff85035280 RBP=00007f65381e00f3 RSP=ffff888015b279b0 R8 =0000000000000000 R9 =ffff888015b27f58 R10=0000000000032042 R11=1ffff11002b64f2d R12=ffff888015b27ab8 R13=0000000000000000 R14=ffff888008e76600 R15=ffff88800c555060 RIP=ffffffff8140aaf2 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f6537c478c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f65381de3e0 CR3=00000000151aa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffff00ffffffffffffffff XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=0000555ce560b2c00000000000000004 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000